Targeting Social Network Analysis in Counter IED Operations
Download
Author
Giles-Summers, Brandon.
Date
2011-06Advisor
Gregg, Heather
Second Reader
Everton, Sean
Metadata
Show full item recordAbstract
The purpose of this research is to provide insights to Commanders in the field for attack-the-network (AtN) operations in the fight against Improved Explosive Devices (IED). Established in 2006, the Improved Explosive Devices Defeat Organization (JIEDDO) has spent billions of dollars to execute its operational mandate: defeat the device, attack the network, and train the force. JIEDDO has excelled in training the force and defeating the device, but lagged behind in providing necessary information to facilitate attack-the-network operations. To facilitate AtN operations, JIEDDO created a Counter-IED Operation Integration Center (COIC), which provides analysis, but utilizes metrics that are not necessarily intuitive. Rather than metrics, what commanders need is a clear understanding of what attack the network means in order to create lines of operations that undermine networks that use IEDs. The goal of this thesis, therefore, is to define attack-the-network, introduce social network analysis, provide a focused discussion on how to apply social relational information to operations, determine a targeted person's relevance, provide operational commanders with a basic matrix to gain perspective on social interactions of network members, and offer case studies illuminating the difficulties inherent in network targeting.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Collections
Related items
Showing items related by title, author, creator and subject.
-
Analysis of traffic signals on a software-defined network for detection and classification of a man-in-the-middle attack
D’Orsaneo, Julian N. (Monterey, California: Naval Postgraduate School, 2017-09);Software-defined networking (SDN) has the potential to revolutionize the management capabilities of a highly distributed military communications environment. Yet, military adoption of SDN is contingent on a thorough analysis ... -
Developing Simulated Cyber-Attack Scenarios Against Virtualized Adversary Networks
Aybar, Luis; Singh, Gurminder; Shaffer, Alan (2018-03-08);Cyberspace Is recognized as a critical domain In modern warfare. The ability of military forces to maintain and secure their own operational networks, while simultaneously degrading or denying the ability of adversaries ... -
BOUNDARY SEARCH AND TRAVERSE: DETERMINING THE THRESHOLD BOUNDARY FOR INFRASTRUCTURE NETWORK RESILIENCE PROBLEMS
Flinn, Lewis C. (Monterey, CA; Naval Postgraduate School, 2020-12);Traditional network interdiction problems focus on finding the target package that yields the worst-case performance for network operations given a level of attack. However, in many cases it may be desirable to disrupt a ...