Method and device for identifying key nodes of combat system network

A technology of key nodes and identification methods, applied in data processing applications, instruments, geometric CAD, etc., can solve problems such as poor interpretability of results, insufficient reflection of combat process, and failure to reflect the importance of target nodes in mission success rate, and achieve effective identification. Effect

Pending Publication Date: 2022-05-13
NORTHWESTERN POLYTECHNICAL UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because the former method uses a general network centrality index, it does not reflect the specific combat process, and the interpretability of the obtained results is poor and does not necessarily conform to the actual situation; although the latter method is derived from the "OODA loop "The angle of view consid...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for identifying key nodes of combat system network
  • Method and device for identifying key nodes of combat system network
  • Method and device for identifying key nodes of combat system network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0118] Specific embodiments are given below to further illustrate the technical solution.

[0119] The red and blue sides have a military conflict due to sovereignty issues. The blue team sends an air assault formation composed of 5 fighters of various types to carry out a surprise attack on the red team's targets, and the red team relies on its own combat system composed of 20 pieces of various types of equipment to attack the blue team's assault formation. to intercept. For this typical air interception mission, the key equipment nodes in the red combat system are identified.

[0120] Step 1: Model the nodes and edges in the combat system network, and build a combat system network model.

[0121] refer to Figure 4 , gives the combat system network diagram. According to the functional characteristics and correlations of various equipment in combat missions, the combat system is mapped to a combat system network. Among them, the target nodes T1-T5 represent the five fight...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of combat system key node identification, in particular to a combat system network key node identification method based on a killing chain. Modeling the plurality of nodes and the plurality of edges, and constructing a combat system network model based on a node model and an edge model; constructing a plurality of killing chain models based on the target node; performing multiple Monte Carlo sampling on the combat system network to determine a combat system network state vector; based on a Ullmann algorithm, determining a plurality of killing chains containing a specific target in the combat system network; searching a target node in a plurality of killing chains, and counting the number of the killing chains where the node is located; measuring the killing chain to obtain importance values R of a plurality of target nodes, and determining key nodes based on the importance values R; according to the method, the node importance index can reflect the influence of heterogeneous combat factors such as performance differences of different devices and importance of attacking targets, so that reasonable and effective identification of key nodes is realized.

Description

technical field [0001] The invention relates to the field of identification of key nodes of a combat system, in particular to a method and device for identifying key nodes of a combat system network based on a kill chain. Background technique [0002] With the in-depth application of modern high-tech in the military field, the operational coordination and coupling relationship between weapons and equipment is becoming stronger and stronger, and the war mode is rapidly changing from "platform-centric warfare" to confrontation between the two combat systems. Effective identification of key nodes in the combat system can on the one hand guide actual combat operations from the perspective of attack and achieve effective attacks on the enemy system; on the other hand, it can also identify vulnerable nodes of our system from the perspective of defense. Provide guidance for system defense and optimization. [0003] The combat system can be described based on the network model. At ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F30/18G06F30/20G06Q50/26
CPCG06F30/18G06F30/20G06Q50/26
Inventor 王耀祖尚柏林宋笔锋科尔沁李鹏飞陈志兵刘小锋
Owner NORTHWESTERN POLYTECHNICAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products