749 research outputs found
U.S. Unmanned Aerial Vehicles (UAVS) and Network Centric Warfare (NCW) impacts on combat aviation tactics from Gulf War I through 2007 Iraq
Unmanned, aerial vehicles (UAVs) are an increasingly important element of many modern militaries. Their success on battlefields in Afghanistan, Iraq, and around the globe has driven demand for a variety of types of unmanned vehicles. Their proven value consists in low risk and low cost, and their capabilities include persistent surveillance, tactical and combat reconnaissance, resilience, and dynamic re-tasking. This research evaluates past, current, and possible future operating environments for several UAV platforms to survey the changing dynamics of combat-aviation tactics and make recommendations regarding UAV employment scenarios to the Turkish military. While UAVs have already established their importance in military operations, ongoing evaluations of UAV operating environments, capabilities, technologies, concepts, and organizational issues inform the development of future systems. To what extent will UAV capabilities increasingly define tomorrow's missions, requirements, and results in surveillance and combat tactics? Integrating UAVs and concepts of operations (CONOPS) on future battlefields is an emergent science. Managing a transition from manned- to unmanned and remotely piloted aviation platforms involves new technological complexity and new aviation personnel roles, especially for combat pilots. Managing a UAV military transformation involves cultural change, which can be measured in decades.http://archive.org/details/usunmannedaerial109454211Turkish Air Force authors.Approved for public release; distribution is unlimited
Nature-inspired survivability: Prey-inspired survivability countermeasures for cloud computing security challenges
As cloud computing environments become complex, adversaries have become highly sophisticated and unpredictable. Moreover, they can easily increase attack power and persist longer before detection. Uncertain malicious actions, latent risks, Unobserved or Unobservable risks (UUURs) characterise this new threat domain. This thesis proposes prey-inspired survivability to address unpredictable security challenges borne out of UUURs. While survivability is a well-addressed phenomenon in non-extinct prey animals, applying prey survivability to cloud computing directly is challenging due to contradicting end goals. How to manage evolving survivability goals and requirements under contradicting environmental conditions adds to the challenges. To address these challenges, this thesis proposes a holistic taxonomy which integrate multiple and disparate perspectives of cloud security challenges. In addition, it proposes the TRIZ (Teorija Rezbenija Izobretatelskib Zadach) to derive prey-inspired solutions through resolving contradiction. First, it develops a 3-step process to facilitate interdomain transfer of
concepts from nature to cloud. Moreover, TRIZâs generic approach suggests specific
solutions for cloud computing survivability. Then, the thesis presents the conceptual prey-inspired cloud computing survivability framework (Pi-CCSF), built upon TRIZ derived solutions. The framework run-time is pushed to the user-space to support evolving survivability design goals. Furthermore, a target-based decision-making technique (TBDM) is proposed to manage survivability decisions. To evaluate the prey-inspired survivability concept, Pi-CCSF simulator is developed and implemented. Evaluation results shows that escalating survivability actions improve the vitality of vulnerable and compromised virtual machines (VMs) by 5% and dramatically improve their overall survivability. Hypothesis testing conclusively supports the hypothesis that the escalation mechanisms can be applied to enhance the survivability of cloud computing systems. Numeric analysis of TBDM shows that by considering survivability preferences and attitudes (these directly impacts survivability actions), the TBDM method brings unpredictable survivability information closer to decision processes. This enables efficient execution of variable escalating survivability actions, which enables the Pi-CCSFâs decision
system (DS) to focus upon decisions that achieve survivability outcomes under unpredictability imposed by UUUR
Integrated helicopter survivability
A high level of survivability is important to protect military personnel and equipment and is
central to UK defence policy. Integrated Survivability is the systems engineering
methodology to achieve optimum survivability at an affordable cost, enabling a mission to
be completed successfully in the face of a hostile environment. âIntegrated Helicopter
Survivabilityâ is an emerging discipline that is applying this systems engineering approach
within the helicopter domain. Philosophically the overall survivability objective is âzero
attritionâ, even though this is unobtainable in practice.
The research question was: âHow can helicopter survivability be assessed in an integrated
way so that the best possible level of survivability can be achieved within the constraints and
how will the associated methods support the acquisition process?â
The research found that principles from safety management could be applied to the
survivability problem, in particular reducing survivability risk to as low as reasonably
practicable (ALARP). A survivability assessment process was developed to support this
approach and was linked into the military helicopter life cycle. This process positioned the
survivability assessment methods and associated input data derivation activities.
The system influence diagram method was effective at defining the problem and capturing
the wider survivability interactions, including those with the defence lines of development
(DLOD). Influence diagrams and Quality Function Deployment (QFD) methods were
effective visual tools to elicit stakeholder requirements and improve communication across
organisational and domain boundaries.
The semi-quantitative nature of the QFD method leads to numbers that are not real. These
results are suitable for helping to prioritise requirements early in the helicopter life cycle, but
they cannot provide the quantifiable estimate of risk needed to demonstrate ALARP. The probabilistic approach implemented within the Integrated Survivability Assessment
Model (ISAM) was developed to provide a quantitative estimate of âriskâ to support the
approach of reducing survivability risks to ALARP. Limitations in available input data for
the rate of encountering threats leads to a probability of survival that is not a real number that
can be used to assess actual loss rates. However, the method does support an assessment
across platform options, provided that the âtest environmentâ remains consistent throughout
the assessment. The survivability assessment process and ISAM have been applied to an
acquisition programme, where they have been tested to support the survivability decision
making and design process.
The survivability âtest environmentâ is an essential element of the survivability assessment
process and is required by integrated survivability tools such as ISAM. This test
environment, comprising of threatening situations that span the complete spectrum of
helicopter operations requires further development. The âtest environmentâ would be used
throughout the helicopter life cycle from selection of design concepts through to test and
evaluation of delivered solutions. It would be updated as part of the through life capability
management (TLCM) process.
A framework of survivability analysis tools requires development that can provide
probabilistic input data into ISAM and allow derivation of confidence limits. This systems
level framework would be capable of informing more detailed survivability design work
later in the life cycle and could be enabled through a MATLABÂź based approach.
Survivability is an emerging system property that influences the whole system capability.
There is a need for holistic capability level analysis tools that quantify survivability along
with other influencing capabilities such as: mobility (payload / range), lethality, situational
awareness, sustainability and other mission capabilities.
It is recommended that an investigation of capability level analysis methods across defence
should be undertaken to ensure a coherent and compliant approach to systems engineering
that adopts best practice from across the domains. Systems dynamics techniques should be
considered for further use by Dstl and the wider MOD, particularly within the survivability
and operational analysis domains. This would improve understanding of the problem space,
promote a more holistic approach and enable a better balance of capability, within which
survivability is one essential element.
There would be value in considering accidental losses within a more comprehensive
âsurvivabilityâ analysis. This approach would enable a better balance to be struck between
safety and survivability risk mitigations and would lead to an improved, more integrated
overall design
An Embryonics Inspired Architecture for Resilient Decentralised Cloud Service Delivery
Data-driven artificial intelligence applications arising from Internet of Things technologies can have
profound wide-reaching societal benefits at the cross-section of the cyber and physical domains. Usecases are expanding rapidly. For example, smart-homes and smart-buildings provide intelligent monitoring, resource optimisation, safety, and security for their inhabitants. Smart cities can manage
transport, waste, energy, and crime on large scales. Whilst smart-manufacturing can autonomously
produce goods through the self-management of factories and logistics. As these use-cases expand further, the requirement to ensure data is processed accurately and timely is ever crucial, as many of these
applications are safety critical. Where loss off life and economic damage is a likely possibility in the
event of system failure. While the typical service delivery paradigm, cloud computing, is strong due
to operating upon economies of scale, their physical proximity to these applications creates network
latency which is incompatible with these safety critical applications. To complicate matters further,
the environments they operate in are becoming increasingly hostile. With resource-constrained and
mobile wireless networking, commonplace. These issues drive the need for new service delivery architectures which operate closer to, or even upon, the network devices, sensors and actuators which
compose these IoT applications at the network edge. These hostile and resource constrained environments require adaptation of traditional cloud service delivery models to these decentralised mobile
and wireless environments. Such architectures need to provide persistent service delivery within the
face of a variety of internal and external changes or: resilient decentralised cloud service delivery.
While the current state of the art proposes numerous techniques to enhance the resilience of services
in this manner, none provide an architecture which is capable of providing data processing services in
a cloud manner which is inherently resilient. Adopting techniques from autonomic computing, whose
characteristics are resilient by nature, this thesis presents a biologically-inspired platform modelled
on embryonics. Embryonic systems have an ability to self-heal and self-organise whilst showing capacity to support decentralised data processing. An initial model for embryonics-inspired resilient
decentralised cloud service delivery is derived according to both the decentralised cloud, and resilience
requirements given for this work. Next, this model is simulated using cellular automata, which illustrate the embryonic conceptâs ability to provide self-healing service delivery under varying system
component loss. This highlights optimisation techniques, including: application complexity bounds,
differentiation optimisation, self-healing aggression, and varying system starting conditions. All attributes of which can be adjusted to vary the resilience performance of the system depending upon
different resource capabilities and environmental hostilities.
Next, a proof-of-concept implementation is developed and validated which illustrates the efficacy
of the solution. This proof-of-concept is evaluated on a larger scale where batches of tests highlighted
the different performance criteria and constraints of the system. One key finding was the considerable
quantity of redundant messages produced under successful scenarios which were helpful in terms of
enabling resilience yet could increase network contention. Therefore balancing these attributes are
important according to use-case. Finally, graph-based resilience algorithms were executed across
all tests to understand the structural resilience of the system and whether this enabled suitable
measurements or prediction of the applicationâs resilience. Interestingly this study highlighted that
although the system was not considered to be structurally resilient, the applications were still being
executed in the face of many continued component failures. This highlighted that the autonomic
embryonic functionality developed was succeeding in executing applications resiliently. Illustrating
that structural and application resilience do not necessarily coincide. Additionally, one graph metric,
assortativity, was highlighted as being predictive of application resilience, although not structural
resilience
Multi-attribute tradespace exploration for survivability
Thesis (Ph. D.)--Massachusetts Institute of Technology, Engineering Systems Division, 2009.Cataloged from PDF version of thesis.Includes bibliographical references (p. 235-249).Survivability is the ability of a system to minimize the impact of a finite-duration disturbance on value delivery (i.e., stakeholder benefit at cost), achieved through (1) the reduction of the likelihood or magnitude of a disturbance, (2) the satisfaction of a minimally acceptable level of value delivery during and after a disturbance, and/or (3) a timely recovery. Traditionally specified as a requirement in military systems, survivability is an increasingly important consideration for all engineering systems given the proliferation of natural and artificial threats. Although survivability is an emergent system property that arises from interactions between a system and its environment, conventional approaches to survivability engineering are reductionist in nature. Furthermore, current methods neither accommodate dynamic threat environments nor facilitate stakeholder communication for conducting trade-offs among system lifecycle cost, mission utility, and operational survivability. Multi-Attribute Tradespace Exploration (MATE) for Survivability is introduced as a system analysis methodology to improve the generation and evaluation of survivable alternatives during conceptual design. MATE for Survivability applies decision theory to the parametric modeling of thousands of design alternatives across representative distributions of disturbance environments. To improve the generation of survivable alternatives, seventeen empirically-validated survivability design principles are introduced. The general set of design principles allows the consideration of structural and behavioral strategies for mitigating the impact of disturbances over the lifecycle of a given encounter.(cont.) To improve the evaluation of survivability, value-based metrics are introduced for the assessment of survivability as a dynamic, continuous, and path-dependent system property. Two of these metrics, time-weighted average utility loss and threshold availability, are used to evaluate survivability based on the relationship between stochastic utility trajectories of system state and stakeholder expectations across nominal and perturbed environments. Finally, the survivability "tear(drop)" tradespace is introduced to enable the identification of inherently survivable architectures that efficiently balance performance metrics of cost, utility, and survivability. The internal validity and prescriptive value of the design principles, metrics, and tradespaces comprising MATE for Survivability are established through applications to the designs of an orbital transfer vehicle and a satellite radar system.by Matthew G. Richards.Ph.D
Configuration Management of Distributed Systems over Unreliable and Hostile Networks
Economic incentives of large criminal profits and the threat of legal consequences have pushed criminals to continuously improve their malware, especially command and control channels. This thesis applied concepts from successful malware command and control to explore the survivability and resilience of benign configuration management systems.
This work expands on existing stage models of malware life cycle to contribute a new model for identifying malware concepts applicable to benign configuration management. The Hidden Master architecture is a contribution to master-agent network communication. In the Hidden Master architecture, communication between master and agent is asynchronous and can operate trough intermediate nodes. This protects the master secret key, which gives full control of all computers participating in configuration management. Multiple improvements to idempotent configuration were proposed, including the definition of the minimal base resource dependency model, simplified resource revalidation and the use of imperative general purpose language for defining idempotent configuration.
Following the constructive research approach, the improvements to configuration management were designed into two prototypes. This allowed validation in laboratory testing, in two case studies and in expert interviews. In laboratory testing, the Hidden Master prototype was more resilient than leading configuration management tools in high load and low memory conditions, and against packet loss and corruption. Only the research prototype was adaptable to a network without stable topology due to the asynchronous nature of the Hidden Master architecture.
The main case study used the research prototype in a complex environment to deploy a multi-room, authenticated audiovisual system for a client of an organization deploying the configuration. The case studies indicated that imperative general purpose language can be used for idempotent configuration in real life, for defining new configurations in unexpected situations using the base resources, and abstracting those using standard language features; and that such a system seems easy to learn.
Potential business benefits were identified and evaluated using individual semistructured expert interviews. Respondents agreed that the models and the Hidden Master architecture could reduce costs and risks, improve developer productivity and allow faster time-to-market. Protection of master secret keys and the reduced need for incident response were seen as key drivers for improved security. Low-cost geographic scaling and leveraging file serving capabilities of commodity servers were seen to improve scaling and resiliency. Respondents identified jurisdictional legal limitations to encryption and requirements for cloud operator auditing as factors potentially limiting the full use of some concepts
Applications of agent architectures to decision support in distributed simulation and training systems
This work develops the approach and presents the results of a new model for applying intelligent agents to complex distributed interactive simulation for command and control. In the framework of tactical command, control communications, computers and intelligence (C4I), software agents provide a novel approach for efficient decision support and distributed interactive mission training. An agent-based architecture for decision support is designed, implemented and is applied in a distributed interactive simulation to significantly enhance the command and control training during simulated exercises. The architecture is based on monitoring, evaluation, and advice agents, which cooperate to provide alternatives to the dec ision-maker in a time and resource constrained environment. The architecture is implemented and tested within the context of an AWACS Weapons Director trainer tool.
The foundation of the work required a wide range of preliminary research topics to be covered, including real-time systems, resource allocation, agent-based computing, decision support systems, and distributed interactive simulations. The major contribution of our work is the construction of a multi-agent architecture and its application to an operational decision support system for command and control interactive simulation. The architectural design for the multi-agent system was drafted in the first stage of the work. In the next stage rules of engagement, objective and cost functions were determined in the AWACS (Airforce command and control) decision support domain. Finally, the multi-agent architecture was implemented and evaluated inside a distributed interactive simulation test-bed for AWACS Vv\u27Ds. The evaluation process combined individual and team use of the decision support system to improve the performance results of WD trainees.
The decision support system is designed and implemented a distributed architecture for performance-oriented management of software agents. The approach provides new agent interaction protocols and utilizes agent performance monitoring and remote synchronization mechanisms. This multi-agent architecture enables direct and indirect agent communication as well as dynamic hierarchical agent coordination. Inter-agent communications use predefined interfaces, protocols, and open channels with specified ontology and semantics. Services can be requested and responses with results received over such communication modes. Both traditional (functional) parameters and nonfunctional (e.g. QoS, deadline, etc.) requirements and captured in service requests
Situational awareness for critical infrastructure protection
Postgraduate seminar series with a title Situational Awareness for Critical
Infrastructure Protection held at the Department of Military Technology of the
National Defence University in 2015. This book is a collection of some of talks that
were presented in the seminar. The papers address designing inter-organizational
situation awareness system, principles of designing for situation awareness, situation
awareness in distributed teams, vulnerability analysis in a critical system context,
tactical Command, Control, Communications, Computers, & Intelligence (C4I)
systems, and improving situational awareness in the circle of trust. This set of
papers tries to give some insight to current issues of the situation awareness for
critical infrastructure protection.
The seminar has always made a publication of the papers but this has been an
internal publication of the Finnish Defence Forces and has not hindered publication
of the papers in international conferences. Publication of these papers in peer
reviewed conferences has indeed been always the goal of the seminar, since it
teaches writing conference level papers. We still hope that an internal publication in
the department series is useful to the Finnish Defence Forces by offering an easy
access to these papers
An overview of the Copernicus C4I architecture
The purpose of this thesis is to provide the reader with an overview of the U.S. Navy's Copernicus C4I Architecture. The acronym "C4I" emphasizes the intimate relationship between command, control, communications and intelligence, as well as their significance to the modern day warrior. Never in the history of the U.S> Navy has the importance of an extremely flexible C4I architecture been made more apparent than in the last decade. Included are discussions of the Copernicus concept, its command and control doctrine, its architectural goals and components, and Copernicus-related programs. Also included is a discussion on joint service efforts and the initiatives being conducted by the U.S. Marine Corps, the U.S. Air Force and the U.S. Army. Finally, a discussion of the Copernicus Phase I Requirements Definition Document's compliance with the acquisition process as required by DoD Instruction 5000.2 is presented.http://archive.org/details/overviewofcopern00dearLieutenant, United States NavyApproved for public release; distribution is unlimited
- âŠ