Multi-stage attack weapon target allocation method based on defense area analysis

被引:11
|
作者
Jia Zhengrong [1 ,2 ]
Lu Faxing [2 ]
Wang Hangyu [2 ]
机构
[1] Naval Univ Engn, Natl Key Lab Sci & Technol Vessel Integrated Powe, Wuhan 430033, Peoples R China
[2] Naval Univ Engn, Coll Weaponry Engn, Wuhan 430033, Peoples R China
基金
中国国家自然科学基金;
关键词
weapon-target allocation (WTA); defense area analysis; combat effective analysis; DIFFERENTIAL EVOLUTION; ASSIGNMENT; ALGORITHM;
D O I
10.23919/JSEE.2020.000033
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For better reflecting the interactive defense between targets in practical combat scenarios, the basic weapon-target allocation (WTA) framework needs to be improved. A multi-stage attack WTA method is proposed. First, a defense area analysis is presented according to the targets' positions and the radii of the defense areas to analyze the interactive coverage and protection between targets' defense areas. Second, with the coverage status and coverage layer number, a multi-stage attack planning method is proposed and the multi-stage attack objective function model is established. Simulation is conducted with interactive defense combat scenarios, the traditional WTA method and the multi-stage WTA method are compared, and the objective function model is validated with the Monte-Carlo method. The results suggest that if the combat scenario involves interactive coverage of targets' defense areas, it is imperative to analyze the defense areas and apply the multi-stage attack method to weakening the target defense progressively for better combat effectiveness.
引用
收藏
页码:539 / 550
页数:12
相关论文
共 50 条
  • [21] Detection Method of Electric Theft in Low Voltage Station Area Based on Multi-stage Recursive Data Analysis
    Kong, Xiangyu
    Ma, Yuying
    Zhao, Xin
    Liang, Bohao
    Zhongguo Dianji Gongcheng Xuebao/Proceedings of the Chinese Society of Electrical Engineering, 44 (15): : 5921 - 5933
  • [22] Architecture for multi-stage network attack traceback
    Strayer, WT
    Jones, CE
    Schwartz, BI
    Mikkelson, J
    Livadas, C
    LCN 2005: 30TH CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2005, : 776 - 783
  • [23] MARS: Multi-stage Attack Recognition System
    Alserhani, Faeiz
    Akhlaq, Monis
    Awan, Irfan U.
    Cullen, Andrea J.
    Mirchandani, Pravin
    2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, : 753 - 759
  • [24] An Air Defense Weapon Target Assignment Method Based on Multi-Objective Artificial Bee Colony Algorithm
    Xing, Huaixi
    Xing, Qinghua
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 76 (03): : 2685 - 2705
  • [25] Research on active defense based on multi-stage cyber deception game
    Hu, Yongjin
    Ma, Jun
    Guo, Yuanbo
    Zhang, Han
    Tongxin Xuebao/Journal on Communications, 2020, 41 (08): : 32 - 42
  • [26] Efficient Multi-objective Evolutionary Algorithms for Solving the Multi-stage Weapon Target Assignment Problem: A Comparison Study
    Li, Juan
    Chen, Jie
    Xin, Bin
    Chen, Lu
    2017 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2017, : 435 - 442
  • [27] MULTI-STAGE ALLOCATION AND LIMITED WAREHOUSING PROBLEMS
    JEWELL, WS
    OPERATIONS RESEARCH, 1957, 5 (04) : 593 - 593
  • [28] A Generalization of the Multi-Stage Search Allocation Game
    Hohzaki, Ryusuke
    ADVANCES IN DYNAMIC GAMES: THEORY, APPLICATIONS, AND NUMERICAL METHODS FOR DIFFERENTIAL AND STOCHASTIC GAMES: DEDICATED TO THE MEMORY OF ARIK A. MELIKYAN, 2011, 11 : 189 - 207
  • [29] Multi-stage resource allocation under uncertainty
    Calafiore, G
    Nilim, A
    2004 43RD IEEE CONFERENCE ON DECISION AND CONTROL (CDC), VOLS 1-5, 2004, : 417 - 423
  • [30] A Defense Method Based on Moving Target Defense for New Power System APT Attack
    Li, Ruotong
    Li, Yuancheng
    International Journal of Network Security, 2023, 25 (04) : 587 - 594