Virtual Network Representations of Information Warfare Battlespace
نویسندگان
چکیده
Virtual network methodologies are applied to information warfare (IW) simulation in which objects and agents behave with special relationships. Decision makers operate in a virtual battlespace, which is in essence an information cyberspace in which IW attacks damage assessments, countermeasure efforts, and repairs are interrelated through virtual networks. The virtual network representation is used to model not only communications networks but also socio-technical networks with c$mamic, hyperactive characteristics. D@erent virtual network representations are realized to characterize various behaviors and to help generate associated performance measures. Communications network attacks will constitute a major source of IW activities that will be analyzed. Virtual networks are used to represent object behaviors with appropriate levels of abstraction depending on IW scenarios andproblem domains.ion depending on IW scenarios andproblem domains.
منابع مشابه
Multiring Techniques for Scalable
Network-centric warfare must leverage off a common network to support different purposes. While group communications based on a single virtual ring overlay may satisfy the most important requirements for survivability and security, scalability may force redesign because a single ring generally has higher delay and delay jitter. In order to provide scalability as the number of group members grow...
متن کاملA Survey and Comparison of Multi-Ring Techniques for Scalable Battlespace Group Communications
Ring-based network overlays have attractive characteristics for group communications such as inherent reliability and single fault-tolerance. However, ring networks also generally have longer paths and thus higher delay and delay jitter. In order to provide scalability as the number of group members grows, large single rings may be broken into smaller multi-rings interconnected together at the ...
متن کاملIssues and Requirements for Cybersecurity in Network Centric Warfare
The transition to network centric warfare brings with it great promise for the effectiveness of future military operations. This promise arises from the capability for network centric warfare to empower individuals at all levels with vast amounts of relevant information and thereby lift the “fog of war.” By achieving the promise, commanders will be able to effectively and efficiently employ the...
متن کاملThe Architecture and Design of a Cyberware Opposing Forces Knowledge Base
Currently, the US military is in the midst of a change in its philosophy, approach, and technologies used for warfare. The move toward small formations, small but extremely accurate weapons, and high speed movement all augmented by rapid, automated transmission of information between and among all military components brings about this change. This new form of warfare, in which a great premium i...
متن کاملRealistic and Affordable Cyberware Opponents for the Information Warfare BattleSpace
As military environments increase in the complexity, fidelity, scope, and number of participants, the reliance of the military upon information superiority to facilitate successful operations increases. In conjunction with this increase upon accurate and timely information the vulnerability of military forces to information attack also increases. Additionally, information management capability ...
متن کامل