Applying Simulator-Defined Radar Countermeasure Systems Techniques to Computer Network Security Issues

Electronic warfare and computer network warfare operations are conducted into different action theatres and employ assorted laws of physics, technological assets, communications mediums and even political doctrines. Simulator-defined countermeasure systems concepts and techniques allow the generatio...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Kostis, T.G., Goudosis, A.K., Galanis, K.G., Katsikas, S.K.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 135
container_issue
container_start_page 130
container_title
container_volume
creator Kostis, T.G.
Goudosis, A.K.
Galanis, K.G.
Katsikas, S.K.
description Electronic warfare and computer network warfare operations are conducted into different action theatres and employ assorted laws of physics, technological assets, communications mediums and even political doctrines. Simulator-defined countermeasure systems concepts and techniques allow the generation of false naval targets for the purpose of security by obscurity in the field of electronic warfare. This paper proposes that the experience and expertise of creating simulator-defined false naval targets is very beneficial to the field of security by obscurity for computer network warfare. The conceptual modelling electronic warfare methodology can be applied to the creation of false Registration Authorities. Moreover Public Key Infrastructure database maintenance actions can be conducted by using modularity and increased complexity techniques acquired again from the electronic warfare simulator duality. Many similar if even identical entities, processes, implementation procedures and maintenance techniques are detected and clearly identified leading to the conclusion that research in one discipline is very beneficial to the other in terms of design time overhead, maintenance time turnover and return on investment.
doi_str_mv 10.1109/EMS.2009.23
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5358814</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5358814</ieee_id><sourcerecordid>5358814</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-a8dcdc6de87c0bda318c1455437cbdfa7355c692e13fe50002ef3dabd750074d3</originalsourceid><addsrcrecordid>eNotkE1LwzAchyMiKLMnj17yBTqT5rXHMacbTAU7zyNN_tXg-mKSIv32FvX044GH5_BD6IaSJaWkvNs8VcuCkHJZsDOUlUoTJUvBtJbk_JcpLzgXjAtyibIYfU0KqaQoJblCzWoYTpPv3nHl2_FkUh_ye2h8Bw6_GmcCXvdjlyC0YOIYAFdTTNBGfAD70fmvESJO_Sy1wzhb-BnSdx8-cQV2DD5NeBfj7Fyji8acImT_u0BvD5vDepvvXx5369U-91SJlBvtrLPSgVaW1M4wqi3lQnCmbO0ao5gQVpYFUNaAIIQU0DBnaqdmUNyxBbr963oAOA7BtyZMR8GEnl9gPyL4WZs</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Applying Simulator-Defined Radar Countermeasure Systems Techniques to Computer Network Security Issues</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Kostis, T.G. ; Goudosis, A.K. ; Galanis, K.G. ; Katsikas, S.K.</creator><creatorcontrib>Kostis, T.G. ; Goudosis, A.K. ; Galanis, K.G. ; Katsikas, S.K.</creatorcontrib><description>Electronic warfare and computer network warfare operations are conducted into different action theatres and employ assorted laws of physics, technological assets, communications mediums and even political doctrines. Simulator-defined countermeasure systems concepts and techniques allow the generation of false naval targets for the purpose of security by obscurity in the field of electronic warfare. This paper proposes that the experience and expertise of creating simulator-defined false naval targets is very beneficial to the field of security by obscurity for computer network warfare. The conceptual modelling electronic warfare methodology can be applied to the creation of false Registration Authorities. Moreover Public Key Infrastructure database maintenance actions can be conducted by using modularity and increased complexity techniques acquired again from the electronic warfare simulator duality. Many similar if even identical entities, processes, implementation procedures and maintenance techniques are detected and clearly identified leading to the conclusion that research in one discipline is very beneficial to the other in terms of design time overhead, maintenance time turnover and return on investment.</description><identifier>ISBN: 9781424453450</identifier><identifier>ISBN: 1424453453</identifier><identifier>EISBN: 9780769538860</identifier><identifier>EISBN: 076953886X</identifier><identifier>DOI: 10.1109/EMS.2009.23</identifier><language>eng</language><publisher>IEEE</publisher><subject>Communication system security ; Communications technology ; Computational modeling ; Computer Network Security ; Computer networks ; Computer security ; Computer simulation ; Electronic countermeasures ; Electronic warfare ; False Computer Host Generator ; False Registration Authority ; Physics ; Public Key Infrastructure ; Radar countermeasures</subject><ispartof>2009 Third UKSim European Symposium on Computer Modeling and Simulation, 2009, p.130-135</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5358814$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5358814$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Kostis, T.G.</creatorcontrib><creatorcontrib>Goudosis, A.K.</creatorcontrib><creatorcontrib>Galanis, K.G.</creatorcontrib><creatorcontrib>Katsikas, S.K.</creatorcontrib><title>Applying Simulator-Defined Radar Countermeasure Systems Techniques to Computer Network Security Issues</title><title>2009 Third UKSim European Symposium on Computer Modeling and Simulation</title><addtitle>ECMS</addtitle><description>Electronic warfare and computer network warfare operations are conducted into different action theatres and employ assorted laws of physics, technological assets, communications mediums and even political doctrines. Simulator-defined countermeasure systems concepts and techniques allow the generation of false naval targets for the purpose of security by obscurity in the field of electronic warfare. This paper proposes that the experience and expertise of creating simulator-defined false naval targets is very beneficial to the field of security by obscurity for computer network warfare. The conceptual modelling electronic warfare methodology can be applied to the creation of false Registration Authorities. Moreover Public Key Infrastructure database maintenance actions can be conducted by using modularity and increased complexity techniques acquired again from the electronic warfare simulator duality. Many similar if even identical entities, processes, implementation procedures and maintenance techniques are detected and clearly identified leading to the conclusion that research in one discipline is very beneficial to the other in terms of design time overhead, maintenance time turnover and return on investment.</description><subject>Communication system security</subject><subject>Communications technology</subject><subject>Computational modeling</subject><subject>Computer Network Security</subject><subject>Computer networks</subject><subject>Computer security</subject><subject>Computer simulation</subject><subject>Electronic countermeasures</subject><subject>Electronic warfare</subject><subject>False Computer Host Generator</subject><subject>False Registration Authority</subject><subject>Physics</subject><subject>Public Key Infrastructure</subject><subject>Radar countermeasures</subject><isbn>9781424453450</isbn><isbn>1424453453</isbn><isbn>9780769538860</isbn><isbn>076953886X</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2009</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotkE1LwzAchyMiKLMnj17yBTqT5rXHMacbTAU7zyNN_tXg-mKSIv32FvX044GH5_BD6IaSJaWkvNs8VcuCkHJZsDOUlUoTJUvBtJbk_JcpLzgXjAtyibIYfU0KqaQoJblCzWoYTpPv3nHl2_FkUh_ye2h8Bw6_GmcCXvdjlyC0YOIYAFdTTNBGfAD70fmvESJO_Sy1wzhb-BnSdx8-cQV2DD5NeBfj7Fyji8acImT_u0BvD5vDepvvXx5369U-91SJlBvtrLPSgVaW1M4wqi3lQnCmbO0ao5gQVpYFUNaAIIQU0DBnaqdmUNyxBbr963oAOA7BtyZMR8GEnl9gPyL4WZs</recordid><startdate>200911</startdate><enddate>200911</enddate><creator>Kostis, T.G.</creator><creator>Goudosis, A.K.</creator><creator>Galanis, K.G.</creator><creator>Katsikas, S.K.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200911</creationdate><title>Applying Simulator-Defined Radar Countermeasure Systems Techniques to Computer Network Security Issues</title><author>Kostis, T.G. ; Goudosis, A.K. ; Galanis, K.G. ; Katsikas, S.K.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-a8dcdc6de87c0bda318c1455437cbdfa7355c692e13fe50002ef3dabd750074d3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Communication system security</topic><topic>Communications technology</topic><topic>Computational modeling</topic><topic>Computer Network Security</topic><topic>Computer networks</topic><topic>Computer security</topic><topic>Computer simulation</topic><topic>Electronic countermeasures</topic><topic>Electronic warfare</topic><topic>False Computer Host Generator</topic><topic>False Registration Authority</topic><topic>Physics</topic><topic>Public Key Infrastructure</topic><topic>Radar countermeasures</topic><toplevel>online_resources</toplevel><creatorcontrib>Kostis, T.G.</creatorcontrib><creatorcontrib>Goudosis, A.K.</creatorcontrib><creatorcontrib>Galanis, K.G.</creatorcontrib><creatorcontrib>Katsikas, S.K.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Kostis, T.G.</au><au>Goudosis, A.K.</au><au>Galanis, K.G.</au><au>Katsikas, S.K.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Applying Simulator-Defined Radar Countermeasure Systems Techniques to Computer Network Security Issues</atitle><btitle>2009 Third UKSim European Symposium on Computer Modeling and Simulation</btitle><stitle>ECMS</stitle><date>2009-11</date><risdate>2009</risdate><spage>130</spage><epage>135</epage><pages>130-135</pages><isbn>9781424453450</isbn><isbn>1424453453</isbn><eisbn>9780769538860</eisbn><eisbn>076953886X</eisbn><abstract>Electronic warfare and computer network warfare operations are conducted into different action theatres and employ assorted laws of physics, technological assets, communications mediums and even political doctrines. Simulator-defined countermeasure systems concepts and techniques allow the generation of false naval targets for the purpose of security by obscurity in the field of electronic warfare. This paper proposes that the experience and expertise of creating simulator-defined false naval targets is very beneficial to the field of security by obscurity for computer network warfare. The conceptual modelling electronic warfare methodology can be applied to the creation of false Registration Authorities. Moreover Public Key Infrastructure database maintenance actions can be conducted by using modularity and increased complexity techniques acquired again from the electronic warfare simulator duality. Many similar if even identical entities, processes, implementation procedures and maintenance techniques are detected and clearly identified leading to the conclusion that research in one discipline is very beneficial to the other in terms of design time overhead, maintenance time turnover and return on investment.</abstract><pub>IEEE</pub><doi>10.1109/EMS.2009.23</doi><tpages>6</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 9781424453450
ispartof 2009 Third UKSim European Symposium on Computer Modeling and Simulation, 2009, p.130-135
issn
language eng
recordid cdi_ieee_primary_5358814
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Communication system security
Communications technology
Computational modeling
Computer Network Security
Computer networks
Computer security
Computer simulation
Electronic countermeasures
Electronic warfare
False Computer Host Generator
False Registration Authority
Physics
Public Key Infrastructure
Radar countermeasures
title Applying Simulator-Defined Radar Countermeasure Systems Techniques to Computer Network Security Issues
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-19T10%3A00%3A16IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Applying%20Simulator-Defined%20Radar%20Countermeasure%20Systems%20Techniques%20to%20Computer%20Network%20Security%20Issues&rft.btitle=2009%20Third%20UKSim%20European%20Symposium%20on%20Computer%20Modeling%20and%20Simulation&rft.au=Kostis,%20T.G.&rft.date=2009-11&rft.spage=130&rft.epage=135&rft.pages=130-135&rft.isbn=9781424453450&rft.isbn_list=1424453453&rft_id=info:doi/10.1109/EMS.2009.23&rft_dat=%3Cieee_6IE%3E5358814%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9780769538860&rft.eisbn_list=076953886X&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5358814&rfr_iscdi=true