A Tactical Intelligence Production Model of Computer Network Self-Organizing Operations | SpringerLink
Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 6216))

Included in the following conference series:

  • 2209 Accesses

Abstract

In this paper, we define the concepts of target’s information and intelligence activities for Computer Network Self-organizing Operations, propose a tactical intelligence production model of computer network self-organization operation and prove its reachability. In order to verify the model, we present the evaluating, analysis and interpreting algorithm based on rule-based reasoning. Then, we design and implement the tactical intelligence production prototype to verify the validity of the CNSOO-TIPM and algorithms. The experiment results show that the prototype provides timely and accurate intelligence information for the CNO decision and meets the most basic needs of cooperative operations between the CNO agents.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 11439
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 14299
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Joint Chiefs of Staff.: JP3-13: Information Operations. Joint Publications, Washington (2006)

    Google Scholar 

  2. Li, X.J.: Research on Computer Network Self-Organizing Operations (in Chinese). PhD Thesis, Beihang University (2008)

    Google Scholar 

  3. Li, X.J.: A Self-0rganized Model of Coordinated Computer Network 0peration. J. Computer Research and Development. 42, 618–628 (2005)

    Google Scholar 

  4. Joint Chiefs of Staff: Joint Publication 2-01: Joint and National Intelligence Support to Military Operations. Joint Publications, Washington (2004)

    Google Scholar 

  5. Academy of Military Sciences.: Military Dictionary for Peoples People’s Liberation Army (in Chinese). PLA Academy of Military Sciences Press, Beijing (1997)

    Google Scholar 

  6. Joint Chiefs of Staff: Joint Publication 2-0: J Joint Intelligence. Joint Publications, Washington (2007)

    Google Scholar 

  7. Endsley, M.R.: Design and evaluation for situation awareness enhancement. In: Proceeding of the human factors society 32nd annual meeting, Santa Monica, CA, pp. 97–101 (1988)

    Google Scholar 

  8. Bass, T.: Intrusion Detection Systems and Multi-sensor Data Fusion: Creating Cyberspace Situational Awareness. J. Comm. ACM. 43, 99–105 (2000)

    Article  Google Scholar 

  9. Shifflet, J.: A Technique Independent Fusion Model For Network Intrusion Detection. In: Proc. of the Midstates Conference on Undergraduate Research in Computer Science and Mathematics, vol. (3), pp. 13–19 (2005)

    Google Scholar 

  10. Steinberg, A.N., Bowman, C.L.: Revision to the JDL data fusion model. In: Hall, D.L., Llinas, J. (eds.) Handbook of Multisensor Data Fusion, pp. 2-1–2-19. CRC Press, Quebec (1998)

    Google Scholar 

  11. Linas, J., Bowman, C., Rogova, G., et al.: Revisiting the JDL data fusion model II. In: Proceedings of the Seventh International Conference on Information Fusion, Stockholm, Sweden, pp. 1218–1230 (2004)

    Google Scholar 

  12. Jian, J.: Research on Computer Network Self-Organizing Exploitations (in Chinese). PhD Thesis, Beihang University (2009)

    Google Scholar 

  13. Sun, Y.Y., Yao, S., Li, X.J., Xia, C.H., Zhang, S.M.: An Evaluation Model of CNO Intelligence Information Confidence. In: Wang, F.L. (ed.) WISM 2009. LNCS, vol. 5854, pp. 400–412. Springer, Heidelberg (2009)

    Google Scholar 

  14. Xia, C.H., Sun, Y.Y., Yao, S., Zhang, S.M., Li, X.J.: An Algorithm for Evaluating Credibility of CNO Intelligence Information using Bayesian estimation. In: Proceeding of 1st International Conference on Information Science and Engineering, pp. 1639–1643. IEEE Press, Nanjing (2009)

    Chapter  Google Scholar 

  15. XSB, http://www.xsb.com/

  16. Common Vulnerabilities and Exposures, http://cve.mitre.org/

  17. Tenable Network Security Nessus, http://www.nessus.org/nessus/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yao, S., Jiao, J., Xia, C., Li, X. (2010). A Tactical Intelligence Production Model of Computer Network Self-Organizing Operations. In: Huang, DS., Zhang, X., Reyes García, C.A., Zhang, L. (eds) Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence. ICIC 2010. Lecture Notes in Computer Science(), vol 6216. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14932-0_50

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14932-0_50

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14931-3

  • Online ISBN: 978-3-642-14932-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics