当前位置: X-MOL 学术Def. Technol. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Decision support model for effects estimation and proportionality assessment for targeting in cyber operations
Defence Technology ( IF 5.0 ) Pub Date : 2020-04-11 , DOI: 10.1016/j.dt.2020.04.007
C. Maathuis , W. Pieters , J. van den Berg

Cyber operations are relatively a new phenomenon of the last two decades. During that period, they have increased in number, complexity, and agility, while their design and development have been processes well kept under secrecy. As a consequence, limited data(sets) regarding these incidents are available. Although various academic and practitioner public communities addressed some of the key points and dilemmas that surround cyber operations (such as attack, target identification and selection, and collateral damage), still methodologies and models are needed in order to plan, execute, and assess them in a responsibly and legally compliant way. Based on these facts, it is the aim of this article to propose a model that i)) estimates and classifies the effects of cyber operations, and ii) assesses proportionality in order to support targeting decisions in cyber operations. In order to do that, a multi-layered fuzzy model was designed and implemented by analysing real and virtual realistic cyber operations combined with interviews and focus groups with technical – military experts. The proposed model was evaluated on two cyber operations use cases in a focus group with four technical – military experts. Both the design and the results of the evaluation are revealed in this article.



中文翻译:

用于网络运营目标的效果评估和比例评估的决策支持模型

网络运营是最近二十年来相对较新的现象。在此期间,它们的数量,复杂性和敏捷性都有所增加,而其设计和开发却一直处于保密状态。结果,关于这些事件的有限的数据(集合)是可用的。尽管各种学术界和从业者公共社区都解决了围绕网络运营的一些关键点和难题(例如攻击,目标识别和选择以及附带损害),但仍需要方法和模型来计划,执行和评估它们以负责任和合法的方式。基于这些事实,本文的目的是提出一个模型,该模型i))估算并分类网络运营的影响,ii)评估比例性,以支持网络运营中的针对性决策。为了做到这一点,设计了多层模糊模型,通过分析真实和虚拟的现实网络操作,并与技术专家和军事专家进行访谈和焦点小组相结合,设计并实现了该模型。在由四名军事技术专家组成的焦点小组中,对两个网络运营用例进行了评估,对模型进行了评估。本文介绍了设计和评估结果。在由四名军事技术专家组成的焦点小组中,对两个网络运营用例进行了评估,提出了该模型。本文介绍了设计和评估结果。在由四名军事技术专家组成的焦点小组中,对两个网络运营用例进行了评估,对模型进行了评估。本文介绍了设计和评估结果。

更新日期:2020-04-11
down
wechat
bug