Virtual Network Representations of Information Warfare Battlespace

نویسندگان

  • Kenneth Y. Jo
  • John T. Dockery
چکیده

Virtual network methodologies are applied to information warfare (IW) simulation in which objects and agents behave with special relationships. Decision makers operate in a virtual battlespace, which is in essence an information cyberspace in which IW attacks damage assessments, countermeasure efforts, and repairs are interrelated through virtual networks. The virtual network representation is used to model not only communications networks but also socio-technical networks with c$mamic, hyperactive characteristics. D@erent virtual network representations are realized to characterize various behaviors and to help generate associated performance measures. Communications network attacks will constitute a major source of IW activities that will be analyzed. Virtual networks are used to represent object behaviors with appropriate levels of abstraction depending on IW scenarios andproblem domains.ion depending on IW scenarios andproblem domains.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multiring Techniques for Scalable

Network-centric warfare must leverage off a common network to support different purposes. While group communications based on a single virtual ring overlay may satisfy the most important requirements for survivability and security, scalability may force redesign because a single ring generally has higher delay and delay jitter. In order to provide scalability as the number of group members grow...

متن کامل

A Survey and Comparison of Multi-Ring Techniques for Scalable Battlespace Group Communications

Ring-based network overlays have attractive characteristics for group communications such as inherent reliability and single fault-tolerance. However, ring networks also generally have longer paths and thus higher delay and delay jitter. In order to provide scalability as the number of group members grows, large single rings may be broken into smaller multi-rings interconnected together at the ...

متن کامل

Issues and Requirements for Cybersecurity in Network Centric Warfare

The transition to network centric warfare brings with it great promise for the effectiveness of future military operations. This promise arises from the capability for network centric warfare to empower individuals at all levels with vast amounts of relevant information and thereby lift the “fog of war.” By achieving the promise, commanders will be able to effectively and efficiently employ the...

متن کامل

The Architecture and Design of a Cyberware Opposing Forces Knowledge Base

Currently, the US military is in the midst of a change in its philosophy, approach, and technologies used for warfare. The move toward small formations, small but extremely accurate weapons, and high speed movement all augmented by rapid, automated transmission of information between and among all military components brings about this change. This new form of warfare, in which a great premium i...

متن کامل

Realistic and Affordable Cyberware Opponents for the Information Warfare BattleSpace

As military environments increase in the complexity, fidelity, scope, and number of participants, the reliance of the military upon information superiority to facilitate successful operations increases. In conjunction with this increase upon accurate and timely information the vulnerability of military forces to information attack also increases. Additionally, information management capability ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998