Skip to main content

Measuring the Impact of Tactical Denial of Sustainability

  • Conference paper
  • First Online:
Computer Security. ESORICS 2021 International Workshops (ESORICS 2021)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 13106))

Included in the following conference series:

Abstract

The adoption of the latest advances in Information and Communication Technologies (ICT) at the military operational edge raises promising points of disruption, emphasizing significant improvements in decision support, information sharing, and situational awareness acquisition. Among these, tactical clouds are perceived as necessary assets for achieving information and cyberspace sovereignty, serving as backbone for other cyber functionalities and their connectivity to the kinetic world. However, the attacks against the sustainability of tactical clouds, commonly referred to as Tactical Denial of Sustainability attacks (TDoS), pose one of the challenges that is mostly attracting the attention of the research community, mainly due to its asymmetric nature and cross-domain implications. Hence, the TDoS concept has been conceptually explored and analyzed through vignettes and case of study; but to date no previous work has addressed the problem of its measurement and quantification. With the aim of their understanding, this paper presents a research work that addressed the problem of identifying and analyzing mission-centric Measures of Effectives (MOEs), Measure of Performance (MOPs) and quantitative/qualitative Performance Indicators (PI) able to detect and assess TDoS situations. These measurements embrace capacity, technological, socio-cognitive and energetic aspects, discussing their possible application at offensive and defensive thinking.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Barbosa-Póvoa, A.P., da Silva, C., Carvalho, A.: Opportunities and challenges in sustainable supply chain: an operations research perspective. Eur. J. Oper. Res. 268(2), 399–431 (2018)

    Article  MathSciNet  Google Scholar 

  2. Barrett, D., Mansfield, A.: The challenge and opportunities of standing on cloud - finding our warfighting advantage. Cyber Defense Rev. 4(1), 15–22 (2019)

    Google Scholar 

  3. Bergh, A.: The final destination: Building test bed apps for DIL environments. In: 2015 IEEE 81st Vehicular Technology Conference (VTC Spring), pp. 1–5. IEEE (2015)

    Google Scholar 

  4. Caldwell IV, W.B., Flournoy, M., Brimley, S., Davidson, J.: The US Army Stability Operations Field Manual: US Army Field Manual No. 3–07. University of Michigan Press (2009)

    Google Scholar 

  5. Cook, A., Janicke, H., Smith, R., Maglaras, L.: The industrial control system cyber defence triage process. Comput. Secur. 70, 467–481 (2017)

    Article  Google Scholar 

  6. Dolui, K., Datta, S.K.: Comparison of edge computing implementations: fog computing, cloudlet and mobile edge computing. In: 2017 Global Internet of Things Summit (GIoTS), pp. 1–6. IEEE (2017)

    Google Scholar 

  7. Duvenage, P., Sithole, T., von Solms, B.: Cyber counterintelligence: an exploratory proposition on a conceptual framework. Int. J. Cyber Warf. Terror. (IJCWT) 9(4), 44–62 (2019)

    Article  Google Scholar 

  8. Fukuyama, M.: Society 5.0: aiming for a new human-centered society. Jpn. Spotlight 1, 47–50 (2018)

    Google Scholar 

  9. Gui, G., Liu, M., Tang, F., Kato, N., Adachi, F.: 6G: opening new horizons for integration of comfort, security, and intelligence. IEEE Wirel. Commun. 27(5), 126–132 (2020)

    Article  Google Scholar 

  10. Kaur, K., Mangat, V., Kumar, K.: A comprehensive survey of service function chain provisioning approaches in SDN and NFV architecture. Comput Sci. Rev. 38, 100298 (2020)

    Article  Google Scholar 

  11. Maestre Vidal, J., Sotelo Monge, M.: Obfuscation of malicious behaviors for thwarting masquerade detection systems based on locality features. Sensors 20(7), 2084 (2020)

    Article  Google Scholar 

  12. Maestre Vidal, J., Sotelo Monge, M.A.: Denial of sustainability on military tactical clouds. In: Proceedings of the 15th International Conference on Availability, Reliability and Security, pp. 1–9 (2020)

    Google Scholar 

  13. Maestre Vidal, J., Sotelo Monge, M.A., Martínez Monterrubio, S.M.: EsPADA: enhanced payload analyzer for malware detection robust against adversarial threats. Future Gener. Comput. Syst. 104, 159–173 (2020)

    Article  Google Scholar 

  14. NATO: Allied joint doctrine for cyberspace operation (AJP-3.20) (2020). https://www.gov.uk/government/publications/allied-joint-doctrine-for-cyberspace-operations-ajp-320

  15. NATO: Brussels summit communiqué (2021). https://www.nato.int/cps/en/natohq/news_185000.htm

  16. NATO: Emerging and disruptive technologies (2021). https://www.nato.int/cps/en/natohq/topics_184303.htm?

  17. Poularakis, K., Iosifidis, G., Tassiulas, L.: SDN-enabled tactical ad hoc networks: Extending programmable control to the edge. IEEE Commun. Mag. 56(7), 132–138 (2018)

    Article  Google Scholar 

  18. Rodriguez-Bermejo, D.S., Medenou, R.D., de Riquelme, R.P., Vidal, J.M., Torelli, F., Sánchez, S.L.: Evaluation methodology for mission-centric cyber situational awareness capabilities. In: Proceedings of the 15th International Conference on Availability, Reliability and Security, pp. 1–9 (2020)

    Google Scholar 

  19. Samaras, C., Nuttall, W.J., Bazilian, M.: Energy and the military: convergence of security, economic, and environmental decision-making. Energy Strategy Rev. 26, 100409 (2019)

    Article  Google Scholar 

  20. Schmitt, M.N.: Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge University Press, Cambridge (2017)

    Book  Google Scholar 

  21. Smaliukiene, R., Bekesiene, S.: Towards sustainable human resources: how generational differences impact subjective wellbeing in the military? Sustainability 12(23), 10016 (2020)

    Article  Google Scholar 

  22. Smith, W., et al.: Cloud computing in tactical environments. In: Military Communications Conference (MILCOM), pp. 882–887. IEEE (2017)

    Google Scholar 

  23. Solozabal, R., Sanchoyerto, A., Atxutegi, E., Blanco, B., Fajardo, J.O., Liberal, F.: Exploitation of mobile edge computing in 5G distributed mission-critical push-to-talk service deployment. IEEE Access 6, 37665–37675 (2018)

    Article  Google Scholar 

  24. Song, S.C.: A systems analysis of the us army’s human dimension strategy. In: Proceedings of the International Annual Conference of the American Society for Engineering Management, pp. 1–10. American Society for Engineering Management (ASEM) (2018)

    Google Scholar 

  25. Sotelo Monge, M.A., Maestre Vidal, J.: Conceptualization and cases of study on cyber operations against the sustainability of the tactical edge. Future Gener. Comput. Syst. 125, 869–890 (2021)

    Article  Google Scholar 

  26. Sotelo Monge, M.A., Maestre Vidal, J., Martínez Pérez, G.: Detection of economic denial of sustainability (EDoS) threats in self-organizing networks. Comput. Commun. 145, 284–308 (2019)

    Article  Google Scholar 

  27. Sotelo Monge, M.A., Maestre Vidal, J., Medenou Choumanof, R.D.: Adaptive mitigation of tactical denial of sustainability. In: The 16th International Conference on Availability, Reliability and Security, pp. 1–9 (2021)

    Google Scholar 

  28. Thomas, D., Shankaran, R., Orgun, M., Hitchens, M., Ni, W.: Energy-efficient military surveillance: coverage meets connectivity. IEEE Sens. J. 19(10), 3902–3911 (2019)

    Article  Google Scholar 

  29. US Army: Army doctrine reference publication no. 1: The army profession (2015). https://irp.fas.org/doddir/army/adrp1.pdf

  30. US Army: The army human dimension strategy (2015). https://caccapl.blob.core.usgovcloudapi.net/web/character-development-project/repository/human-dimension-strategy-2015.pdf

  31. US Department of the Army: ADP 3–90 Offense and Defense (2019). https://irp.fas.org/doddir/army/adp3_90.pdf

  32. US Joint Chiefs of Staff: Commander’s handbook for assessment planning and execution (2011). https://www.jcs.mil/Portals/36/Documents/Doctrine/pams_hands/assessment_hbk.pdf

  33. US Joint Chiefs of Staff: Joint doctrine note 1–15: Operations assessment (2015). https://www.hsdl.org/?view&did=761727

  34. US Joint Chiefs of Staff: Joint publication 3.0 on joint operations (2018). https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp3_0ch1.pdf

  35. US Joint Chiefs of Staff: Joint publication 5.0 on joint planning (2020). https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp5_0.pdf

  36. Vacca, A., Onishi, H.: Drones: military weapons, surveillance or mapping tools for environmental monitoring? The need for legal framework is required. Transp. Res. Procedia 25, 51–62 (2017)

    Article  Google Scholar 

  37. Yang, H., et al.: Dispersed computing for tactical edge in future wars: vision, architecture, and challenges. Wirel. Commun. Mob. Comput. 2021 (2021)

    Google Scholar 

Download references

Acknowledgements

figure a

This research has received funding from the European Defence Industrial Development Programme (EDIDP) under the grant agreement Number EDIDP-CSAMN-SSC-2019-022-ECYSAP (European Cyber Situational Awareness Platform).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marco Antonio Sotelo Monge .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ramón y Cajal Ramo, P., Vidal, J.M., Monge, M.A.S. (2022). Measuring the Impact of Tactical Denial of Sustainability. In: Katsikas, S., et al. Computer Security. ESORICS 2021 International Workshops. ESORICS 2021. Lecture Notes in Computer Science(), vol 13106. Springer, Cham. https://doi.org/10.1007/978-3-030-95484-0_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-95484-0_31

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-95483-3

  • Online ISBN: 978-3-030-95484-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics