Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Entire DC Network

Prioritizing Strategic Cyberspace Lethality, Andrew J. Schoka Oct 2019

Prioritizing Strategic Cyberspace Lethality, Andrew J. Schoka

Military Cyber Affairs

The primary concern of United States national security policy, as detailed in the 2018 National Defense Strategy, has shifted from asymmetrical counter-insurgency operations to countering inter-state strategic competition by rogue regimes and revisionist powers. This doctrinal shift has prompted an increased emphasis on military lethality, particularly in strategic-level cyberspace operations intended to counter open challenges to the global security environment and United States preeminence. Drawing from the theory of constraints in industrial engineering and Bayesian search theory in operations research, this paper identifies the key organizational constraints that hinder the lethality of the Department of Defense’s strategic-level cyberspace operations units …


Cyber Metaphors And Cyber Goals: Lessons From “Flatland”, Pierre Trepagnier Oct 2019

Cyber Metaphors And Cyber Goals: Lessons From “Flatland”, Pierre Trepagnier

Military Cyber Affairs

Reasoning about complex and abstract ideas is greatly influenced by the choice of metaphors through which they are represented. In this paper we consider the framing effect in military doctrine of considering cyberspace as a domain of action, parallel to the traditional domains of land, sea, air, and space. By means of the well-known Victorian science-fiction novella Flatland, we offer a critique of this dominant cyber metaphor. In Flatland, the problems of lower-dimensional beings comprehending additional dimensions are explored at some length. Inspired by Flatland, our suggested alternate metaphor for cyber is an additional (fourth) dimension. We …


Evaluating Machine Learning Classifiers For Defensive Cyber Operations, Michael D. Rich, Robert F. Mills, Thomas E. Dube, Steven K. Rogers Dec 2016

Evaluating Machine Learning Classifiers For Defensive Cyber Operations, Michael D. Rich, Robert F. Mills, Thomas E. Dube, Steven K. Rogers

Military Cyber Affairs

Today’s defensive cyber sensors are dominated by signature-based analytical methods that require continuous maintenance and lack the ability to detect unknown threats. Anomaly detection offers the ability to detect unknown threats, but despite over 15 years of active research, the operationalization of anomaly detection and machine learning for Defensive Cyber Operations (DCO) is lagging. This article provides an introduction to machine learning concepts with a focus on the unique challenges to using machine learning for DCO. Traditional machine learning evaluation methods are challenged in favor of a value-focused evaluation method that incorporates evaluator-specific weights for classifier and sensitivity threshold selection …


Cyberspace Operations Planning: Operating A Technical Military Force Beyond The Kinetic Domains, Don E. Barber, T. Alan Bobo, Kevin P. Sturm Dec 2015

Cyberspace Operations Planning: Operating A Technical Military Force Beyond The Kinetic Domains, Don E. Barber, T. Alan Bobo, Kevin P. Sturm

Military Cyber Affairs

Cyber operations can be very complex, and it is useful to conceptualize a deeper, fourth technical level of warfare in order to conduct effective planning. The technical details associated with cyberspace operations are not grasped as intuitively by planners and commanders as are the capabilities and limitations of tanks, ships, and aircraft. The complex and dynamic nature of cyberspace often drives technical analysis and planning to a level beyond those planning practices and procedures accommodated by traditional Joint doctrine.