Proposed methodology to enhance C4I systems security on architectural level

Command control, communication, computer and intelligence (C4I) systems are the back bone complex information and communication systems for modern information warfare (IW). Managing security in C4I systems is a challenge due to complexity and criticality of these systems. This paper elaborates design methodology to incorporate security in the C4I systems in systematic and consistent way instead of patching and random approach. The approach in this work exploits the opportunity provided by architecture frameworks (AF) to capture threats and devise security measures. Assurance cases have been used to model security of the C4I system in order to enhance the process of security design and overcome challenges.

[1]  Abdullah Sharaf Alghamdi,et al.  Application of artificial neural network in detection of DOS attacks , 2009, SIN '09.

[2]  Fei Hu,et al.  Security considerations in ad hoc sensor networks , 2005, Ad Hoc Networks.

[3]  Stephen Blanchette Assurance Cases for Design Analysis of Complex System of Systems Software , 2009 .

[4]  Veselin Tselkov,et al.  Information Assurance in C4I Systems , 2000 .

[5]  Tim Kelly,et al.  The Goal Structuring Notation – A Safety Argument Notation , 2004 .

[6]  Denis Trcek,et al.  Security policy conceptual modeling and formalization for networked information systems , 2000, Comput. Commun..

[7]  Paul G. Kaminski The Defense Acquisition System - A New Direction; A New Emphasis , 1996 .

[8]  Michael Kass,et al.  Software Assurance Using Structured Assurance Case Models , 2010, Journal of research of the National Institute of Standards and Technology.

[9]  Paul Clements,et al.  Systems and Software Product Line Engineering , 2013 .

[10]  Bignolas Mira da Silva,et al.  Enterprise Architecture , 2007 .

[11]  Bill Hancock,et al.  Information Warfare Highlighted as a Concern by US Government , 2001, Comput. Secur..

[12]  Scott Renner Building Information Systems for Network -Centric Warfare , 2003 .

[13]  Abdullah Sharaf Alghamdi,et al.  Enhancing C4I Security Using Threat Modeling , 2010, 2010 12th International Conference on Computer Modelling and Simulation.

[14]  R. William Maule Enterprise knowledge security architecture for military experimentation , 2005, 2005 IEEE International Conference on Systems, Man and Cybernetics.