Abstract
In this paper, we define the concepts of target’s information and intelligence activities for Computer Network Self-organizing Operations, propose a tactical intelligence production model of computer network self-organization operation and prove its reachability. In order to verify the model, we present the evaluating, analysis and interpreting algorithm based on rule-based reasoning. Then, we design and implement the tactical intelligence production prototype to verify the validity of the CNSOO-TIPM and algorithms. The experiment results show that the prototype provides timely and accurate intelligence information for the CNO decision and meets the most basic needs of cooperative operations between the CNO agents.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Joint Chiefs of Staff.: JP3-13: Information Operations. Joint Publications, Washington (2006)
Li, X.J.: Research on Computer Network Self-Organizing Operations (in Chinese). PhD Thesis, Beihang University (2008)
Li, X.J.: A Self-0rganized Model of Coordinated Computer Network 0peration. J. Computer Research and Development. 42, 618–628 (2005)
Joint Chiefs of Staff: Joint Publication 2-01: Joint and National Intelligence Support to Military Operations. Joint Publications, Washington (2004)
Academy of Military Sciences.: Military Dictionary for Peoples People’s Liberation Army (in Chinese). PLA Academy of Military Sciences Press, Beijing (1997)
Joint Chiefs of Staff: Joint Publication 2-0: J Joint Intelligence. Joint Publications, Washington (2007)
Endsley, M.R.: Design and evaluation for situation awareness enhancement. In: Proceeding of the human factors society 32nd annual meeting, Santa Monica, CA, pp. 97–101 (1988)
Bass, T.: Intrusion Detection Systems and Multi-sensor Data Fusion: Creating Cyberspace Situational Awareness. J. Comm. ACM. 43, 99–105 (2000)
Shifflet, J.: A Technique Independent Fusion Model For Network Intrusion Detection. In: Proc. of the Midstates Conference on Undergraduate Research in Computer Science and Mathematics, vol. (3), pp. 13–19 (2005)
Steinberg, A.N., Bowman, C.L.: Revision to the JDL data fusion model. In: Hall, D.L., Llinas, J. (eds.) Handbook of Multisensor Data Fusion, pp. 2-1–2-19. CRC Press, Quebec (1998)
Linas, J., Bowman, C., Rogova, G., et al.: Revisiting the JDL data fusion model II. In: Proceedings of the Seventh International Conference on Information Fusion, Stockholm, Sweden, pp. 1218–1230 (2004)
Jian, J.: Research on Computer Network Self-Organizing Exploitations (in Chinese). PhD Thesis, Beihang University (2009)
Sun, Y.Y., Yao, S., Li, X.J., Xia, C.H., Zhang, S.M.: An Evaluation Model of CNO Intelligence Information Confidence. In: Wang, F.L. (ed.) WISM 2009. LNCS, vol. 5854, pp. 400–412. Springer, Heidelberg (2009)
Xia, C.H., Sun, Y.Y., Yao, S., Zhang, S.M., Li, X.J.: An Algorithm for Evaluating Credibility of CNO Intelligence Information using Bayesian estimation. In: Proceeding of 1st International Conference on Information Science and Engineering, pp. 1639–1643. IEEE Press, Nanjing (2009)
XSB, http://www.xsb.com/
Common Vulnerabilities and Exposures, http://cve.mitre.org/
Tenable Network Security Nessus, http://www.nessus.org/nessus/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yao, S., Jiao, J., Xia, C., Li, X. (2010). A Tactical Intelligence Production Model of Computer Network Self-Organizing Operations. In: Huang, DS., Zhang, X., Reyes García, C.A., Zhang, L. (eds) Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence. ICIC 2010. Lecture Notes in Computer Science(), vol 6216. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14932-0_50
Download citation
DOI: https://doi.org/10.1007/978-3-642-14932-0_50
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14931-3
Online ISBN: 978-3-642-14932-0
eBook Packages: Computer ScienceComputer Science (R0)