770 research outputs found

    Defensive Cyber Battle Damage Assessment Through Attack Methodology Modeling

    Get PDF
    Due to the growing sophisticated capabilities of advanced persistent cyber threats, it is necessary to understand and accurately assess cyber attack damage to digital assets. This thesis proposes a Defensive Cyber Battle Damage Assessment (DCBDA) process which utilizes the comprehensive understanding of all possible cyber attack methodologies captured in a Cyber Attack Methodology Exhaustive List (CAMEL). This research proposes CAMEL to provide detailed knowledge of cyber attack actions, methods, capabilities, forensic evidence and evidence collection methods. This product is modeled as an attack tree called the Cyber Attack Methodology Attack Tree (CAMAT). The proposed DCBDA process uses CAMAT to analyze potential attack scenarios used by an attacker. These scenarios are utilized to identify the associated digital forensic methods in CAMEL to correctly collect and analyze the damage from a cyber attack. The results from the experimentation of the proposed DCBDA process show the process can be successfully applied to cyber attack scenarios to correctly assess the extent, method and damage caused by a cyber attack

    Communication and Jamming BDA of OFDMA communication systems using the software defined radio platform WARP

    Get PDF
    The aim of this research is to demonstrate and evaluate the ability to eavesdrop and interfere with orthogonal frequency division multiple access-down link (OFDMA-DL) signal features utilising Wireless Open Access Research Platform (WARP) boards. The OFDMA-DL waveforms have been developed with 64 sub carriers and have guards and pilots as comparable to the 802.11a WiFi standard. An eavesdropper/interferer (ExJx) is used to estimate signal features, remotely gaining intelligence without alerting the communication system. This research also demonstrates how estimated signal features can be used to interfere with an established communication system. Methods used to perform the signal feature estimation exploit the cyclostationary nature of the OFDMA-DL waveform, with higher order cumulants utilised to classify modulation schemes. To assess the ability of the ExJx system to eavesdrop (Ex), Communication Battle Damage Assessment (CBDA) techniques are used. To assess the ability of the ExJx system to interfere (Jx), Jamming Battle Damage Assessment (JBDA) techniques are used

    Battle damage assessment using inverse synthetic aperture radar (ISAR)

    Get PDF
    An imaging radar, like ISAR, offers a combatant the capability to perform long range surveillance with high quality imagery for positive target identification. Extending this attractive feature to the battle damage assessment problem (BDA) gives the operator instant viewing of the target's behavior when it is hit. As a consequence, immediate and decisive action can be quickly taken (if required). However, the conventional Fourier processing adopted by most ISAR systems does not provide adequate time resolution to capture the target's dynamic responses during the hit. As a result, the radar image becomes distorted. To improve the time resolution, time-frequency transform (TFT) methods of ISAR imaging have been proposed. Unlike traditional Fourier-based processing, TFT's allows variable time resolution of the entire event that falls within the ISAR coherent integration period to be extracted as part of the imaging process. We have shown in this thesis that the use of linear Short Time-Frequency Transforms allows the translational response of the aircraft caused by a blast force to be clearly extracted. The TFT extracted images not only tell us how the aircraft responds to a blast effect but also provides additional information about the cause of image distortion in the traditional ISAR display.http://archive.org/details/battledamagesses109451223Approved for public release; distribution is unlimited

    Blind Demodulation of Pass Band OFDMA Signals and Jamming Battle Damage Assessment Utilizing Link Adaptation

    Get PDF
    This research focuses on blind demodulation of a pass band OFDMA signal so that jamming effectiveness can be assessed; referred to in this research as BDA. The research extends, modifies and collates work within literature to perform a new method of blindly demodulating of a passband OFDMA signal, which exhibits properties of the 802.16 Wireless MAN OFDMA standard, and presents a novel method for performing BDA via observation of SC LA. Blind demodulation is achieved by estimating the carrier frequency, sampling rate, pulse shaping filter roll off factor, synchronization parameters and CFO. The blind demodulator\u27s performance in AWGN and a perfect channel is evaluated where it improves using a greater number OFDMA DL symbols and increased CP length. Performance in a channel with a single multi-path interferer is also evaluated where the blind demodulator\u27s performance is degraded. BDA is achieved via observing SC LA modulation behavior of the blindly demodulated signal between successive OFDMA DL sub frames in two scenarios. The first is where modulation signaling can be used to observe change of SC modulation. The second assumes modulation signaling is not available and the SC\u27s modulation must be classified. Classification of SC modulation is performed using sixth-order cumulants where performance increases with the number of OFDMA symbols. The SC modulation classi er is susceptible to the CFO caused by blind demodulation. In a perfect channel it is shown that SC modulation can be classified using a variety of OFDMA DL sub frame lengths in symbols. The SC modulation classifier experienced degraded performance in a multi-path channel and it is recommended that it is extended to perform channel equalization in future work

    Multiple UAV teams for multiple tasks

    Get PDF
    In a search and prosecute mission, multiple heterogeneous unmanned aerial vehicles UAVs that carry different resources need to perform the classify, prosecute and battle damage assessment (BDA) tasks on targets sequentially. Depending on the target resource requirement, it may be necessary to deploy a coalition of UAVs to perform the action. In this paper, we propose coalition formation algorithms that have low computational overhead to determine coalitions for the prosecute and the BDA tasks. We also develop a simultaneous strike mechanism based on Dubins curves for the UAVs to prosecute the target simultaneously. Monte-Carlo simulation results are presented to show how the algorithms work and the effect of increasing the number of BDA tasks on the mission performance. © 2009 IEEE

    BDA Enhancement Methodology using Situational Parameter Adjustments

    Get PDF
    In the context of close ground combat, the perception of Battle Damage Assessment (BDA) is closely linked with a soldier’s engagement decisions and has significant effects on the battlefield. Perceived BDA is also one of the most complex and uncertain processes facing the soldier in live combat. As a result, the modeling and simulation community has yet to adequately model the perceived BDA process in combat models. This research effort examines the BDA process from a perception standpoint and proposes a methodology to collect the pertinent data and model this perception in the Army’s current force-on-force model, CASTFOREM. A subject matter expert survey design and a method to model the BDA process as a Discrete Time Markov Chain are proposed. Bayesian inference is used to update probability distributions at each time step considering the Situational Parameters available to the soldier at the time of an assessment. Comparisons between known simulation distributions and those developed from simulated survey responses suggest an adequate number of subject matter experts to be polled

    Evolution or revolution? : the impact of the 1991 Gulf War on United States Air Force doctrine : a thesis presented in partial fulfilment of the requirements for the degree of Master of Arts in History at Massey University

    Get PDF
    One of mankind's greatest accomplishments this century has been the realisation of powered flight. Aviation has significantly changed the way that humans think, live and, for better or worse, wage war. The advent of airpower has revolutionised the conduct of warfare during the twentieth century as the development of platforms with the ability to project military power while operating above the earth's surface has opened a third dimension to armed conflict. Technological advances has made man's ascent into the air possible and it has progressively become the most important sphere of modern warfare. Airpower entails the use of the air not just as a medium for transit, as in the case of a projectile, but also for manoeuvre, deployment and surprise which includes aircraft, non-ballistic cruise missiles and more increasingly, space assets. Constrained by geography and the physical environment to a much lesser extent than surface forces, airpower enjoys speed, reach, responsiveness and perspective far exceeding those of land or seapower. Today, aircraft are able to fly unlimited distances and deliver a variety of weapons upon targets with unprecedented destructive capacity. As well as applying direct firepower, aircraft are able to protect and enhance the combat power of all other friendly forces, regardless of their operational spheres. Indeed, the versatility, range, speed, precision and lethality of contemporary airpower have made it such an integral component of modern warfare that no major military operation can be efficiently conducted without it. In many instances, airpower has demonstrated that it can be the dominant form of military power

    OPTIMIZING VLS FIRING POLICY: AN ENUMERATION OF HETEROGENEOUS SEQUENCES TO INFORM EXPENDITURE

    Get PDF
    The U.S. Navy (USN) utilizes the Vertical Launch System (VLS) to store and launch both their offensive and defensive missiles. Since the number of VLS silos on a given ship is fixed, to maximize offensive capability the USN needs to minimize the number of interceptors required to combat incoming anti-surface missiles. Current firing policies may be overly conservative and expend too many interceptors per incoming threat, which results in a substantial fraction of VLS silos dedicated to defensive missiles. Decision makers need an analysis tool to explore the trade-off between missile consumption and probability of raid annihilation (PRA) for various firing policies and would also benefit from a prescriptive algorithm to help inform missile expenditure. This thesis provides a model to optimize VLS firing policy using a set of multiple interceptor types while accounting for range limitations, travel time, multi-interceptor salvos, battle damage assessment, and range dependent probability of kill. Additionally, the thesis derives analytical results for the optimal, lowest-cost allocation of interceptors in the single interceptor case, which, in turn, generates insight into how to structure sequential salvos.N81, Washington DCEnsign, United States NavyApproved for public release. Distribution is unlimited

    Electronic Security Implications of NEC: A Tactical Battlefield Scenario

    No full text
    In [1] three principal themes are identified by the UK MoD (Ministry of Defence) in order to deliver the vision of NEC (Network Enabled Capability): Networks, People and Information. It is the security of information, which is discussed in this article. The drive towards NEC is due to many factors; one defining factor is to provide an increase in operational tempo in effect placing one ahead of their enemy in terms of acting within their OODA (Observe, Orient, Decide, Act) loop. However as technical and procedural systems are being advanced to achieve the vision of NEC, what impact does this have on the traditional information security triangle, of preserving the confidentiality, integrity and availability of information? And how does this influence current security engineering and accreditation practices, particularly in light of the proliferation problem? This article describes research conducted into answering these questions, building upon the findings of the NITEworks® [2] ISTAR (Intelligence, Surveillance, Target Acquisition and Reconnaissance) Theme studies and focusing on a tactical battlefield scenario. This scenario relates to the IFPA (Indirect Fire Precision Attack) [3] project where the efficient synchronisation of potentially numerous sources of information is required, providing real-time decisions and delivery of effects, in accordance with the requirements of NEC. It is envisaged that the IFPA systems will consist of numerous sub-systems each of which will provide a unique effecting capability to the UK army with differing levels of speed, accuracy and range
    • …
    corecore