期刊文献+

C^4ISR系统作战业务信息失真效应建模 被引量:2

Modeling of Operational Information Distortion Effect on C^4ISR System
下载PDF
导出
摘要 研究针对赛博空间对抗威胁环境下C4ISR系统作战业务信息失真现象,提出了一种系统作战业务信息失真效应建模方法。首先,从C4ISR系统构成要素的角度,提出了战场有线网络、无线网络、传感器和作战应用系统中存在的脆弱性和面临的赛博空间安全威胁。其次,首次提出了系统作战业务信息失真效应的概念内涵,从作战应用系统通信机制的角度,提出了基于Winsock2SPI架构的效应产生机制,并建立了作战业务信息失真效应的数学表征模型。最后,在仿真实验环境下,以某防空作战指挥信息系统为实验对象,利用研制开发的恶意代码工具,模拟实际战场环境下指挥控制系统信息失真现象。 Considering the distortion phenomenon about C^4 ISR system operational information under the cyberspace counter environment,a modeling method for system operational distortion is proposed. Firstly,from the perspective of the constituent elements of C^4 ISR systems,the vulnerability and cyberspace security threats faced by battlefield wire networks,wireless networks,sensors and combat systems are proposed. Secondly,the concept of system operation command distortion is proposed,and the generated mechanism about this effect based on Winsock2 SPI architecture is established from the perspective of command and control system communication mechanism,and a mathematical model characterizing the distortion effects is lately established. Finally,considering the air defense battle command information system as experimental subject in the simulation environment,utilizing the malicious code tools developed to simulate combat command and control system command distortion with actual battlefield environment.
作者 周芳 周正虎
出处 《中国电子科学研究院学报》 北大核心 2015年第3期287-292,244,共7页 Journal of China Academy of Electronics and Information Technology
基金 总装预研基金项目(9140A040413DZ3800001)
关键词 赛博空间安全威胁 C^4ISR系统 信息失真 脆弱性 恶意代码 cyberspace security threat C^4ISR System operational information distortion vulnerability malicious code
  • 相关文献

参考文献11

二级参考文献68

  • 1胡滨,贺超凯,左明.Windows下使用SPI过滤网络数据包[J].华中科技大学学报(自然科学版),2003,31(S1):168-170. 被引量:6
  • 2汪国洋,王景中.基于SPI的访问控制技术[J].计算机应用,2003,23(z1):267-269. 被引量:4
  • 3刘兴.假雷达目标欺骗与反欺骗[J].电子科技导报,1995(11):20-21. 被引量:2
  • 4徐敏 张聿坤编译.赛博空间作战.国际电子战,2009,(11):27-29.
  • 5王燕.赛博空间与电子战[J].国际电子战,2009,(11):36-36.
  • 6Jones A,Ohlund J.Network Programming for Microsoft Windows[M].US:Microsoft Press,2000.
  • 7Microsoft Corp.MSDN[Z].2001.
  • 8Joseph S N. Cyber Power [R].The Report of Harvard Kennedy School Belfer Center, 2010.
  • 9马丁·C·理贝基.网络威慑与网络战[M].北京:军事谊文出版社,2010.
  • 10МодернизацияЗРКС-125″Печора″доуровняЗРКC-125-2TM″Печора-2TM″. http://www.tetraedr.com/production-pechora2tm.php . 2009

共引文献71

同被引文献10

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部