POSTER: Blackboard-Based Electronic Warfare System

With internet-connected, SCADA and cyber-physical systems becoming the next battlefield for crime and warfare, technologies for defending and attacking these systems are growing in prevalence. For entities with significant asset collections that are prospectively vulnerable to this type of an attack, autonomous response, retaliation and attack capabilities are necessary to respond to a growing threat from numerous sectors. This paper presents a command and control technique for cyberwarfare based on the Blackboard Architecture. It discusses the utility of this approach and proposes a distributed command system that can run across multiple nodes of various types.

[1]  Jeremy Straub A Distributed Blackboard Approach Based Upon a Boundary Node Concept , 2016, J. Intell. Robotic Syst..

[2]  Christian Pedersen,et al.  Much Ado about Cyber-space: Cyber-terrorism and the Reformation of the Cyber-security , 2014 .

[3]  J. Marescaux,et al.  Transcontinental Robot-Assisted Remote Telesurgery: Feasibility and Potential Applications , 2002, Annals of surgery.

[4]  Pasquale De Meo,et al.  Detecting criminal organizations in mobile phone networks , 2014, Expert Syst. Appl..

[5]  Nir Kshetri,et al.  Cybercrime and cyber-security issues associated with China: some economic and institutional considerations , 2013, Electron. Commer. Res..

[6]  George Loukas,et al.  A Review of Cyber Threats and Defence Approaches in Emergency Management , 2013, Future Internet.

[7]  Hung-Min Sun,et al.  A defence scheme against Identity Theft Attack based on multiple social networks , 2014, Expert Syst. Appl..

[8]  Inseok Hwang,et al.  Cyber Attack Vulnerabilities Analysis for Unmanned Aerial Vehicles , 2012, Infotech@Aerospace.

[9]  Betrand Ugorji,et al.  Cloud Security : A Review of Recent Threats and Solution Models , 2013 .

[10]  Adel Said Elmaghraby,et al.  Cyber security challenges in Smart Cities: Safety, security and privacy , 2014, Journal of advanced research.

[11]  Issa Atoum,et al.  A holistic cyber security implementation framework , 2014, Inf. Manag. Comput. Secur..

[12]  Nasser S. Abouzakhar,et al.  Critical Infrastructure Cybersecurity : A Review of Recent Threats and Violations , 2013 .

[13]  Naima Kaabouch,et al.  Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.

[14]  Kim-Kwang Raymond Choo,et al.  The cyber threat landscape: Challenges and future research directions , 2011, Comput. Secur..

[15]  Francisco Herrera,et al.  On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on Intrusion Detection Systems , 2015, Expert Syst. Appl..

[16]  Zhuo Lu,et al.  Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.

[17]  Costin Raiu,et al.  Cyber-threat evolution: the past year , 2012 .

[18]  Barbara Hayes-Roth,et al.  A Blackboard Architecture for Control , 1985, Artif. Intell..

[19]  Jeremy Straub,et al.  Evaluation of a Multi-Goal Solver for Use in a Blackboard Architecture , 2014, Int. J. Decis. Support Syst. Technol..