期刊文献+

一种计算机网络对抗战术情报的生成模型

Tactical Intelligence Production Model of Computer Network Operations
下载PDF
导出
摘要 情报提供及时、完整、准确的对抗态势,使得作战的指挥决策者能顺利完成决策任务。情报生成是保证情报质量的关键,现有计算机网络对抗缺少独立的情报生成系统。基于着色Petri网,为计算机网络对抗的战术情报提出一种生成模型。明确计算机网络对抗的作用对象及情报外延,形式地定义情报生成活动及过程,在此基础上建立战术情报生成的CPN模型。该模型通过CPN Tool 2.2进行仿真和分析,验证了该模型提供的情报生成过程的计算可行性和有效性,为相应的软件系统设计提供依据。 Tactical intelligence enables decision-maker to complete the decision tasks successfully with timely, complete and accurate operational situation. The utilization of intelligence mainly depends on the processing of intelligence. The existing computer network operations system lacks of an independent intelligence production system. A tactical intelligence production model of Computer Network Operations was proposed based on colored Petri nets. Based on the precise definition of target of computer network operations and intelligence and formalization of intelligence production activities and process, the process of intelligence production was modeled with colored Petri nets. The model was validated by using CPN Tool 2.0. The results show that this model is valid and feasible, and provides the theoretical basis for the implementation of tactical intelligence production system of computer network operations.
出处 《系统仿真学报》 CAS CSCD 北大核心 2013年第3期509-513,共5页 Journal of System Simulation
基金 国家部委资助项目(A2120110006) 北京市教育委员会共建项目建设计划基金项目(JDE00060630) 北京市教委面上项目(KM201211232010)
关键词 计算机网络对抗 战术情报 情报生成模型 CPN模型 computer network operations tactical intelligence intelligence production model CPN model
  • 相关文献

参考文献16

  • 1Joint Chiefs of Staff. Joint Publication 3-13: Information Operations[M]. Washington DC, USA: Joint Publications, 2006.
  • 2李肖坚.计算机网络自组织对抗研究[D].北京:北京航空航天大学,2008.
  • 3李肖坚.一种计算机网络自组织的协同对抗模型.计算机研究与发展,2005,42:256-260.
  • 4Joint Chiefs of Staff. Joint Publication 2-01: Joint and NationalIntelligence Support to Military Operations [M]. Washington DC,USA: Joint Publications, 2004.
  • 5军事科学院.中国人民解放军军语[M].北京:中国人民解放军战士出版社.1997.
  • 6EdwM'd Waltz. Information Warfare: Principles and Operations [M].London, UK: Artech House, 1998.
  • 7Llinas J, Bowman C, Rogova G, et al. Revisiting the JDL datafusion model II [C]// Proceedings of the Seventh InternationalConference on Information Fusion. Sweden: Springer, 2004:1218-1230.
  • 8Steinberg A N,Bowman C L, White F E. Revisions to the JDL datafusion model [C]// Proceedings of the SPIE. Quebec, Canada: CRCPress,1999: 430-441.
  • 9Endsley M R. Design and evaluation for situation awarenessenhancement [C]// Proc of the Human Factors Society 32nd AnnualMeeting. CA, USA: Human Factors Society, 1988: 97-101.
  • 10Bass T. Intrusion detection systems and multisensor data fusion:Creating Cyberspace Situational Awareness [J]. Communications ofthe ACM, 2000,43(4): 99-105.

二级参考文献13

  • 1陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:342
  • 2Lakkaraju K, Yurcik W, Lee A J. NVisionIP: NetFlow visualizations of system state for security situational awareness [C] //Proc of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security. New York: ACM, 2004:65-72
  • 3Yin Xiaoxin, Yurcik W, Treaster M, et al. VisFlowConnect: NetFlow visualizations of link relationships for security situational awareness [C] //Proc of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security. New York: ACM, 2004:26-34
  • 4朱亮,王慧强,郑丽君.网络安全态势可视化研究评述[OL].[2008-01-08].http://www.paper.edu.cn/downloadpaper.php?serial_number=200607-36
  • 5Bass T. Intrusion detection systems & multisensor data fusion: Creating Cyberspace Situational Awareness [J].Communications of the ACM, 2000, 43(4): 99-105
  • 6D'Ambrosio B. Security situation assessment and response evaluation (SSARE) [C]//DISCEX'01. Proceedings: DARPA Information Survivability Conference & Exposition Ⅱ. Los Alamitos: IEEE Computer Society, 2001:387-394
  • 7Gorodetsky V, Karsaev O, Samoilov V. On-line update of situation assessment based on asynchronous data streams [C]//Knowledge Based Intelligent Information and Engineering Systems. Berlin/Heidelberg: Springer, 2004 : 1136-1142
  • 8Yegneswaran V, Barford P, Paxson V. Using Honeynets for Internet situational awareness [C/OL]//Proc of ACM/USENIX Hotnets Ⅳ. 2005 [2008-01-12]. http://www. icir. org/vern/papers/sit-aware-hotnet05. pdf
  • 9Dempster A P. Upper and lower probabilities induced by a multi-valued mapping [J]. Annals of Mathematical Statistics, 1967, 38(2): 325-339
  • 10Sharer G. A Mathematical Theory of Evidence [M]. Princeton: Princeton University Press, 1976

共引文献172

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部