电光与控制, 2018, 25 (9): 1, 网络出版: 2018-09-15   

赛博空间战术机动的要素分析

Study on Elements of Cyber Tactical Maneuver
作者单位
1 空军工程大学航空机务士官学校, 河南 信阳 464000
2 光电控制技术重点实验室, 河南 洛阳 471000
3 河北师范大学信息技术学院, 石家庄 050024
摘要
机动的要素属性是战术机动规划的依据。从战术机动的目标指向、平台运动特征和时间约束、交战的效能收益等方面对作战平台在物理空间的机动要素进行分析, 进而, 结合赛博空间作战力量的运动特征、承载空间的特点等因素, 给出赛博空间战术机动的特定要素。
Abstract
The elements of the maneuver form the basis for the tactical maneuver planning.In this paper, the elements of the tactical maneuver in kinetic space are analyzed from such aspects as goal directness of the maneuvering, movement feature and time constraints of the combat platform, and the gains and losses of the combat.Based on the movement characteristics of the combat forces in cyberspace and the characteristics of carrying space, the specific elements of tactical maneuver in cyberspace are given.
参考文献

[1] Joint Publication 3-0.Joint operati-ons, JP 3-0[R].Joint Chiefs of Staff, United States Department of Defense, Washington D.C., 2011.

[2] Joint Publication 3-12.Cyberspace operations[R].Joint Chiefs of Staff, United States Department of Defense, Washington D.C., 2013.

[3] BERAUD P, CRUZ A, HASSELL S, et al.Using cyber maneuver to improve network resiliency[C]//Military Communications Conference(MILCOM), 2011:1121-1126.

[4] BERAUD P, CRUZ A, HASSELL S, et al.Cyber defense network maneuver commander[C]//International Carnahan Conference on Security Technology, 2010:112-120.

[5] U.S.Air Force.Air force basic doctrine, organization, and command.Air Force Doctrinal Document (AFDD) 1[R/OL].(2011-10-14)[2018-05-01].http://www.e-publishing.af.mil.

[6] CROWELL R M.Some principles of cyber warfare (NWC 2160)[D].Newport:U.S.Naval War College, 2015.

[7] MCGRAW M W R.USMC, beyond mission command:maneuver warfare for cyber command and control[D]. Newport:U.S.Naval War College, 2015.

[8] APPLEGATE S D.The principle of maneuver in cyber operations[C]//The 4th International Conference on Cyber Conflict, 2012:1-13.

[9] 刘金星,陈哨东,王芳.赛博空间的战术机动[J].电光与控制, 2014, 21(9):1-4.

[10] LORD W T.Air force cyber command strategic vision [R].Air Force Cyberspace Command, Barks- dale AFB LA, 2008.

[11] ZACHAR F.Strategic maneuver:defined for the future army[D].Fort Leavenworth, KS:Command and Ge-neral Staff College, 2000.

[12] HUBER C, MCDANIEL P, BROWN S E, et al.Cyber fighter associate:a decision support system for cyber agility[C]//Annual Conference on Information Science and Systems (CISS), 2016:198-203.

[13] WELLS L.Maneuver in the global commons-the cyber dimension[J/OL].(2010-12-01)[2018-05-01].https://www.afcea.org/content/maneuver-global-commons—cyber-dimension.

[14] JAJODIA S, GHOSH A K, SWARUP V, et al.Moving target defense:creating asymmetric uncertainty for cyber threats (advances in information security 54)[M].New York:Springer, 2011.

[15] JAJODIA S, GHOSH A K, SUBRA- HMANIAN V S, et al.Moving target defense II:application of game theory and adversarial modeling [M].New York:Springer, 2013.

[16] RAMUHALLI P, HALAPPANAVAR M, COBLE J, et al.Towards a theory of autonomous reconstitution of compromised cyber-systems[C]//IEEE International Conference on Techno-logies for Homeland Security(HST), 2013:577-583.

[17] TORRIERI D.Cyber maneuvers and maneuver keys[C]//IEEE Military Communications Conference, 2014:262-268.

[18] SHAN Z Y, NEAMTIU I, QIAN Z Y, et al.Proactive restart as cyber maneuver for Android[C]//IEEE Military Communications Confe-rence, 2015:9-24.

[19] LU Z, MARVEL L M, WANG C.To be proactive or not:a framework to model cyber maneuvers for critical path protection in MANETs[C]//Proceedings of the Second ACM Workshop on Moving Target Defense, 2015:85-93.

[20] MOODY W C, HU H X, APON A.Defensive maneuver cyber platform modeling with stochastic Petri nets[C]//IEEE International Conference on Collaborative Computing:Networking, Applications and Work Sharing, 2014:531-538.

[21] AKYAZI U.Possible Scenarios and maneuvers for cyber operational area[C]//The 13th European Conference on Cyber Warfare and Security (ECCWS), 2014:1-7.

[22] MPOFU N, CHIKATI R.Strategy matrix for containing cyber attacks:a generic approach[C]//The 10th International Conference on Cyber Warfare and Security(ICCWS), Krouger National Park, South Africa, 2015:207-215.

[23] 刘昌云, 刘进忙, 陈长兴.基于风险型决策的目标机动策略研究[J].系统工程理论与实践, 2003, 23(10):99-103.

[24] 罗卫平, 李战武, 孙源源, 等.一种利用机载雷达多普勒盲区隐蔽接敌的机动决策方法[J].电光与控制, 2015,22(1):28-33,44.

[25] 刘钢,周峰,周智超,等.快艇机动规避直升机火箭弹攻击战术仿真[J].系统工程理论与实践, 2011, 31(12):2439-2446.

[26] MARZAT J.A missile guidance law tolerant to un-estimated evasive maneuvers[J].Aircraft Engineering and Aerospace Technology, 2017, 89(2):314-319.

[27] 夏佩伦, 武志东, 李博.潜艇攻击多目标条件下的占位机动研究[J].火力与指挥控制,2016,41(4):104-108.

[28] 高长生, 陈尔康, 荆武兴.高超声速飞行器机动规避轨迹优化[J].哈尔滨工业大学学报,2017,49(4):16-21.

[29] 于大腾,王华,孙福煜.考虑潜在威胁区的航天器最优规避机动策略[J].航空学报,2017,38(1):281-289.

刘金星, 赵冬梅, 高劲松. 赛博空间战术机动的要素分析[J]. 电光与控制, 2018, 25(9): 1. 刘金星, 赵冬梅, 高劲松. Study on Elements of Cyber Tactical Maneuver[J]. Electronics Optics & Control, 2018, 25(9): 1.

本文已被 1 篇论文引用
被引统计数据来源于中国光学期刊网
引用该论文: TXT   |   EndNote

相关论文

加载中...

关于本站 Cookie 的使用提示

中国光学期刊网使用基于 cookie 的技术来更好地为您提供各项服务,点击此处了解我们的隐私策略。 如您需继续使用本网站,请您授权我们使用本地 cookie 来保存部分信息。
全站搜索
您最值得信赖的光电行业旗舰网络服务平台!