Visualization for cyber security command and control

Author(s):  
John T. Langton ◽  
Brent Newey ◽  
Paul R. Havig
2019 ◽  
pp. 1050-1079
Author(s):  
J. Sigholm

Emerging information and communications technology has had significant importance for military operations during the last decades. Development within such technology areas as sensors, computers, and wireless communications has allowed for faster and more efficient collection, transmission, storage, processing, analysis, and distribution of data. This has led to new and improved military capabilities within command and control, intelligence, targeting, and logistics. However, the increased complexity and interdependencies of networked systems, the continuously growing amounts of data, changing non-technical requirements, and evolving adversary threats makes upholding cyber security in command and control systems a challenging task. Although some best-practice approaches have been developed, finding good solutions for protecting critical infrastructure and important information assets is still an open research question requiring an interdisciplinary approach. This chapter describes recent developments within emerging network technology for command and control, and suggests focus areas where further research is needed in order to attain sufficient operational effect from the employed systems. While a gradual and evolutionary progress of military cyber security has been seen, a long-term commitment is required within such areas as procurement, standardization, training, doctrinal, and legal development, in order to achieve military utility of command and control systems.


Information ◽  
2020 ◽  
Vol 11 (11) ◽  
pp. 516
Author(s):  
Shingo Yamaguchi

This paper proposes a new kind of cyber-security system, named Botnet Defense System (BDS), which defends an Internet of Things (IoT) system against malicious botnets. The concept of BDS is “Fight fire with fire”. The distinguishing feature is that it uses white-hat botnets to fight malicious botnets. A BDS consists of four components: Monitor, Strategy Planner, Launcher, and Command and Control (C&C) server. The Monitor component watches over a target IoT system. If the component detects a malicious botnet, the Strategy Planner component makes a strategy against the botnet. Based on the planned strategy, the Launcher component sends white-hat worms into the IoT system and constructs a white-hat botnet. The C&C server component commands and controls the white-hat botnet to exterminate the malicious botnet. Strategy studies are essential to produce intended results. We proposed three basic strategies to launch white-hat worms: All-Out, Few-Elite, and Environment-Adaptive. We evaluated BDS and the proposed strategies through the simulation of agent-oriented Petri net model representing the battle between Mirai botnets and the white-hat botnets. This result shows that the Environment-Adaptive strategy is the best and reduced the number of needed white-hat worms to 38.5% almost without changing the extermination rate for Mirai bots.


Author(s):  
J. Sigholm

Emerging information and communications technology has had significant importance for military operations during the last decades. Development within such technology areas as sensors, computers, and wireless communications has allowed for faster and more efficient collection, transmission, storage, processing, analysis, and distribution of data. This has led to new and improved military capabilities within command and control, intelligence, targeting, and logistics. However, the increased complexity and interdependencies of networked systems, the continuously growing amounts of data, changing non-technical requirements, and evolving adversary threats makes upholding cyber security in command and control systems a challenging task. Although some best-practice approaches have been developed, finding good solutions for protecting critical infrastructure and important information assets is still an open research question requiring an interdisciplinary approach. This chapter describes recent developments within emerging network technology for command and control, and suggests focus areas where further research is needed in order to attain sufficient operational effect from the employed systems. While a gradual and evolutionary progress of military cyber security has been seen, a long-term commitment is required within such areas as procurement, standardization, training, doctrinal, and legal development, in order to achieve military utility of command and control systems.


Sign in / Sign up

Export Citation Format

Share Document