تعداد نشریات | 31 |
تعداد شمارهها | 738 |
تعداد مقالات | 6,956 |
تعداد مشاهده مقاله | 9,883,689 |
تعداد دریافت فایل اصل مقاله | 6,707,792 |
Toward Cyber Command and Control System Architecture Using Data-Driven Analysis Solutions | ||
Computational Sciences and Engineering | ||
مقاله 7، دوره 2، شماره 1، تیر 2022، صفحه 53-68 اصل مقاله (743.51 K) | ||
نوع مقاله: Original Article | ||
شناسه دیجیتال (DOI): 10.22124/cse.2022.19924.1017 | ||
نویسندگان | ||
Ali Pourghaffari* 1؛ Rahim Asghari2؛ Ali Jabbar Rashidi1 | ||
1Malek Ashtar University of Technology, Tehran, Iran. | ||
2Department of Electrical and Computer Engineering, Malek- Ashtar University, Tehran, Iran. | ||
چکیده | ||
Today, countries' sovereignty and national security strongly rely on the reliable operation and continuous monitoring of information technology infrastructure against security threats. As a result, the importance of comprehensive command and control and consistent oversight of IT security has become increasingly apparent in recent years. Modern command and control systems are dynamically and continuously monitoring and analyzing their mission space. This scope of operations increases the need to create a coherent and integrated structure in developing a system based on a well-defined architecture. Best of over knowledge has been little discussion on how to design command and control systems better. In this paper, we proposed architecture using data analysis solutions in cyber command and control missions. The proposed architecture is based on service-oriented and layered architecture to activate the quality features of interoperability, distributability, heterogeneous development, and scalability. Also, a prototype has been implemented to demonstrate its applicability through solution architecture. The online survey questionnaire validates the proposed architecture and its implementation. | ||
کلیدواژهها | ||
Command and Control؛ Information System Architecture؛ Data Analysis؛ Information Security | ||
مراجع | ||
[1] P. S. John McIlvain, Jason D. Christopher, Cliff Glantz, Fowad Muneer, John Fry, Laura Ritter, "OIL AND NATURAL GAS SUBSECTOR CYBERSECURITY CAPABILITY MATURITY MODEL (ONG-C2M2) 1.1," 2014. [2] B. Su, H. Zhao, T. Qi, X. Liu, and R. Yu, "Research on Architecture of Intelligent Command and Control System," in 2019 International Conference on Virtual Reality and Intelligent Systems (ICVRIS), pp. 362–364, 2019. [3] P. Kalarani and S. S. Brunda, "A survey on efficient data mining techniques for network intrusion detection system (IDS)," Int. J. Adv. Res. Comput. Commun. Eng., vol. 3, no. 9, pp. 8028–8031, 2014. [4] D. A. Eisenberg, D. L. Alderson, M. Kitsak, A. Ganin, and I. Linkov, "Network foundation for command and control (C2) systems: literature review," IEEE Access, vol. 6, pp. 68782–68794, 2018. [5] D. S. Alberts and R. E. Hayes, "Power to the edge: Command... control... in the information age," 2003. [6] D. S. Alberts, R. K. Huber, and J. Moffat, "NATO NEC C2 maturity model," 2010. [7] N. A. Stanton et al., "Development of a generic activities model of command and control," Cogn. Technol. Work, vol. 10, no. 3, pp. 209–220, 2008. [8] D. P. Jenkins, G. H. Walker, N. A. Stanton, and P. M. Salmon, "Command and Control: The Sociotechnical Perspective," Ashgate Publishing, Ltd., 2012. [9] D. S. Alberts and R. E. Hayes, "Understanding command and control," 2006. [10] I. Linkov et al., "Measurable resilience for actionable policy." ACS Publications, 2013. [11] B. Petrenj, E. Lettieri, and P. Trucco, "Information sharing and collaboration for critical infrastructure resilience--a comprehensive review on barriers and emerging capabilities," Int. J. Crit. infrastructures, vol. 9, no. 4, pp. 304–329, 2013. [12] M. Grabowski and K. H. Roberts, "Reliability seeking virtual organizations: Challenges for high reliability organizations and resilience engineering," Saf. Sci., vol. 117, pp. 512–522, 2019. [13] L. Northrop et al., "Ultra-large-scale systems: The software challenge of the future," 2006. [14] L. Bass, P. Clements, and R. Kazman, "Software architecture in practice, third edition.", Addison-Wesley Professional, 2003. [15] H. Cervantes and R. Kazman, "Designing software architectures: a practical approach." Addison-Wesley Professional, 2016. [16] P. Clements, D. Garlan, R. Little, R. Nord, and J. Stafford, "Documenting software architectures: Views and beyond," Proceedings - International Conference on Software Engineering. pp. 740–741, 2003, doi: 10.1109/icse.2003.1201264. [17] A. W. Brown, "Large-scale, component-based development,", Prentice Hall PTR Englewood Cliffs, vol. 1,2000. [18] G. Schmutz, D. Liebhart, and P. Welkenbach, "Service-oriented architecture: an integration blueprint: a real-world SOA strategy for the integration of heterogeneous enterprise systems: successfully implement your own enterprise integration architecture using the trivadis integration architecture blu." Packt Publishing Ltd, 2010. [19] D. A. Chappell, "Enterprise service bus." O'Reilly Media, Inc.," 2004. [20] J. Lee, K. Siau, and S. Hong, "Enterprise Integration with ERP and EAI," Commun. ACM, vol. 46, no. 2, pp. 54–60, 2003. [21] A. Dekker, "A taxonomy of network centric warfare architectures," 2008. [22] A. K. Cebrowski and J. J. Garstka, "Network-centric warfare: Its origin and future," in US Naval Institute Proceedings, 1998, vol. 124, no. 1, pp. 28–35. [23] D. Laney and others, "3D data management: Controlling data volume, velocity and variety," META Gr. Res. note, vol. 6, no. 70, p. 1, 2001. [24] D. S. Alberts, "The agility advantage: a survival guide for complex enterprises and endeavors," 2011. [25] H. Huang, N. Ahmed, and P. Karthik, "On a new type of denial of service attack in wireless networks: The distributed jammer network," IEEE Trans. Wirel. Commun., vol. 10, no. 7, pp. 2316–2324, 2011. [26] M. A. Mohamed and S. Pillutla, "Cloud computing: a collaborative green platform for the knowledge society," Vine, 2014. [27] J. Kadtke, I. I. Wells, and others, "Policy challenges of accelerating technological change: Security policy and strategy implications of parallel scientific revolutions," 2014. [28] B. Krekel, P. Adams, and G. Bakos, "Occupying the information high ground: Chinese capabilities for computer network operations and cyber espionage," Int. J. Comput. Res., vol. 21, no. 4, p. 333, 2014. [29] [29] N. Buchler, L. Marusich, J. Z. Bakdash, S. Sokoloff, and R. Hamm, "The warfighter associate: objective and automated metrics for mission command," 2013. [30] [30] E. I. Neaga and M. Henshaw, "A stakeholder-based analysis of the benefits of network enabled capability," Def. Secur. Anal., vol. 27, no. 2, pp. 119–134, 2011. [31] R. Oosthuizen and L. Pretorius, “Modelling of command and control agility,” 2014. [32] L. Dodd, M. Lloyd, and G. Markham, "Functional impacts of network-centric operations on future C2," 2005. [33] R. Oosthuizen and L. Pretorius, "Assessing command and control system vulnerabilities in underdeveloped, degraded and denied operational environments," 2013. [34] [34] M. Mihailescu, H. Nguyen, and M. R. Webb, "Enhancing wireless communications with software defined networking," in 2015 Military Communications and Information Systems Conference (MilCIS), pp. 1–6, 2015. [35] V. Chan et al., "Future heterogeneous networks". National Science Foundation, 2011. [36] M. Fidjeland and B. K. Reitan, "Web-oriented architecture: network-based defence development made easier," 2009. [37] T. Zhang, "Optimization of spectrum allocation in cognitive radio and dynamic spectrum access networks," 2012. [38] F. Junyent, V. Chandrasekar, D. McLaughlin, E. Insanic, and N. Bharadwaj, "The CASA Integrated Project 1 networked radar system," J. Atmos. Ocean. Technol., vol. 27, no. 1, pp. 61–78, 2010. [39] M. Haghnevis, R. G. Askin, and D. Armbruster, "An agent-based modeling optimization approach for understanding behavior of engineered complex adaptive systems," Socioecon. Plann. Sci., vol. 56, pp. 67–87, 2016. [40] J. Wang et al., "Toward a resilient holistic supply chain network system: Concept, review and future direction," IEEE Syst. J., vol. 10, no. 2, pp. 410–421, 2014. [41] E. Alfnes and J. O. Strandhagen, "Enterprise design for mass customisation: The control model methodology," Int. J. Logist., vol. 3, no. 2, pp. 111–125, 2000. [42] M. Haghnevis, "An agent-based optimization framework for engineered complex adaptive systems with application to demand response in electricity markets," Arizona State University, 2013. [43] J. Crebolder, S. Pronovost, and G. Lai, "Investigating virtual social networking in the military domain," in Proceedings of the 14th International Command and Control Research and Technology Symposium, Washington, DC, June, pp. 15–17, 2009. [44] H. Joglar-Espinosa, I. Seccatore-Gomez, and J. Lamas-Barrientos, "Testing edge versus hierarchical c2 organizations using the elicit platform and common identification picture tool," 2011. [45] D. K. Brown, "More than a capable mariner: Meeting the challenges of command at sea—Views from the bridge," Capella University, 2012. [46] K. Chan, J.-H. Cho, and S. Adali, "A trust based framework for information sharing behavior in command and control environments," 2013. [47] M. Persson and A. Worm, "Information experimentation in command and control," 2002. [48] B. Solaiman, E. Bosse, L. Pigeon, D. Gueriot, and M. C. Florea, "A conceptual definition of a holonic processing framework to support the design of information fusion systems," Inf. Fusion, vol. 21, pp. 85–99, 2015. [49] M. Joblin, S. Apel, and W. Mauerer, "Evolutionary trends of developer coordination: A network approach," Empir. Softw. Eng., vol. 22, no. 4, pp. 2050–2094, 2017. [50] N. A. Stanton et al., "Experimental studies in a reconfigurable C4 test-bed for network enabled capability," 2006. [51] T. Gregory, "Traveling of requirements in the development of packaged software: An investigation of work design and uncertainty," 2014. [52] J. M. Schraagen, M. H. in 't Veld, and L. De Koning, "Information sharing during crisis management in hierarchical vs. network teams," J. contingencies Cris. Manag., vol. 18, no. 2, pp. 117–127, 2010. [53] K. Chan, J.-H. Cho, and A. Swami, "Impact of trust on security and performance in tactical networks," 2013. [54] K. Chan, R. Pressley, B. Rivera, and M. Ruddy, "Integration of communication and social network modeling platforms using elicit and the wireless emulation laboratory," 2011. [55] K. S. Chan and N. Ivanic, "Connections between communications and social networks using ELICIT," 2010. [56] S. Noel et al., "Analyzing mission impacts of cyber actions (AMICA)," 2015. [57] Y. Feng, B. Xiu, and Z. Liu, "A dynamic optimization model on decision-makers and decision-layers structure (DODDS) in C2-organization," Comput. Model. New Technol, vol. 18, no. 2, pp. 192–198, 2014. [58] N. A. Stanton et al., "A reconfigurable C4 testbed for experimental studies into network enabled capability," 2005. [59] É. Bossé and B. Solaiman, Information fusion and analytics for big data and IoT. Artech House, 2016. [60] H. T. Tran and D. N. Mavris, "A system-of-systems approach for assessing the resilience of reconfigurable command and control networks," in AIAA Infotech@ Aerospace, p. 640, 2015. [61] H. T. Tran, J. C. Domercant, and D. Mavris, "Trade-offs between command and control architectures and force capabilities using battlespace awareness," 2014. [62] G. H. Walker et al., "From ethnography to the EAST method: A tractable approach for representing distributed cognition in Air Traffic Control," Ergonomics, vol. 53, no. 2, pp. 184–197, 2010. [63] G. H. Walker et al., "Using an integrated methods approach to analyse the emergent properties of military command and control," Appl. Ergon., vol. 40, no. 4, pp. 636–647, 2009. [64] N. A. Stanton, L. Rothrock, C. Harvey, and L. Sorensen, "Investigating information-processing performance of different command team structures in the NATO Problem Space," Ergonomics, vol. 58, no. 12, pp. 2078–2100, 2015. [65] N. A. Stanton, G. H. Walker, and L. J. Sorensen, "It’s a small world after all: contrasting hierarchical and edge networks in a simulated intelligence analysis task,” Ergonomics, vol. 55, no. 3, pp. 265–281, 2012. [66] D. M. Wynn, M. Ruddy, and M. E. Nissen, “Command & control in virtual environments: Tailoring software agents to emulate specific people,” 2010. [67] A. Wong-Jiru, “Graph theoretical analysis of network centric operations using multi-layer models,” 2006. [68] G. H. Walker et al., “Analysing network enabled capability in civilian work domains: a case study from air traffic control,” 2005. [69] J. de Visser, P. A. Wieringa, J. Moss, and Y. Xiao, “Supporting distributed planning in a dynamic environment: An observational study in operating room management,” Hum. Decis. Mak. Control, 2002. [70] U.S. Department of Defense, “The DoDAF Architecture Framework Version 2.02 - [Online], Access year: 2021.” https://dodcio.defense.gov/library/dod-architecture-framework/. [71] “The FINSEC Reference Architecture (RA) - [Online], Access year: 2021.” https://finsecurity.eu/. [72] The Open Group, “Architecture Framework TOGAFTM Version 9.2 - [Online Version], , Access year: 2021.” https://pubs.opengroup.org/architecture/togaf91-doc/arch/chap03.html. | ||
آمار تعداد مشاهده مقاله: 667 تعداد دریافت فایل اصل مقاله: 736 |