Lanchester's Equations and Cyberwarfare

被引:1
|
作者
Markowsky, George [1 ]
Markowsky, Linda [2 ]
机构
[1] Missouri Univ Sci & Technol, Rolla, MO 65409 USA
[2] Univ Maine, Orono, ME USA
关键词
Lanchester's equations; Lanchester's n-square law; cyberwar; drones; DDoS attack; Osipov's analysis;
D O I
10.1109/IDAACS53288.2021.9661048
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In his classic book Aircraft in Warfare, F. W. Lanchester discussed different types of warfare and presented equations, called the Lanchester equations, that can be used to model the results of battles between two forces of different sizes or capabilities. This paper introduces the Lanchester equations and provides a theoretical discussion leading to an analysis of the relative value of increasing the effectiveness of military assets vs. increasing the quantity of those assets. In particular, we show that increasing the effectiveness contributes only linearly to the power of a combatant, but increasing the quantity contributes quadratically. This paper also presents a Python script that models the Lanchester equations, together with a visualization demonstrating the effect of force concentration. The paper concludes with a discussion of the equations' relevance to cyberwarfare, specifically to drone warfare and DDoS attacks.
引用
收藏
页码:956 / 963
页数:8
相关论文
共 50 条
  • [41] By Disanalogy, Cyberwarfare Is Utterly New
    Bringsjord S.
    Licato J.
    Philosophy & Technology, 2015, 28 (3) : 339 - 358
  • [42] Cyberwarfare Readiness in the Maritime Environment
    Harris, Diop Ausar
    ICEIS: PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS - VOL 2, 2022, : 119 - 125
  • [43] LANCHESTER-TYPE EQUATIONS OF COMBAT WHICH ACCOUNT FOR MULTIPLE KILLING HITS
    MANGULIS, V
    OPERATIONS RESEARCH, 1980, 28 (03) : 560 - 569
  • [44] Lanchester equations with time dependent parameters for modelling intelligence collection in adversarial situations
    Coulson, S. G.
    IMA JOURNAL OF MANAGEMENT MATHEMATICS, 2025,
  • [45] Fitting Lanchester's square law to the Ardennes Campaign
    Hung, CY
    Yang, GK
    Deng, PS
    Tang, T
    Lan, SP
    Chu, P
    JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2005, 56 (08) : 942 - 946
  • [46] LANCHESTER - THE MAN
    ACKROYD, JAD
    AERONAUTICAL JOURNAL, 1992, 96 (954): : 119 - 140
  • [47] Computer security: Is this the start of cyberwarfare?
    Sharon Weinberger
    Nature, 2011, 474 : 142 - 145
  • [48] Challenges of Civilian Distinction in Cyberwarfare
    Rowe, Neil C.
    ETHICS AND POLICIES FOR CYBER OPERATIONS: A NATO COOPERATIVE CYBER DEFENCE CENTRE OF EXCELLENCE INITIATIVE, 2017, 124 : 33 - 48
  • [49] Cyberwarfare: From the Trenches to the Clouds
    Greiman, Virginia
    PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2016), 2016, : 156 - 162
  • [50] Cyberwarfare: Western and Chinese Allegations
    Kshetri, Nir
    IT PROFESSIONAL, 2014, 16 (01) : 16 - 19