Decision support model for effects estimation and proportionality assessment for targeting in cyber operations

被引:9
作者
Maathuis, C. [1 ,2 ,3 ,4 ]
Pieters, W. [1 ]
van den Berg, J. [1 ]
机构
[1] Delft Univ Technol, Jaffalaan 5, NL-2628 BX Delft, Netherlands
[2] TNO Mil Operat, Oude Waaldorperweg 63, NL-2597 AK The Hague, Netherlands
[3] Netherlands Def Acad, De la Reyweg 120, NL-4818 BB Breda, Netherlands
[4] Open Univ Netherlands, Valkenburgerweg 177, NL-6419 AT Heerlen, Netherlands
关键词
Cyber operations; Cyber warfare; Cyber weapons; Fuzzy logic; Targeting;
D O I
10.1016/j.dt.2020.04.007
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Cyber operations are relatively a new phenomenon of the last two decades. During that period, they have increased in number, complexity, and agility, while their design and development have been processes well kept under secrecy. As a consequence, limited data(sets) regarding these incidents are available. Although various academic and practitioner public communities addressed some of the key points and dilemmas that surround cyber operations (such as attack, target identification and selection, and collateral damage), still methodologies and models are needed in order to plan, execute, and assess them in a responsibly and legally compliant way. Based on these facts, it is the aim of this article to propose a model that i)) estimates and classifies the effects of cyber operations, and ii) assesses proportionality in order to support targeting decisions in cyber operations. In order to do that, a multi-layered fuzzy model was designed and implemented by analysing real and virtual realistic cyber operations combined with interviews and focus groups with technical military experts. The proposed model was evaluated on two cyber operations use cases in a focus group with four technical military experts. Both the design and the results of the evaluation are revealed in this article. (c) 2020 China Ordnance Society. Production and hosting by Elsevier B.V. on behalf of KeAi Communications Co. This is an open access article under the CC BY-NC-ND license (http:// creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页码:352 / 374
页数:23
相关论文
共 79 条
[1]   Improving risk assessment model of cyber security using fuzzy logic inference system [J].
Alali, Mansour ;
Almogren, Ahmad ;
Hassan, Mohammad Mehedi ;
Rassan, Iehab A. L. ;
Bhuiyan, Md Zakirul Alam .
COMPUTERS & SECURITY, 2018, 74 :323-339
[2]  
[Anonymous], 2013, JOINT STAFF 3 60 JOI
[3]  
[Anonymous], 2018, JOINT STAFF 3 12
[4]  
[Anonymous], 2003, Joint Staff 2-01
[5]  
[Anonymous], 2013, APPL FUZZY LOGIC RIS
[6]  
[Anonymous], 2016, 2016 INT C CYB CONFL
[7]  
[Anonymous], 2005, Fuzzy expert systems and fuzzy reasoning
[8]  
Azimirad E., INT J ADV INTELL INF, V1, P57
[9]   Spatial Composition Techniques and Sound Spatialisation Technologies [J].
Baalman, Marije A. J. .
ORGANISED SOUND, 2010, 15 (03) :209-218
[10]  
Baturone I., 2000, Microelectronic Design of Fuzzy Logic-Based Systems, V1st ed.