Adding intelligence to the Composite Warfare Commander - Distributed Dynamic Decision making paradigm.
Wright, Brian Kenneth
Jones, Carl R.
MetadataShow full item record
The Composite Warfare Commander - Distributed Dynamic Decisionmaking (CWC-DDD) paradigm is a tool for experimentation and research into the area of command, control and communications (C3) team decisionmaking process in simulated Navy engagement scenarios. It is implemented as a computer-driven interactive game among four person hierarchical teams of decisionmakers on a network of worstations. The paradigm is a compromise between controllability and realism of the experimental environment. The major drawback with the current implementation is the lack of responsiveness of the tasks (attackers) to the actions of the assets (defenders) and the environmental conditions. This thesis details ways to improve the responsiveness of the attackers and the realism of the paradigm by the implementation of a group of if-then heuristics. The five proposed heuristics are designed to make the attackers attempt to evade the defenders while still actively pursuing their mission to penetrate the center of the battle group. The heuristics are implemented in the RAINCOAT version of the paradigm using the C programming language. The heuristics are validated by several military commanders for adherence with the accepted baule doctrine of the Navy's Composite Warfare Command.
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Shing, Leslie (Monterey, California: Naval Postgraduate School, 2016-03);Networks are constantly bombarded with malicious or suspicious network traffic by attackers attempting to execute their attack operations. One of the most prevalent types of traffic observed on the network is scanning ...
Lin, Kyle Y.; Atkinson, Michael P.; Chung, Timothy H.; Glazebrook, Kevin D. (2013);This paper presents a patrol problem, where a patroller traverses a graph through edges to detect potential attacks at nodes. To design a patrol policy, the patroller needs to take into account not only the graph structure, ...
Chong, Wai Hoe; Koh, Chong Khai Roger (Monterey, CA; Naval Postgraduate School, 2018-09);Honeypots can detect new attacks and vulnerabilities like zero-day exploits, based on an attacker’s behavior. Existing honeypots, however, are typically passive in nature and poor at detecting new and complex attacks like ...