The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing the burden, to the Department of Defense, Executive Service Directorate (0704-0188). Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number.
PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ORGANIZATION.
REPORT DATE (DD-MM-YYYY)31-01-2011 5f. WORK UNIT NUMBER 718411AM
REPORT TYPE Final
DATES COVERED (From
PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES)Florida A&M University, Division of Research 1500 Wahnish Way Tallahassee FL 32307-3100
PERFORMING ORGANIZATION REPORT NUMBER
SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES)Air Force
SPONSOR/MONITOR'S ACRONYM(S)711 HPW/RHCV
SPONSOR/MONITOR'S REPORT NUMBER(S) AFRL-RH-WP-TR-2011-0065
DISTRIBUTION/AVAILABILITY STATEMENTDistribution A. Approved for public release; distribution unlimited.
SUPPLEMENTARY NOTES88ABW Cleared 06/07/2011; 88ABW-2011-3265.
ABSTRACTThe objective is to better understand and synthesize the dynamic response of complex and distributed networks when they are under cyber attack. Modern complex and distributed systems now are highly vulnerable and can be easily compromised by attacks at key nodes. Finding the key nodes or links in a model of a distributed network system is critically important to understand how to mitigate an attack. An analysis tool needs to be developed to first determine what areas of a complex network may be highly vulnerable so that commanders and other decision makers can help protect their assets. Most modern complex and distributed networks have been built in an ad hoc manner where nodes, links, and other connections spring up without any real planning. Decision makers then have to assign authority and responsibility to the key constituent players and they need a framework and basis to improve their allocation of scarce resources to protect complex networks. From another point of view, some networks are hostile and the overall objective would be to attack and take such a network down. The expression taking a network down is assumed to be equivalent to producing congestion and restricting the flow of important military assets, water, food, medicine and other important entities. ii
AbstractAn increasing number of Air Force related systems are being modeled as networks. This has motivated philosophical discussions concerning distributed networked operations and network centric warfare. However, successful application of such approaches will require a solid mathematical foundation. In this work, a mathematical framework is proposed that...