期刊文献+

基于人机结合的网络电磁空间对抗试验模式

Experimental Mode of Cyberspace Confrontation Based on Human-Machine Cooperation
下载PDF
导出
摘要 总结了C4ISR系统仿真试验方法的功能、原理与特点;基于网络电磁空间对抗能力需求,分析了网络电磁空间对抗试验的过程,提出了一种人机结合的对抗试验模式。该模式建立了基于动态自适应的观察—判断—决策—行动(OODA)攻防过程模型,定义了对抗试验过程中攻击者与防御者角色,以及各类角色的能力等级,构建了对抗试验中各类角色实现框架。该模式可为网络电磁空间对抗试验的组织开展提供理论支撑。 The function, principle and characteristics of C4ISR system simulation experimental method are concluded. The experimental courses of the Cyberspace confrontation are analyzed based on the capacity requirement of the Cyberspace confrontation. An experimental mode of hu- man-machine cooperation confrontation is proposed. The mode is established based on a dynamic adaptive observe, orient, decide, and act (OODA) attack-defense process model. The human roles of the attacker and the defender in the process, and the capacity levels of those roles are de- fined. Finally, the implementation framework of each role is constructed. The experimental mode can provide theoretical guidance for the Cyberspace confrontation experiment.
作者 周芳 朱双华
出处 《指挥信息系统与技术》 2014年第4期5-9,30,共6页 Command Information System and Technology
基金 国防"973"计划资助项目
关键词 网络电磁空间对抗 试验模式 人机结合 观察—判断—决策—行动 攻防过程 Cyberspace confrontation experimental mode human-machine cooperation observe, orient, decide, and act (OODA) attack-defense process
  • 相关文献

参考文献10

  • 1U.S. Government via Department of Homeland Secur- ity. The national strategy to secure Cyberspace[R]. Washington D. C. , The Whitehouse, 2003. 被引量:1
  • 2Department of the Army. Cyberspace operations con- cept capablility plan 2016-2028, TRADOC Pamphlet 525-7-8[R]. Washington D. C. :Department of the Ar- my,2010. 被引量:1
  • 3United States AirForce. Cyberspace operations, air force doctrine document 3-12[R]. Washington D. C.: Le May Center for Doctrine Development and Educa- tion, 2010. 被引量:1
  • 4毛少杰,居真奇,李玉萍,等.C^4ISR系统仿真试验技术[M].北京:军事科学出版社,2011. 被引量:6
  • 5周光霞,孙欣.赛博空间对抗[J].指挥信息系统与技术,2012,3(2):6-10. 被引量:25
  • 6Chairman of the Joint Chiefs of Staff. National militar- y strategy for Cyberspace operations[R]. Washington D.C...DoD,2006. 被引量:1
  • 7Kuhl M E,Kistner J, Costantini K, et al. Cyberattack modeling and simulation for network security analysis [C] // Proeeedings of the 2007 Winter Simulation Con- ference. Washington D. C. :IEEE, 2007 : 1180-1188. 被引量:1
  • 8Rowe N C. A model of deception during Cyberattacks on information Systems [C]//Proceedings of IEEE First Symposium on Multi-Agent Security and Surviv- ability. [S.l. ] :IEEE,2004:21-30. 被引量:1
  • 9李耀东,崔霞,戴汝为.综合集成研讨厅的理论框架、设计与实现[J].复杂系统与复杂性科学,2004,1(1):27-32. 被引量:64
  • 10操龙兵,戴汝为.开放复杂系统智能系统:基础、概念、分析、设计与实施[M].北京:人民邮电出版社,2008:1-19. 被引量:1

二级参考文献16

  • 1戴汝为,王珏.关于智能系统的综合集成[J].科学通报,1993,38(14):1249-1256. 被引量:52
  • 2戴汝为,王珏.巨型智能系统的探讨[J].自动化学报,1993,19(6):645-655. 被引量:39
  • 3[1]Waldrop M. 复杂:诞生于秩序与混沌边缘的科学[M]. 陈玲,译. 北京: 三联书店, 1997. 被引量:1
  • 4[4]Horgan J. From complexity to perplexity[J]. Scientific American, 1995, 272: 74-79. 被引量:1
  • 5钱学森.创建系统学.太原:山西科学技术出版社,2002. 被引量:4
  • 6The President of the Unite States. The national strategy to secure Cyberspace[R].Washington,DC:the White House,2003. 被引量:1
  • 7Chairman of the Joint Chiefs of Staff. National military strategy for Cyberspace operations (NMS-CO)[R].Washington,D.C.:US DoD,2006. 被引量:1
  • 8The President of the Unite States. Cyberspace policy review: assuring a trusted and resilient information and communications infrastructure[R].Washington,DC:the White House,2009. 被引量:1
  • 9United States Army Training and Doctrine Command. The United States Army's Cyberspace operations concept capability plan 2016-2028[R].Washington,D.C.:US DoD,2010. 被引量:1
  • 10LeMay Center for Doctrine Development and Education. Cyberspace operations[R].Washington,D.C.:The United States Air Force,2010. 被引量:1

共引文献91

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部