Adding intelligence to the Composite Warfare Commander - Distributed Dynamic Decision making paradigm.

Download
Author
Wright, Brian Kenneth
Date
1991-03Advisor
Sengupta, Kishore
Second Reader
Jones, Carl R.
Metadata
Show full item recordAbstract
The Composite Warfare Commander - Distributed Dynamic Decisionmaking (CWC-DDD) paradigm is a tool for
experimentation and research into the area of command, control and communications (C3) team decisionmaking process in simulated Navy engagement scenarios. It is implemented as a computer-driven interactive game among four person hierarchical teams of decisionmakers on a network of worstations. The paradigm is a compromise between controllability and realism of the experimental environment. The major drawback with the current implementation is the lack of responsiveness of the tasks (attackers) to the actions of the assets (defenders) and the environmental conditions. This thesis details ways to improve the responsiveness of the attackers and the realism of the paradigm by the implementation of a group of if-then heuristics. The five proposed heuristics are designed to make the attackers attempt to evade the defenders while still actively pursuing their mission to penetrate the center of the battle group. The heuristics are implemented in the RAINCOAT version of the paradigm using the C programming language. The heuristics are validated by several military commanders for adherence with the accepted baule doctrine of the Navy's Composite Warfare Command.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Collections
Related items
Showing items related by title, author, creator and subject.
-
An improved tarpit for network deception
Shing, Leslie (Monterey, California: Naval Postgraduate School, 2016-03);Networks are constantly bombarded with malicious or suspicious network traffic by attackers attempting to execute their attack operations. One of the most prevalent types of traffic observed on the network is scanning ... -
A Graph Patrol Problem with Random Attack Times
Lin, Kyle Y.; Atkinson, Michael P.; Chung, Timothy H.; Glazebrook, Kevin D. (2013);This paper presents a patrol problem, where a patroller traverses a graph through edges to detect potential attacks at nodes. To design a patrol policy, the patroller needs to take into account not only the graph structure, ... -
LEARNING CYBERATTACK PATTERNS WITH ACTIVE HONEYPOTS
Chong, Wai Hoe; Koh, Chong Khai Roger (Monterey, CA; Naval Postgraduate School, 2018-09);Honeypots can detect new attacks and vulnerabilities like zero-day exploits, based on an attacker’s behavior. Existing honeypots, however, are typically passive in nature and poor at detecting new and complex attacks like ...