32,235 research outputs found

    Agent Based Simulation Seas Evaluation of DoDAF Architecture

    Get PDF
    With Department of Defense (DoD) weapon systems being deeply rooted in the command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR) structure, it is necessary for combat models to capture C4ISR effects in order to properly assess military worth. Unlike many DoD legacy combat models, the agent based model System Effectiveness and Analysis Simulation (SEAS) is identified as having C4ISR analysis capabilities. In lieu of requirements for all new DoD C4ISR weapon systems to be placed within a DoD Architectural Framework (DoDAF), investigation of means to export data from the Framework to the combat model SEAS began. Through operational, system, and technical views, the DoDAF provides a consistent format for new weapon systems to be compared and evaluated. Little research has been conducted to show how to create an executable model of an actual DoD weapon system described by the DoDAF. In collaboration with Systems Engineering masters student Captain Andrew Zinn, this research identified the Aerospace Operation Center (AOC) weapon system architecture, provided by the MITRE Corp., as suitable for translation into SEAS. The collaborative efforts lead to the identification and translation of architectural data products to represent the Time Critical Targeting (TCT) activities of the AOC. A comparison of the AOC weapon system employing these TCT activities with an AOC without TCT capabilities is accomplished within a Kosovo-like engagement (provided by Space and Missile Center Transformations Directorate). Results show statistically significant differences in measures of effectiveness (MOEs) chosen to compare the systems. The comparison also identified the importance of data products not available in this incomplete architecture and makes recommendations for SEAS to be more receptive to DoDAF data products

    Post-Westgate SWAT : C4ISTAR Architectural Framework for Autonomous Network Integrated Multifaceted Warfighting Solutions Version 1.0 : A Peer-Reviewed Monograph

    Full text link
    Police SWAT teams and Military Special Forces face mounting pressure and challenges from adversaries that can only be resolved by way of ever more sophisticated inputs into tactical operations. Lethal Autonomy provides constrained military/security forces with a viable option, but only if implementation has got proper empirically supported foundations. Autonomous weapon systems can be designed and developed to conduct ground, air and naval operations. This monograph offers some insights into the challenges of developing legal, reliable and ethical forms of autonomous weapons, that address the gap between Police or Law Enforcement and Military operations that is growing exponentially small. National adversaries are today in many instances hybrid threats, that manifest criminal and military traits, these often require deployment of hybrid-capability autonomous weapons imbued with the capability to taken on both Military and/or Security objectives. The Westgate Terrorist Attack of 21st September 2013 in the Westlands suburb of Nairobi, Kenya is a very clear manifestation of the hybrid combat scenario that required military response and police investigations against a fighting cell of the Somalia based globally networked Al Shabaab terrorist group.Comment: 52 pages, 6 Figures, over 40 references, reviewed by a reade

    DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments

    Get PDF
    With the growing popularity of cloud computing, the exploitation of possible vulnerabilities grows at the same pace; the distributed nature of the cloud makes it an attractive target for potential intruders. Despite security issues delaying its adoption, cloud computing has already become an unstoppable force; thus, security mechanisms to ensure its secure adoption are an immediate need. Here, we focus on intrusion detection and prevention systems (IDPSs) to defend against the intruders. In this paper, we propose a Distributed, Collaborative, and Data-driven Intrusion Detection and Prevention system (DCDIDP). Its goal is to make use of the resources in the cloud and provide a holistic IDPS for all cloud service providers which collaborate with other peers in a distributed manner at different architectural levels to respond to attacks. We present the DCDIDP framework, whose infrastructure level is composed of three logical layers: network, host, and global as well as platform and software levels. Then, we review its components and discuss some existing approaches to be used for the modules in our proposed framework. Furthermore, we discuss developing a comprehensive trust management framework to support the establishment and evolution of trust among different cloud service providers. © 2011 ICST

    Towards a Common Language of Infrastructure Interdependency

    Get PDF
    Infrastructure systems can exist interdependently with one another either by design, necessity or evolution. There is evidence that interdependencies can be the source of emergent benefits and hazards, and therefore there is value in their identification and management. Achieving this requires collaboration and communication between infrastructure stakeholders across all relevant sectors. Recognising, developing and sharing multiple understandings of infrastructure interdependency and dependency will facilitate a wide range of multi-disciplinary and cross-sectorial work and support productive stakeholder dialogues. This paper therefore aims to initiate discussion around the nature of infrastructure interdependency and dependency in order to establish the basis of a useful, coherent and complete conceptual taxonomy. It sets out an approach for locating this taxonomy and language within a framework of commonplace stakeholder viewpoints. The paper looks at the potential structural arrangements of infrastructure interdependencies before exploring the qualitative ways in which the relationships can be characterised. This builds on the existing body of knowledge as well as experience through case studies in developing an Interdependency Planning and Management Framework for Infrastructure

    Management and architecture click: The FAD(E)E Framework.

    Get PDF
    Enterprises are living things. They constantly need to be (re-)architected in order to achieve the necessary agility, alignment and integration. This paper gives a high-level overview of how companies can go about doing 'enterprise architecture' in the context of both the classic (isolated) enterprise and the Extended Enterprise. By discussing the goals that are pursued in an enterprise architecture effort we reveal some basic requirements that can be put on the process of architecting the enterprise. The relationship between managing and architecting the enterprise is discussed and clarified in the FAD(E)E, the Framework for the Architectural Development of the (Extended) Enterprise.Management; Architecture; Framework;

    Model-based dependability analysis : state-of-the-art, challenges and future outlook

    Get PDF
    Abstract: Over the past two decades, the study of model-based dependability analysis has gathered significant research interest. Different approaches have been developed to automate and address various limitations of classical dependability techniques to contend with the increasing complexity and challenges of modern safety-critical system. Two leading paradigms have emerged, one which constructs predictive system failure models from component failure models compositionally using the topology of the system. The other utilizes design models - typically state automata - to explore system behaviour through fault injection. This paper reviews a number of prominent techniques under these two paradigms, and provides an insight into their working mechanism, applicability, strengths and challenges, as well as recent developments within these fields. We also discuss the emerging trends on integrated approaches and advanced analysis capabilities. Lastly, we outline the future outlook for model-based dependability analysis
    corecore