3 research outputs found

    Reviews on the Development of the Theory of Logistic Support of the Air Force of the Armed Forces of Ukraine

    Full text link
    The existing separate arms theory and the theory of the Logistics of the Armed Forces as components of military science lose their functional purpose as partial theories in modern conditions of operations (combat actions).The article proposes a unified theory of logistics of the Air Forces of the Armed Forces of Ukraine, based on the existing theories of armament and the logistics of the Armed Forces, based on the general laws and established consistent patterns, trends, principles, forms and methods of the use of the logistics of the Air Forces of the Armed Forces of Ukraine. The objective function of the logistics system of the Air Forces of the Armed Forces of Ukraine is formulated, which is to achieve compliance of the capabilities of this system with the predicted volume of tasks of the logistics. In order to implement this compliance it is necessary to ensure the convergence of requirements and capabilities at all levels of logistics management.The purpose of the article is to determine the main provisions of the new unified theory of logistics of the Air Forces of the Armed Forces of Ukraine taking into account modern forms and methods of conducting operations (combat actions), requirements concerning the formation of a unified logistics system of the Armed Forces of Ukraine and logistic support, created management bodies, forces and assets of military units (formations) logistics of the Air Forces of the Armed Forces of Ukraine.The assessment of the functioning of the Air Forces logistics system of the Armed Forces of Ukraine is proposed on the basis of the stated views on the logistics theory of the Air Forces of the Armed Forces of Ukraine by assessing the set of real capabilities of each subsystem that is the part of its structure and system as a whole. At the same time, the assessment of the quality of the logistic support of the military units (formations) of the Air Forces of the Armed Forces of Ukraine should be related to the level of implementation of the potential capabilities of the logistics system when solving problems of each subsystem at the stages of combat training, unblocking and operational deployment, preparation and conduct of operations (combat actions), restoration of combat capability of troops (forces)

    Development of the Space-time Structure of the Methodology for Modeling the Behavior of Antagonistic Agents of the Security System

    Full text link
    The rapid development of computer technology, the emergence of modern cyber threats with signs of hybridity and synergy put forward strict requirements for the economic component of national security and especially the processes of ensuring the economy cybersecurity. The cybersecurity industry is trying to meet today's requirements by introducing new and more advanced security technologies and methods, but it is believed that such a universal approach is not enough. The study is devoted to resolving the objective contradiction between the growing practical requirements for an appropriate level of cybersecurity of business process contours while increasing the number and technological complexity of cybersecurity threats. Also the fact that threats acquire hybrid features on the one hand, and imperfection, and sometimes the lack of methodology for modeling the behavior of interacting agents of security systems should be taken into account. However, this does not allow timely prediction of future actions of attackers, and as a result, determining the required level of investment in security, which will provide the required level of cybersecurity.The paper proposes the Concept of modeling the behavior of interacting agents, the basis of which is a three-level structure of modeling the subjects and business processes of the contours of the organization and security system, based on modeling the behavior of antagonistic agents. The proposed methodology for modeling the behavior of interacting agents, which is based on the Concept of behavior of antagonistic agents, allows assessing and increasing the current level of security by reducing the number of hybrid threats by 1.76 times, which reduces losses by 1.65 times and increases the time for choosing threat counteraction means by reducing the time to identify threats online by 38

    Development of the Model of the Antagonistic Agents Behavior Under a Cyber Conflict

    Full text link
    The results of the development of the model of the antagonistic agents behavior in a cyber conflict are presented. It is shown that the resulting model can be used to analyze investment processes in security systems, taking into account the assumption that investment processes are significantly influenced by the behavior of parties involved in a cyber conflict.General approaches to model development are presented. First of all, the system of concepts, assumptions and limitations is formed, within the framework of which a mathematical model of behavior must be developed. Taking this into account, the mathematical model of the conflicting agents behavior, presented in the form of algebraic and differential equations, is developed. The developed model presents both the technical characteristics of the security system and the psychological characteristics of the participants in the cyber conflict, which affect the financial characteristics of the investment processes in cybersecurity systems. A distinctive feature of the proposed model is the simultaneous consideration of the behavior of the parties to a cyber conflict not as independent parties, but as agents mutually interacting with each other. The model also makes it possible to simulate the destabilizing effect of the confrontation environment disturbances on the behavior of the conflicting parties, changing the degree of vulnerability of the cybersecurity system along various attack vectors and the level of their success.Using the developed model, simulation modeling of the interacting agents behavior in a cyber conflict is performed. The simulation results showed that even the simplest behavior strategies of the attacking side (“the weakest link”) and the defense side (“wait and see”) make it possible to ensure information security of the business process loop.The developed model of interaction between the attacker and the defender can be considered as a tool for modeling the processes of the conflicting parties behavior when implementing various investment scenarios. The simulation results enable decision-makers to receive support regarding the direction of investment in the security of the business process loop
    corecore