NETWORK SHAPING
Download
Author
Barrow, Howard J., III
Date
2019-06Advisor
Alderson, David L., Jr.
Eisenberg, Daniel
Second Reader
Appleget, Jeffrey A.
Metadata
Show full item recordAbstract
Network flow problems can be used to address any of the phases of the military joint operation model, but they do a poor job with the transition from interdiction to restoration activities. Previous research identifies methods to find the best- and worst-case scenarios for a given network, but do not show how interdiction activities affect restoration activities (or vice versa) and/or how we can make sense of these interactions in military planning. We develop a method of metagraph analysis to study various performance thresholds in a flow network and identify ways to interdict and restore systems not previously discussed in the literature. The presence of states not identified by traditional network flow problems indicates that, from an operational planning perspective, alternatives exist that may improve the attack and defense of a flow network. This result suggests that traditional interdiction and restoration methods prescribe only a subset of joint operational activities, and military operations would benefit from expanding analysis to consider more options. We define at least two ways to identify these options and conclude that there are system states not identified by traditional methods that can inform new ways to shape flow networks for military operations.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Collections
Related items
Showing items related by title, author, creator and subject.
-
Homeland Security Affairs Journal, Volume II - 2006: Issue 2, July
Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2006-07);July 2006. The July 2006 issue of Homeland Security Affairs offers articles about risk perception, domestic right wing extremist groups, social network analysis, and the impact of foreign policy on homeland security. It ... -
Cyber System Assurance through Improved Network Anomaly Modeling and Detection
Bollmann, Chad A. (Monterey, California: Naval Postgraduate SchoolMonterey, California. Naval Postgraduate School, 2019-12); NPS-19-N039-AThe objectives of this work were to investigate the source of the dual natures of network traffic (i.e., Gaussian and alpha-stable) in order prove the merit of further development, improvement, and application of non-parametric ... -
Cyber System Assurance through Improved Network Anomaly Modeling and Detection
Bollmann, Chad A. (Monterey, California: Naval Postgraduate SchoolMonterey, California. Naval Postgraduate School, 2019-12); NPS-19-N039-AThe objectives of this work were to investigate the source of the dual natures of network traffic (i.e., Gaussian and alpha-stable) in order prove the merit of further development, improvement, and application of non-parametric ...