首页> 外文期刊>Journal of defense modeling and simulatio >An agent-based modeling framework for cybersecurity in mobile tactical networks
【24h】

An agent-based modeling framework for cybersecurity in mobile tactical networks

机译:移动战术网络中基于代理的网络安全建模框架

获取原文
获取原文并翻译 | 示例
           

摘要

Mobile tactical networks facilitate communication, coordination, and information dissemination between soldiers in the field. Their increasing use provides important benefits, yet also makes them a prime enemy target. Furthermore, their dynamic, distributed, and ad-hoc nature makes them particularly vulnerable to cyber attack. Unfortunately, most existing research on cybersecurity in mobile ad-hoc networks either uses simplistic mobility models that are easier to analyze mathematically or focuses on modeling the dynamics of civilian networks.nIn this work, we present an agent-based modeling framework to study malware spread in mobile tactical networks. Our framework includes military-inspired models of hierarchical command structure, unit movement, communication over short-range radio, self-propagating malware, and cyber defense mechanisms. We implement several example scenarios representing military units engaged in tactical operations on a synthetic battlefield. Finally, we conduct a case study, using agent-based simulation to analyze the impact of hierarchy and cybersecurity policies on malware spread. Our results support the claim that agent-based modeling is particularly well-suited for representing the complex organizational and spatial structures inherent to military operations, and we urge others to incorporate the key elements of our framework into existing modeling tools when performing studies of cyber attacks on mobile tactical networks and corresponding cybersecurity measures.
机译:机动战术网络有助于实地士兵之间的通信,协调和信息传播。不断增加的使用量不仅带来重要的好处,而且使它们成为主要的敌人目标。此外,它们的动态,分布式和即席性质使它们特别容易受到网络攻击。不幸的是,大多数现有的有关移动自组织网络中网络安全的研究要么使用简单的移动性模型(更易于数学分析),要么着重于对民用网络的动态建模。n在这项工作中,我们提出了一种基于代理的建模框架来研究恶意软件的传播在移动战术网络中。我们的框架包括受军事启发的模型,该模型具有层次化的命令结构,单位移动,通过短距离无线电的通信,自我传播的恶意软件以及网络防御机制。我们实现了几个示例场景,这些场景代表了在合成战场上从事战术行动的军事单位。最后,我们使用基于代理的模拟进行案例研究,以分析层次结构和网络安全策略对恶意软件传播的影响。我们的结果支持这样一种说法,即基于代理的建模特别适合于表示军事行动固有的复杂组织和空间结构,并且我们敦促其他人在进行网络攻击研究时将我们框架的关键要素纳入现有的建模工具中在移动战术网络和相应的网络安全措施上。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号