Next Article in Journal
Research on Supply Chain Coordination Decision Making under the Influence of Lead Time Based on System Dynamics
Previous Article in Journal
Mechanisms Influencing the Digital Transformation Performance of Local Governments: Evidence from China
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Complex Network-Based Resilience Capability Assessment for a Combat System of Systems

1
Graduate Collage, Air Force Engineering University, Xi’an 710051, China
2
Air and Missile Defense College, Air Force Engineering University, Xi’an 710051, China
*
Author to whom correspondence should be addressed.
Systems 2024, 12(1), 31; https://doi.org/10.3390/systems12010031
Submission received: 13 December 2023 / Revised: 4 January 2024 / Accepted: 16 January 2024 / Published: 18 January 2024

Abstract

:
With the increasing complexity and frequency of interactions among a large number of heterogeneous nodes within a combat system of systems (SoS), evaluating the capability of the SoS to withstand external attacks and interferences has become an increasingly challenging and urgent issue. However, the complexity of a combat SoS often brings about difficulties in quantitative analysis. This paper proposes a method to assess the resilience of a combat SoS. Firstly, a network model of a combat SoS is constructed, taking into account multi-functional composite nodes. Secondly, the combat capability model of the combat SoS is built based on the capabilities of the kill chains and kill networks. Lastly, an approach is proposed to calculate the combat capability of the system based on the network’s two-terminal connectivity. Moreover, based on the SoS’s combat capability, the resilience is analyzed from the dimensions of anti-destruction, survival, and recovery. The simulation experiments show that, compared to other methods, the method in this paper for calculating the combat capability of the combat SoS does not depend on the number of kill chains and aligns with the combat processes and actual patterns. Additionally, the resilience measurement method can effectively analyze its capability to cope with external interferences.

1. Introduction

In the context of the information and intelligence era, the concept of the “interconnection of everything” has emerged as the driving force behind development, promoting advancements in productive forces and significantly impacting the dynamics of modern combat success. The modern combat system of systems (SoS) comprises numerous combat elements, and the growingly interrelated “interconnection, intercommunication, and interoperability” among these elements considerably enhances the combat SoS’s capability. From a microscopic viewpoint, the material, information, and energy flow efficiently intermingle among diverse combat elements, engendering interactive influences among them. From a macroscopic viewpoint, the combat SoS manifests intricate cascading and emergent, nonlinear, and collapsing features, markedly complicating the assessment of the combat capabilities. Due to the inability to statically display the macroscopic characteristics of the combat SoS and their nonconformity with the general principle of linear superposition, static analytical evaluation methods become inadequate. Furthermore, the combat SoS’s complexity and the diversity of its elements present greater challenges in constructing evaluation models and examining the combat SoS’s dynamic features.
Commanders and decision-makers are increasingly concerned about whether a combat SoS, driven by complex interactive relationships, poses the essential capability to accomplish tasks, adapt to damage, and recover in the face of external impacts. These capabilities demonstrate the combat SoS’s resilience. Resilience refers to a system’s or entity’s ability to, despite facing external impacts, still provide the necessary functions for tasks and restore overall functionality through the reconstruction and recovery of internal elements. A modern combat SoS is characterized by diverse and heterogeneous internal elements, complex interactive relationships between elements, and inherent passivity when involved in defensive combat tasks. Therefore, evaluating the resilience of a combat SoS to external interference and strikes has become a challenging and urgent issue.
With combat SoS increasingly displaying networked characteristics, abstracting them into a networked model and applying complex network theory to evaluating its combat capabilities is gaining acceptance among more scholars, gradually emerging as a novel method for assessing the system’s combat capabilities. Complex network theory can effectively analyze the dynamic and complex characteristics of a SoS and has become an important analytical method [1]. Studies on evaluating combat SoS based on complex networks primarily center on analyzing the system’s resilience to destruction [2,3], assessing the importance of system nodes [4,5,6], determining the system contribution rates [7,8], and evaluating the combat capabilities [9]. However, there is currently limited research on assessing the overall resilience of a combat SoS.
The evaluation of the resilience of a combat SoS needs to be based on the SoS’s operational capability. In practice, however, the SOS capability involves a complex open system that requires a systems approach and tools to recognize [10,11,12]. In the current research, the mainstream method for calculating the combat capability of a SOS is based on the number of kill chains. Reference [13] calculates the combat capability of the SoS based on the number of kill chains and subsequently analyzes the resilience through the changes in its combat capability. Other references that calculate the combat capability of a SoS based on the number of kill chains include references [14,15,16].
In fact, the number of kill chains that a SoS can form cannot fully describe the combat capability of the SoS, as the combat capability of the SoS often focuses more on the effective kill scale that one side of the SoS can achieve against the other. On the one hand, using only the number of kill chains cannot describe the extent of damage inflicted on the enemy SoS, as many kill chains may target the same target node, and there may be many common nodes between multiple kill chains. When the common nodes fail, this leads to the disruption of many kill chains, making the SoS inherently vulnerable, regardless of the high number of kill chains based on the common nodes. Therefore, a method based on the number of kill chains is not suitable for calculating the capability of the combat system.
The resilience capability differs from static combat capability, as it primarily captures the dynamic response of the system to external disturbances and impacts, which delineates the system’s adaptability and recovery capacity in the face of external interference. A deep understanding of the inherent nature can only be achieved through the analysis of the system’s dynamic behavior.
In response to the above problems, this study examines the effects of external factors on the capabilities of a combat SoS and proposes to characterize the resilience in terms of anti-destruction, survival, and recovery capability. The analysis involves the construction of a combat network model, which abstracts the interconnected interactions between combat elements as nodes and edges, with the performance indicators of combat elements being used to gauge their fulfillment of basic tasks within this model. The paper also presents a quantitative approach to assessing a SoS’s combat capability through the establishment of kill chain and kill network capabilities. In comparison with other research, the proposed system combat capability model aligns more closely with the processes and characteristics of system combat, making it highly relevant for enhancing system resilience and conducting resilience assessments for combat SoS. Moreover, based on the proposed system combat capability calculation model, resilience calculation models for anti-destruction, survival, and recovery capability are constructed, with simulation experiments examining the SoS’s resilience under varying attack strategies to validate the method’s effectiveness. This article primarily comprises an analysis of resilience elements and models, the development of a network model for a combat SoS, quantification of the kill chain and kill network capabilities, and analysis of simulation experiments.

2. Analysis of Elements of Combat SoS Resilience

The concept of resilience originally emerged in the field of materials, denoting a material’s capacity to revert to its original form after enduring external forces. As comprehension of the research subjects across disciplines deepened, the concept of “resilience” continuously evolved and expanded, becoming a prominent feature across various research domains. In 1973, Holling systematically elucidated the resilience of ecological systems in his paper [17], defining it as the ability of an ecological system to endure external disruptions without collapsing, gradually restoring itself. Subsequently, the integration of resilience into the realm of social ecology gained widespread acceptance. This concept was swiftly incorporated into the realms of engineering technology and military. The resilience of engineering and weapon systems has evolved into a pivotal measure of overall equipment performance. In 2011, the US Department of Defense launched a project to establish adaptable resilient engineering systems within the context of weapon equipment system construction. Likewise, the US military accentuated the resilience of space systems [18], officially defining resilience as “the capability of a type of structural system to provide the necessary functions even under adversarial actions or adverse conditions”. By 2013, the US Joint Military Operations Research Society delineated resilience as the capability of an entity to prevent, resist, absorb, respond to, and adapt to external disruptions while maintaining its fundamental structure and function.
In recent years, there has been a notable surge in interest among military researchers in the development of adaptable combat SoS, making research on resilience a prominent area within the field of military system engineering. In the context of evolving combat strategies, the pursuit of distributed and decentralized combat elements has become a key winning mechanism. This involves forming system synergy through functional decoupling and dynamic reorganization. In scenarios where combat elements are destroyed or fail, an elastic hinge bridging approach is employed to construct a highly elastic and self-healing wide area kill chain, thereby creating an elastic combat SoS. Notably, the US military has embraced concepts such as “mosaic warfare”, “kill chain”, and “joint all-domain operations”, serving as quintessential examples in this regard. Consequently, resilience has emerged as a dependable approach to a combat SoS to confront uncertain threats and generate system synergy.
The resilience of a combat SoS is primarily evidenced in the following ways:
(1)
Despite external strikes or disruptions, the combat SoS retains the ability to fulfill its mission and maintain its fundamental capabilities.
(2)
When certain combat elements are damaged or fail, resulting in a reduction in the SoS’s capability, the combat SoS can progressively restore and enhance its overall capability using strategies such as element repair, reconstruction, and dynamic adjustment.
It is evident that resilience serves as a comprehensive performance indicator. As the number of elements within the combat SoS increases and their interactions become more intricate, assessing the system’s capabilities becomes increasingly complex. Can the current combat SoS withstand enemy strikes? Will it succumb to these strikes? Can the system’s capabilities be reinstated through the repair of its combat elements, thereby achieving subsequent essential tasks? These are crucial questions that must be addressed through an assessment of the combat SoS’s resilience.
This article posits that the resilience of a combat SoS is crucial for maintaining and restoring the combat capability of the system after it is subjected to influence, suppression, or attack by hostile forces. As illustrated in Figure 1, all external interferences, suppressions, and attacks experienced by a combat SoS are classified as “influences” [19]. The impact on the combat SoS unfolds in three stages: the unimpacted stage, impacted stage, and impact elimination stage.
In Figure 1, C(T) denotes the SoS’s capability at T, while Cb(T) represents the essential capability necessary for the mission fulfillment, referred to as the task baseline. t0 marks the initial moment, while te represents the onset of the system impact. tf signifies the point at which the SoS’s combat capability declines to the task baseline. If the SoS combat capability falls below the task baseline, it indicates the SoS’s inability to carry out its mission. tm is the moment when the combat SoS’s capability reaches its lowest level, tr represents the moment that the SoS’s combat capability gradually recovers to the task baseline, and ts denotes the time at which the SoS’s combat capability is restored to its original level. Of course, not all of the SoS’s recovery capabilities are sufficient to restore the SoS capability to its original level, in which case ts can make choices based on the actual situation.
The resilience of the combat SoS manifests itself in different forms at various time stages. In [te, tf), resilience primarily lies in the system’s capability to accomplish its mission despite attacks, thus averting the rapid deterioration of its overall capability. Despite the decline in combat capability in this phase, it still satisfies the fundamental mission requirements and remains above the task baseline. This phase is commonly denoted as the anti-destruction phase. During [tf, tm), the combat capability declines further below the task baseline due to the cumulative impact of the enemy influence. Despite failing to meet the basic mission requirements, the system does not entirely collapse or become ineffective. Resilience is exemplified by hindering additional degradation of its overall capability by repairing specific combat elements; this phase is the survive phase. In [tm, ts), resilience primarily encompasses the recovery and restoration of the SoS’s capability. The capability rebounds from its lowest point and gradually restores to the level of executing basic missions, or even surpasses its initial level due to internal repair and reconstruction of the system [19].
The expressions of the three capabilities are as follows:
Definition 1. 
Anti-destruction capability CK.
From the moment the combat SoS encounters enemy attacks, the overall combat capability of the system will continue to decline. However, the system’s resilience will prevent a rapid decline in its capability, ensuring that the system can still meet the basic mission requirements and maintain the SoS’s combat capability above the task baseline. The task baseline capability represents the minimum capability required to fulfill the mission tasks. This paper posits that the anti-destruction capability stems from the components’ ability to resist destruction, maintaining a certain level of combat capability even after sustaining damage. Additionally, it originates from the pre-deployed backup kill chains within the system. Even if some of these chains are disrupted due to damage and cannot fulfill the mission tasks, other pre-deployed kill chains can be swiftly adjusted to substitute for the damaged ones, compensating for the loss in functionality and ensuring the overall completion of the combat tasks. The accumulation of the SoS’s combat capability during the resistance phase is used to depict its resilience, and the mathematical model is given by
C K = t e t f C ( T ) d t
Equation (1) physically represents the area enclosed by the SoS’s capability and the timeline in the anti-destruction phase. A larger area suggests a less severe degradation of the system’s overall capability during this phase, signifying the stronger anti-destruction capability of the combat SoS.
Definition 2. 
Survival capability CW.
The survival capability is primarily demonstrated when the capability of the SoS is lower than the task baseline requirements. After being attacked by the enemy, numerous nodes and edges within the combat SoS lose their functionality. The survive capability further resists subsequent external impacts and adapts to the damage caused by the attack, preventing a further decline in the capability and avoiding complete failure. The survival capability comes from two aspects: on the one hand, partially damaged nodes begin to restore their functionality through repairs, and on the other hand, there are still some redundant kill chains within the SoS capable of completing certain combat missions. Although they cannot meet the combat mission requirements, the SoS still possesses the ability to strike and deter the enemy. The accumulation of the SoS’s combat capability during the survival phase is used to describe the survival capability: the mathematical model is
C W = t f t m C ( T ) d t
Similar to the physical meaning of the anti-destructive capability, Equation (2) represents the area enclosed by the SoS’s combat capability and the timeline in the survival phase. The larger the area, the milder the degradation of the system’s overall capability during this phase, indicating a stronger survival capability of the combat SoS.
Definition 3. 
Recovery capability CR.
Recovery capability refers to the SoS’s capability to recover to the task baseline level or even normal levels after it has decreased to the lowest point. This recovery is achieved using measures such as node repair and reconstruction. The primary source of the recovery capability lies in the repair of damaged nodes. As more nodes regain normal functionality, the SoS’s combat capability will rise again. Therefore, the recovery capability mainly depends on the speed of node repair. The accumulation of the SoS’s combat capability during the recovery phase is used to describe the recovery capability: the mathematical model is
C R = t m t s C ( T ) d t
Similarly, Equation (3) represents the area enclosed by the SoS’s capability and the timeline in the recovery phase. The larger the area, the better the performance in the recovery of the SoS, indicating a stronger resilience of the combat SoS.
Definition 4. 
Resilience R.
The overall resilience of the combat SoS is a comprehensive reflection of the anti-destruction, survival, and recovery capability. Combined with Figure 1, this paper defines the overall resilience of the system as
R = C K + C W + C R = t e t s C ( T ) d t
Equation (4) represents the area enclosed by the SoS’s combat capability and the timeline from the initial moment of encountering the influence until the moment when the SoS’s capability is restored. Generally speaking, setting ts is not strictly required and can be determined by the actual combat analysis. It can be seen that the key to quantitative analysis of the resilience is to obtain the SoS’s combat capability C(T). The following section will provide a detailed introduction.

3. Construction of a Networked Model for a Combat SoS

3.1. Combat Network Modeling

3.1.1. Node Modeling of a Combat Network

The networked characteristics presented by modern combat SoS provide the basis for building a networked combat model. The nodes of these combat models are abstracted from combat elements with independent functionalities, such as weaponry and equipment units and task forces, and abstracted from the interrelationships between the combat elements. Many researchers have abstracted combat elements into different types of network nodes based on their functionalities: the most widely used is the Information Age Combat Model proposed by American scholar Cares [20,21]. The OODA loop (Observation, Orientation, Decision, Action) is a concept in military strategy, initially developed by US Air Force officer John Boyd in the 1950s. The theory emphasizes rapid, agile, and flexible responses to enemy actions in order to gain advantage in combat. According to the functionalities of the combat elements in the OODA loop, the model of Cares abstracts the combat elements into reconnaissance nodes, decision-making nodes, effect nodes, and target nodes, and it has been widely applied [14]. This model effectively describes the heterogeneity and complexity of combat networks, which distinguishes them from general networks. However, it tightly couples the combat elements with specific functionalities, so it is not suitable for modeling multi-functional composite nodes such as integrated reconnaissance strike drones, which simultaneously have reconnaissance and strike capabilities. Cares’ model can only abstract these as reconnaissance nodes or effect nodes. Similarly, warning aircraft with both reconnaissance and command control functions cannot be fully described by Cares’ model.
To express the multi-functional combat elements more clearly, this paper improves Cares’ model by considering composite functional nodes when constructing the node type model. Simultaneously, the paper establishes the nodes’ functional models and maps the node type model to the functional model, distinguishing different application scenarios and facilitating subsequent analysis of the impact of the nodes on the combat capability of the system.
In the combat SoS, the combat elements can be classified into the following three categories based on their functionalities:
Observation function (O): The function of implementing early warnings, detection, reconnaissance, and surveillance missions on enemy targets;
Decision function (D): The function of analyzing and processing reconnaissance and early warning information, undertaking decision analysis, and issuing combat orders;
Action function (A): The function of conducting firepower strikes and electronic jamming on enemy targets.
According to the types of functionalities that the nodes possess, the nodes can be divided into the following seven categories:
Sensor nodes (S), combat elements that only possess observation functions;
Command and control (C2) nodes (C), combat elements that only possess decision functions;
Influence nodes (I), combat elements that only possess action functions;
Sensor–command and control composite nodes (SC), combat elements that possess both observation and decision functions;
Sensor–influence composite nodes (SI), combat elements that possess both observation and action functions;
Sensor–C2–influence composite nodes (SCI), combat elements that possess observation, decision, and action functions;
Enemy target nodes (T), which mainly refer to all enemy nodes.
The mapping relationship between node types and functions is shown in Figure 2 below:
V t y p e = { v t y p e 1 , v t y p e 2 , , v t y p e i } represents a set of nodes of the same type, type ∈ {S, C, I, SC, SI, SCI, T} represents the node type, and 1, 2, …, i represent the order of the node in the set. For example, the element v s i represents the ith sensor type node, while N t y p e = { n t y p e 1 , n t y p e 2 , , n t y p e i } represents a set of nodes with the same function, with the subscript type ∈ {O, D, A} representing the function type and the superscript 1, 2, …, j representing the order of the node in the set of nodes with the same function.
The opposing sides are divided into the red side and blue side. RS, RC, and RI can, respectively, represent the red side sensor-type nodes, red side command-and-control-type nodes, and red side effect-type nodes, with similar representation methods for other nodes, which will not be elaborated on further.
The node set can be represented either by node type or node function. It can be represented as a set of nodes with different node types as
V = V R V B
In Equation (5), V R = { V R S V R C V R I V R S C V R S I V R S C I } represents the set of red nodes; V B = { V B S V B C V B I V B S C V B S I V B S C I } represents the set of blue nodes; | V | = | V B | + | V R | represents the total number of nodes for both the red and blue sides, where | V type | represents the number of nodes of type; and when analyzing problems from the perspective of the red side, all the nodes on the blue side are uniformly considered as target-type nodes, that is, VT = VB.
It should be noted that this paper assumes that different functions of composite nodes are mutually independent, and different functions do not affect each other. Only when a node is destroyed or fails due to unreliability will all its functions disappear simultaneously. The capability of a node to perform its functions under normal conditions can be described by its reliability, which represents the probability of a node to function normally, denoted as C type i , and is typically obtained from the reliability data of the combat elements.
In other cases, unless otherwise specified, this paper considers a composite node that performs a certain function as a single-type node that performs the same function, and uses this function to represent the type of the composite node. For example, when an SC node provides early warning information to other nodes, it only performs its observation function, and it can be considered an O functional node.

3.1.2. Edge Modeling of the Combat Network

The edges of the network are abstracted from the interaction relationships of the combat elements. According to the analysis of the role of the node functions in the OODA loop, there are mainly the following six types of connection relationships, corresponding to six directed edges in the network; the detailed meanings are shown in Table 1.
In Table 1, O, D, and A represent the functions provided by the nodes, and the actual node type can be determined by the mapping relationship between the function and the type. The set E = { E 1 E 2 E r E 6 } represents the edge set of the network, and E r represents the edge set formed by the r th type of interaction relationship, where r = 1 , 2 , , 6 . The edges between nodes are directed edges, representing the direction of material, information, and energy flow. An edge from a source node to a target node is denoted by e t y p e 1 - t y p e 2 i j , indicating a directed edge from node v t y p e 1 i to v t y p e 2 j .
In conclusion, the network model of the SoS can be represented by
G = ( V , E )

3.2. Edge Capability Modeling

The capability of a combat SoS to accomplish top-level mission tasks depends on numerous combat elements being able to complete their basic combat missions. In the combat network, the interaction process between nodes is the process by which various elements of the combat SoS complete basic combat missions. The edge capacity of the network represents the ability of nodes to interact and thus complete basic missions.
Edge capability refers to the possibility of the source node actively interacting with another node and establishing a directed edge, or the degree to which the source node satisfies the interaction requirements of the target node, represented as C t y p e 1 - t y p e 2 i j , C t y p e 1 - t y p e 2 i j [ 0 , 1 ] . C t y p e 1 - t y p e 2 i j represents the ability or possibility of building a directed edge from v t y p e 1 i into v t y p e 2 j . In the context of actual scenarios, C t y p e 1 - t y p e 2 i j signifies the capability of v t y p e 1 i to successfully match and execute the corresponding mission with v t y p e 2 j . The magnitude of the edge capacity depends on the extent to which the combat nodes satisfy the specific task requirements. Each combat node has multiple performance indicators related to basic combat tasks, which collectively determine the likelihood of the node’s completion of the basic tasks and consequently determine the edge capacity. This article measures the edge capacity using probabilities, assuming that the capacities of edges of the same type follow a normal distribution.

4. Combat SoS Capability Model Based on Kill Chain and Kill Network Capability

4.1. Mathematical Model of Kill Chain Capability

A kill chain refers to the closed-loop mode of task operation, in which various chain elements, based on a preplanned fixed architecture, are interdependent and operate sequentially to produce a lethal effect on a specific type of target. The fundamental characteristics of a kill chain include closure, orderliness, and dependency, with its core objective being to contribute to the effectiveness of achieving a lethal effect [22]. Reference [23] defines the continuous path of “observation–decision–strike” actions containing target nodes as the kill chain in the combat SoS network. In this paper, we continue to adopt this concept and define a kill chain as a combat loop that can effectively exert an impact on the target nodes and operate sequentially through the observation, decision-making, and effect functional nodes. Its composition structure is shown in Figure 3. The closed chain formed by the red arrows represents the kill chain of the red system against the blue target, and the closed chain formed by the blue arrows represents the kill chain of the blue system against the red target.
The premise for the formation of the combat capability of the kill chain is to form a complete OODA loop regarding the target. Based on the relationships between the node functions, typical kill chains mainly includein the Table 2.
The necessary condition for the kill chain to have a killing effect is closed, and closure can be considered as the reliable operation of each node in the kill chain and normal connections between nodes. Therefore, the kill chain capability is determined by the reliability of the nodes on the kill chain and the edge capabilities; therefore, we provide the definition of kill chain capability as follows:
Definition 5. 
The kill chain capability is the probability that the nodes and edges maintain normal connectivity in the kill chain under the influence of uncertainty factors.
If there is a kill chain to target node T, consisting of functional node n O i , n D j , n A k and target node v T m , then the capability of this kill chain is
C c h a i n = C O i C O - D i j C D j C D - A j k C A k C A - T k m
C O i , C D j , and C A k represent the reliability of the functional nodes n O i , n D j and n A k , respectively. C O - D i j , C D - A j k , and C A - T k m are the edge capabilities of the directed edges e O - D i j between node n O i and n D j , e D - A j k between node n D j and n A k , and e A - T k m between node n A k and the target node v T m .

4.2. Mathematical Modeling of Kill Network Capability

4.2.1. Description of the Kill Network Capability

The kill network is a combinational integrated entity that achieves multiple functions and multiple path kill effects by associating specific elements and executing multiple independent kill chains. Built on the basis of kill chains, the kill network is formed by overlaying different types of kill chains to form a comprehensive kill network as a whole. In the interaction process of a combat SoS, the attack on the nodes of one party by the other party is often the result of the comprehensive effect of multiple kill chains. Multiple kill chains involve the organic integration of all the operational elements into the operational action to form the network capability against a specific node of the enemy. Therefore, the kill capability of a specific node of the enemy by the entire SoS needs to be viewed from the perspective of the system’s kill network. Figure 4 illustrates a combination of two kill chains acting on a target node.
In combination with the relationship between the kill network and kill chain, as well as the definition of the kill network in relevant discussions, this paper provides the definition of the kill network capability as follows:
Definition 6. 
The comprehensive kill capability of all kill chains within the SoS against a specific enemy target is the kill network capability. The mathematical meaning is: If there are n kill chains for target T in the red combat SoS, then the kill network capability of the red SoS against T is the probability that at least one of the n kill chains works normally.
The events required for the n kill chains against T to work normally are, respectively, denoted as A 1 , A 2 , , A n . The kill network capability is the probability of at least one of these n kill chains working normally, denoted as p = { A 1 A 2 A n } .
From this, we can obtain the expression for the kill network capability of the system:
p = { A 1 A 2 A n } = p ( A 1 ) + p ( A 2 ) + + p ( A n ) [ p ( A 1 A 2 ) + p ( A 1 A 3 ) + + p ( A 1 A n ) ] + + ( 1 ) n 1 p ( A 1 A 2 A n )
Due to the existence of common nodes between kill chains, the events A 1 , A 2 , , A n are not independent events, and solving the above problem directly requires a large amount of computation. However, the kill network capability of the SoS is the probability of all nodes within the combat SoS forming a path around the target node. If the target node is split into source and terminal nodes, the above problem can be transformed into a two-terminal network connectivity problem. The two-terminal network connectivity problem aims to find the probability of a connection (i.e., the existence of a path) between the source node s and the terminal node t . This problem has been widely studied in the contexts of infrastructure, communication, and wireless networks [24,25,26].
There are currently several exact solution methods for the two-terminal connectivity of networks [27,28,29], and reference [30] has proven that the exact solution to the problem in networks is an NP-hard problem. In addition, the existing analytical solution methods mainly focus on equiprobable networks. However, the network of this paper has non-equal connection probabilities, and the node types are heterogeneous, which makes it a non-equiprobable network. Analytical calculations require additional computational complexity. The advantage of the Monte Carlo simulation method lies in the speed of convergence of its error, which is independent of the scale and dimension of the problem and only depends on the number of simulations. Therefore, its time complexity is O ( N ) , where N is the total number of simulations per run. To avoid the exponential explosion problem caused by an increase in the network size, this paper adopts the Monte Carlo simulation method to solve the kill chain capability of the system.

4.2.2. Solving the Kill Network Capability Based on Monte Carlo Simulation

The Monte Carlo simulation (MCS) method uses multiple experiments to determine the on–off frequency of the network’s two points. According to the Kolmogorov Strong Law of Large Numbers, when the number of simulations is large enough, the on–off frequency will approach the connectivity probability of the two points. It can be divided into the following parts:
(1)
Determine the adjacency matrix
The adjacency matrix reflects the matrix of interactive relationships between nodes, aiming to properly describe the various interaction relationships between nodes. First, based on the six types of relationships between nodes, including early warning reconnaissance, intelligence uploading, collaborative reconnaissance, collaborative decision-making, command execution, and effect application, subnetworks describing these six relationships are established:
G 1 = ( V , E 1 )
G 2 = ( V , E 2 )
G 3 = ( V , E 3 )
G 4 = ( V , E 4 )
G 5 = ( V , E 5 )
G 6 = ( V , E 6 )
In Equations (9)–(14), G 1 is the reconnaissance relationship network between observation functional nodes and target nodes; G 2 is the interaction relationship network between observation and decision functional nodes; G 3 is the interaction relationship network between observation functional nodes; G 4 is the interaction relationship network between decision functional nodes; G 5 is the interaction relationship network between decision and action functional nodes; and G 6 is the interaction relationship network between action and enemy target class nodes. The adjacency matrices of the six subnetworks are M 1 , M 2 , M 3 , M 4 , M 5 , and M 6 . When there is an interaction relationship between corresponding nodes, the elements of the adjacency matrix represent the probability of interaction between the nodes. The adjacency matrix of the overall network of the combat SoS is denoted as M .
M = M 1 + M 2 + M 3 + M 4 + M 5 + M 6
(2)
Determining the kill chain on–off situation in the kth sampling
In the k th sampling, x t y p e i represents the operational status of node v t y p e i , where x t y p e i = 1 indicates that the v t y p e i node is operating normally in this sampling, and x t y p e i = 0 indicates otherwise.
x t y p e i = { 1 , θ k R t y p e i 0 , θ k > R t y p e i
According to the E 1 ~ E 6 edge relationship constraint, y t y p e 1 - t y p e 2 i n represents the edge e t y p e 1 - t y p e 2 i n status between nodes v t y p e 1 i and v t y p e 2 n in this sampling. y t y p e 1 - t y p e 2 i n = 1 indicates the existence of active interaction, and y t y p e 1 - t y p e 2 i n = 0 indicates the absence of active interaction.
y t y p e 1 - t y p e 2 i n = { 1 , ε k C t y p e 1 - t y p e 2 i n 0 , ε k > C t y p e 1 - t y p e 2 i n
In Equations (16) and (17), θ k and ε k are random values generated in the k th sampling, θ k , ε k [ 0 , 1 ] . Based on θ k , ε k , the node reliability, and edge capacity, the status of the nodes and edge connections in the k th sampling can be determined, thus establishing the network structure and obtaining the adjacency matrix for each sampling state.
According to the high-order adjacency matrix method for solving the directed graph cycle theorem, the number of operational cycles for a specific node in a directed operational network corresponds to the diagonal elements of the matrix obtained after multiple adjacency matrix multiplications. Let W m be the adjacency matrix of network G m , where m = 1 , 2 , 3 , 4 ; then,
W T - O - D - A - T = W 1 W 2 W 5 W 6
W T - O - O - D - A - T = W 1 W 3 W 2 W 5 W 6
W T - O - D - D - A - T = W 1 W 2 W 4 W 5 W 6
W T - O - O - D - D - A - T = W 1 W 3 W 2 W 4 W 5 W 6
The subscripts of the matrices W T - O - D - A - T , W T - O - O - D - A - T , W T - O - D - D - A - T , and W T - O - O - D - D - A - T correspond to the types of kill chains, and their diagonal elements, respectively, represent the number of kill chains targeting enemy target nodes for each type of kill chain. Taking the matrix W T - O - D - A - T as an example, the values of the diagonal elements corresponding to the target node numbers represent the number of T-O-D-A-T-type kill chains targeting the corresponding targets.
(3)
Calculation of the SoS’s capability to attack nodes
In k samplings, the occurrence of kill chains targeting the node v T i appeared a total of k ^ times. The SoS’s capability to attack the node v T i is
p i = k ^ k
Based on the description in items (1) to (3), a flow chart for solving the kill chain capability based on Monte Carlo simulation is constructed, as shown in Figure 5.

4.3. Mathematical Model of Combat SoS’s Capability

The kill network capability can be expressed as the combat capability of the SoS against a specific enemy node. However, it is more important to analyze the overall impact on the enemy’s system. This paper considers establishing a model of the SoS’s combat capability, making it easier to analyze the SoS’s resilience based on changes in the system’s combat capability.
Definition 7. 
The SoS’s combat capability refers to the likelihood of one combat SoS causing a certain scale of node damage to the other SoS. The greater the likelihood, the stronger the SoS’s combat capability.
If the enemy has t nodes, the kill network capabilities of our SoS against the enemy nodes are p 1 , p 2 , , p t , respectively. Assuming that the effects on different nodes do not affect each other, the probability p m of destroying m nodes among the enemy’s t nodes can be represented as follows.
When m = 0 ,
P 0 = P { m = 0 } = ( 1 p 1 ) ( 1 p 2 ) ( 1 p t )
When m = 1 ,
P 1 = P { m = 1 } = p 1 ( 1 p 2 ) ( 1 p t )   + ( 1 p 1 ) p 2 ( 1 p 3 ) ( 1 p t )   + + p t ( 1 p 1 ) ( 1 p 2 ) ( 1 p t 1 )   = k = 1 t p k ( l = 1 l k t ( 1 p l ) )
When m = 2 ,
P 2 = P { m = 2 } = p 1 p 2 ( 1 p 3 ) ( 1 p t ) + p 1 p 3 ( 1 p 2 ) ( 1 p t )   + + p t 1 p t ( 1 p 1 ) ( 1 p 2 ) ( 1 p t 1 )   = i = 1 t j = i + 1 t p i p j (   l = 1 l i , j t ( 1 p l ) )
We can deduce that
P m = i = 1 t j = i + 1 t k = i + m 1 t p i p j p k ( l = 1 l i , j , , k t ( 1 p l ) )
If the damage to nodes of “a certain scale” is considered to be at least causing m nodes to be damaged, then the combat capability of the system can be represented by
C = i = m t p m
Once the combat capability of the SoS is obtained, the resilience of the system can be analyzed based on Equations (1)–(3). According to the above content, the logical framework for analyzing the resilience of the combat SoS in this paper is shown in Figure 6.

5. Analysis and Verification of Indicator Rationality

5.1. Design of Attack and Reconstruction Strategy

Nodes are the basic entities of the combat network, so all faults and attacks occur at the nodes. The state of the nodes will further affect the state of the edges, thereby further affecting the combat capability of the SoS. In the existing research, attack strategies can mainly be divided into two types: random attacks and deliberate attacks.

5.1.1. Analysis and Design of Attack Strategy

(1)
Random attack strategy
Random attacks refer to the enemy not distinguishing between the types and importance of our nodes and conducting attacks on nodes in a completely random manner. This attack strategy is suitable for scenarios where the enemy is unclear about the internal nodes and structure of our SoS, highlighting the randomness and uncertainty of the threat. Under the random attack mode, Y k represents the number of our nodes lost in the k th wave, and Y k ~ b ( | V R | , p a ) follows a binomial distribution. P a is the probability of each node being subjected to a random attack. After being attacked, the node is damaged, and all its edges become ineffective.
(2)
Deliberate attack strategy
Deliberate attacks are based on the enemy’s thorough understanding of our SoS’s structure. The enemy can determine the importance of nodes based on the information it has and conduct attacks according to the importance of the nodes. In practice, high-military-value targets are often prioritized, and nodes with high importance are attacked first. There are different calculation methods for the node importance, including the node degree, node betweenness, network performance gradient [31], node cohesion, and density. In this paper, the method of node degree is used to determine the deliberate attack strategy for nodes. In an undirected unweighted network, the degree k t y p e i of node v t y p e i represents the number of edges connected to that node. Since the combat network in this paper is a directed weighted network, the degree k t y p e i of node v t y p e i is defined as the sum of the weights of all edges connected to v t y p e i . Before initiating the attack, it is assumed that the blue side determines the attack order based on the size of the red side’s node degrees. For comparative analysis, the number of nodes lost under a deliberate attack strategy is the same as under a random attack strategy within the same time frame.

5.1.2. Reconstruction Strategy

A SoS typically has two strategies to deal with external disturbances: (1) task reorganization of the SoS structure; (2) maintenance and repair of the components. Among them, task reorganization of the system structure in the combat network is manifested as the activation of backup redundant kill chains, which is related to the structural properties of the system itself. Maintenance and repair of the components mainly involve repair of the damaged nodes. Node repair refers to the repair of nodes that have been damaged and are in a failed state, and this repair process takes time. If node v t y p e i fails at time t 1 , the repair begins from the moment of failure, and the reliability of the node is 0 when it is in a failed state. By time t 2 , node v t y p e i restores its original reliability level and reestablishes normal relationships with other nodes before the failure. This process is the node repair process, and the duration of node repair is related to the node type, depending on the actual difficulty of the repair of the combat forces.

5.2. Rationality Analysis of the SoS Combat Capability Calculation Model

To validate the rationality of the SoS capability calculation method proposed in this paper and its superiority compared to other methods, this section conducts an analysis and validation comparing it with the method proposed by Li Jichao in the references [15,16]. The main steps for calculating the combat capability using Li’s method are:
Step 1
For a certain kill chain l j , the set of sensor nodes it contains is S = { s j } , the set of decision-making nodes is D = { d j } , and the set of influence nodes is I = { i j } . The combat capability of this kill chain is represented by
U ( l j ) = 1 | l j | × max s j S C A S ( s j ) × max d j D C A D ( d j ) × max i j I C A I ( i j )
where C A S ( s j ) , C A D ( d j ) , and C A I ( i j ) are the capabilities of the sensor, decision-making, and influence nodes in the system, respectively, while | l j | is the length of the kill chain l j .
Step 2
For a combat SoS, if it contains a set of m kill chains, L G = { l k }   k = 1 , 2 , 3 , , m , then the combat capability of this SoS is represented by
J ( G ) = l k L G U ( l k )
Suppose the reliability of each functional node and edge capability of our SoS follow a normal distribution, and the detailed information of nodes is shown in Table 3.
Based on the above data, the number of Monte Carlo simulations is set to 2000. To ensure the stability of the results using Li’s method, the mean of the kill chain capability is also calculated 2000 times. During the simulation verification process, the change trend in the SoS capability is analyzed using both random and deliberate attack strategies. Assuming that the number of nodes in our SoS is 40, and the number of target nodes is 15, 20, 25, 30, 35, and 40, the method in this paper sets the enemy’s damage scale at 70%, indicating that the SoS’s combat capability represents the probability of causing damage to over 70% of the enemy’s nodes in our combat SoS.
The performance of the two methods is shown in Figure 7.
The simulation results are shown in Figure 7a–f. From Figure 7, it can be seen that as the number of target nodes increases, the initial value of the SoS’s combat capability by Li’s method will also increase. This is because the calculation of the SoS’s combat capability using Li’s method relies on the number of kill chains. When the node reliability and edge capability remain unchanged, the more target nodes there are, the more kill chains can be formed from the nodes to the enemy’s nodes, resulting in a larger initial value of the SoS’s combat capability. This does not align with the view that combat capability is an essential attribute of the combat SoS itself, and the combat capability of our system is inherent to the system and should not change due to variations in the number of enemy nodes. In contrast, the method proposed in this paper does not depend on the number of enemy nodes and the number of kill chains but focuses more on the overall effectiveness of the system’s combat, thereby achieving a comprehensive measurement of the combat capability.
At the same time, when the number of deleted nodes is small, the SoS’s combat capability computed in this paper remains unchanged, indicating that the loss of a few nodes does not affect the SoS’s capability to complete basic tasks. Other pre-existing kill chains in the SoS can compensate for the broken kill chains caused by the failed nodes. In contrast, as the SoS’s combat capability depends on the number of kill chains, the SoS’s combat capability calculated using Li’s method begins to decrease when a small number of nodes are deleted. This method fails to describe the robustness of the SoS when some nodes are lost, and the change in trends also fails to reflect the collapse effect of the SoS’s capability and is unable to reflect mutations in the combat SoS.
However, both methods indicate that a deliberate attack strategy results in a faster decrease in the SoS’s combat capability compared to a random attack strategy, indicating that the loss of more important nodes has a greater impact on the SoS’s combat capability.

5.3. Resilience Analysis under Different Attack Strategies

Let us assume that the combat SoS begins to suffer the first wave of attacks from the enemy at t 1 = 4  h and then encounters an attack every hour, experiencing a total of five5 waves of enemy attacks. Under the random attack strategy, the probability of all combat nodes being attacked within each wave is P a = 0.20 ; under the deliberate attack strategy, the number of nodes lost in each wave is the same as the random attack strategy, but the nodes with high importance will be attacked first. Once attacked, the node immediately fails, and all connected edges also fail. After the failure, the node starts to recover, and the recovery time depends on the type of node. It is assumed that the recovery time for different types of nodes is as shown in Table 4.
This experiment only considers the situation where the nodes are affected by external interference and does not consider failures caused by the unreliability of the nodes themselves. Therefore, at the initial moment, the reliability of our combat nodes is set to 1. Unless otherwise specified, the node is the same as in Table 3. The task baseline is set to 0.7, which means that the probability of causing effective damage to more than 70% of the enemy’s targets needs to reach 0.7.
The importance of our combat nodes is measured according to the node degree, and the importance of our combat nodes is as seen in Table 5.
The nodes are ranked in order of importance as
v S C I 3 v S C I 4 v S C I 2 v S C I 1 v S C 6 v S C 5 v S C 1 v S C 4 v S C 2 v S C 3 v S C 7 v S C 8 v S I 6 v S I 5 v S I 2 v S I 8 v S I 3 v S I 7 v S I 1 v S I 4 v S 3 v S 4 v S 2 v S 1 v C 5 v C 6 v C 2 v C 1 v C 4 v C 8 v C 3 v C 7 v I 4 v I 8 v I 7 v I 1 v I 5 v I 6 v I 3 v I 2
From the ranking, it can be seen that the importance of the composite functional nodes is higher than that of single functional nodes, and they will be given priority in deliberate attacks. In a certain experiment, the situation of losing nodes within each wave under the two strategies is shown in Table 6. It can be seen that there is no obvious pattern of losing nodes under random attacks, while deliberate attacks give priority to losing composite functional nodes with higher importance.
The resilience performance of the combat SoS is shown in Figure 8 and Figure 9. From Figure 8, it can be seen that the combat SoS exhibits better resilience in response to random attacks compared to deliberate attacks. At the beginning of the attack at t = 5 h, the operational capability of the system under deliberate attacks starts to decline rapidly. This is because during the first wave of attacks, the combat SoS loses many nodes with high importance, which are highly involved in constructing the kill chain and kill network. However, the combat capability of the SoS under random attacks remains stable for a certain period of time because the loss of some nodes does not significantly affect the operational capability. However, with an increasing number of attack waves, the number of nodes lost under both strategies increases, leading to a further decrease in the operational capability of the combat SoS, falling below the task baseline and even reaching 0. As time progresses, the failed nodes of the SoS begin to recover gradually, and the operational capability of the SoS under the random attack strategy gradually increases. In contrast, the operational capability of the SoS under deliberate attacks remains at zero for a longer period, representing that during this period, the probability of causing damage to 70% of the enemy’s targets by the own combat SoS is 0. This is because the failures under deliberate attack strategies are mostly in composite functional nodes, which have a longer recovery time, leading to slower recovery of the operational capability.
The anti-destruction capability, survival capability, recovery capability, and overall resilience under different attack strategies are shown in Table 7:
Combining Figure 9 and Table 7, it can be seen that under both strategies, the combat SoS exhibits similar persistence. However, the SoS’s anti-destruction and recovery capability under deliberate attacks are significantly inferior to those under random attack strategies. The overall resilience of the system under random attacks also outperforms that under deliberate attack strategies.

6. Conclusions

This paper constructs a combat network model and proposes a method for quantifying the combat SoS’s combat capability and resilience, describing the resilience of the SoS from the dimensions of anti-destruction, survival, and recovery ability. Experimental verification shows that the capability indicators proposed in this paper have advantages in measuring the SoS’s resilience, reflecting the practical combat process performance, rather than relying on subjective human judgment.
Specifically, the problem of solving the combat SoS’s combat capability is transformed into a network two-terminal connectivity problem. Considering the infeasibility of obtaining an analytical solution, the Monte Carlo method is used to solve the two-terminal connectivity of the network.
Based on the method presented in this paper, it is possible to conduct an analysis and assessment of the resilience capability of an actual combat SoS, and follow-up analyses will be conducted based on the actual performance of a combat SoS.

Author Contributions

Conceptualization, W.L. and T.Z.; methodology and other work, W.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

All the data generated or analyzed during this study are included in this published article.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Tang, Y.; Dai, G.; Zhou, Y.; Huang, Y.; Zhou, D. Conflicting evidence fusion using a correlation coefficient-based approach in complex network. Chaos Solitons Fractals 2023, 176, 114087. [Google Scholar] [CrossRef]
  2. Wang, Y.; Chen, S.; Pan, C.; Chen, B. Measure of invulnerability for command and control network based on Mission Link. Inf. Sci. 2018, 426, 148–159. [Google Scholar]
  3. Li, J.; Tan, Y.; Yang, K.; Zhang, X.; Ge, B. Structural robustness of combat networks of weapon system-of-systems based on the Operation Loop. Int. J. Syst. Sci. 2016, 48, 659–674. [Google Scholar] [CrossRef]
  4. Yang, P.; Hu, S.; Zhou, S.; Zhang, J. A topological sensitive node importance evaluation method in Aerospace Information Networks. Sensors 2022, 23, 266. [Google Scholar] [CrossRef] [PubMed]
  5. Tian, G.; Yang, X.; Li, Y.; Yang, Z.; Chen, G. Hybrid weighted communication network node importance evaluation method. Front. Phys. 2023, 11, 1133250. [Google Scholar]
  6. Liu, C.; Wang, J.; Xia, R. Node Importance Evaluation in multi-platform avionics architecture based on Topsis and PageRank. EURASIP J. Adv. Signal Process. 2023, 2023, 27. [Google Scholar] [CrossRef]
  7. Xu, R.; Liu, X.; Cui, D.; Xie, J.; Gong, L. An evaluation method of contribution rate based on fuzzy Bayesian networks for equipment system-of-systems architecture. J. Syst. Eng. Electron. 2023, 34, 574–587. [Google Scholar] [CrossRef]
  8. Li, J.; Zhao, D.; Jiang, J.; Yang, K.; Chen, Y. Capability oriented equipment contribution analysis in temporal combat networks. IEEE Trans. Syst. Man Cybern. Syst. 2021, 51, 696–704. [Google Scholar] [CrossRef]
  9. Nie, J.F.; Chen, X.J.; Shi, H.Q. Dynamic Super-network model of task-oriented naval fleet “Cloud Combat” system. Acta Armamentarii 2021, 42, 2513–2521. (In Chinese) [Google Scholar]
  10. Koivisto, J.; Ritala, R.; Vilkko, M. Conceptual model for capability planning in a military context—A systems thinking approach. Syst. Eng. 2022, 25, 457–474. [Google Scholar] [CrossRef]
  11. Anteroinen, J. The Holistic Military Capability Life Cycle Model. In Proceedings of the 2012 7th International Conference on System of Systems Engineering (SoSE), Genova, Italy, 16–19 July 2012. [Google Scholar]
  12. Kuikka, V. Probabilistic modelling of system capabilities in Operations. Systems 2023, 11, 115. [Google Scholar]
  13. Han, Q.; Pang, B.; Li, S.; Li, N.; Guo, P.; Fan, C.; Li, W. Evaluation method and optimization strategies of resilience for Air & space defense system of systems based on kill network theory and improved self-information quantity. Def. Technol. 2023, 21, 219–239. [Google Scholar]
  14. Li, J.; Yang, K.; Fu, C.; Zhang, X.; Chen, Y. An operational efficiency evaluation method for weapon system-of-systems combat networks based on Operation Loop. In Proceedings of the 2014 9th International Conference on System of Systems Engineering (SOSE), Glenelg, Australia, 9–13 June 2014. [Google Scholar]
  15. Li, J.; Ge, B.; Jiang, J.; Yang, K.; Chen, Y. High-end weapon equipment portfolio selection based on a heterogeneous network model. J. Glob. Optim. 2018, 78, 743–761. [Google Scholar]
  16. Li, J.; Zhao, D.; Ge, B.; Jiang, J.; Yang, K. Disintegration of operational capability of heterogeneous combat networks under incomplete information. IEEE Trans. Syst. Man Cybern. Syst. 2020, 50, 5172–5179. [Google Scholar]
  17. Pan, X.; Wang, H.; Yang, Y.; Zhang, G. Resilience Based Importance Measure Analysis for SoS. J. Syst. Eng. Electron. 2019, 30, 920. Available online: https://apps.dtic.mil/sti/pdfs/AD1032526.pdf (accessed on 20 November 2023).
  18. Chen, Z.; Zhou, Z.; Zhang, L.; Cui, C.; Zhong, J. Mission Reliability Modeling and evaluation for reconfigurable unmanned weapon system-of-systems based on effective Operation Loop. J. Syst. Eng. Electron. 2023, 34, 588–597. [Google Scholar]
  19. Chen, Z.; Hong, D.; Cui, W.; Xue, W.; Wang, Y.; Zhong, J. Resilience evaluation and optimal design for weapon system of systems with dynamic reconfiguration. Reliab. Eng. Syst. Saf. 2023, 237, 109409. [Google Scholar]
  20. Cares, J.R. An Information Age Combat Model; Alidade, Inc.: Newport, PR, USA, 2004; pp. 85–90. [Google Scholar]
  21. Cares, J.R. Distributed Networked Operations: The Foundations of Network Centric Warfare; iUniverse Inc.: Lincoln, NE, USA, 2005; pp. 63–69. [Google Scholar]
  22. Yang, S.; Wang, W.; Li, X.; Wang, T.; Li, B.; He, H. A review of the conceptual development and research status of kill chain. In Proceedings of the Third Systems Engineering Conference—Complex Systems and Systems Engineering Management, Zhuhai, China, 28 June–2 July 2021; pp. 67–72. [Google Scholar]
  23. Wang, Y.; Shang, B.; Song, P.; Ke, E.Q. A method for identifying key nodes of combat system network based on kill chain. Syst. Eng. Electron. 2023, 45, 736–744. Available online: http://kns.cnki.net/kcms/detail/11.2422.TN.20220615.1421.015.html (accessed on 3 November 2022).
  24. Davila-Frias, A.; Yadav, O.P.; Salem, S.; Jain, R. All-terminal network reliability estimation with Graph Neural Networks. In Proceedings of the 2022 Annual Reliability and Maintainability Symposium (RAMS), Tucson, AZ, USA, 24–27 January 2022. [Google Scholar]
  25. Brown, J.I.; Colbourn, C.J.; Cox, D.; Graves, C.; Mol, L. Network reliability: Heading out on the highway. Networks 2020, 77, 146–160. [Google Scholar]
  26. Davila-Frias, A.; Yodo, N.; Le, T.; Yadav, O.P. A deep neural network and Bayesian method based framework for all-terminal network reliability estimation considering degradation. Reliab. Eng. Syst. Saf. 2023, 229, 108881. [Google Scholar]
  27. Monfared, M.A.S.; Rezazadeh, M.; Alipour, Z. Road networks reliability estimations and optimizations: A bi-directional bottom-up, top-down approach. Reliab. Eng. Syst. Saf. 2022, 222, 108427. [Google Scholar] [CrossRef]
  28. Brown, J.; DeGagné, C.D. Roots of two-terminal reliability polynomials. Networks 2020, 78, 153–163. [Google Scholar] [CrossRef]
  29. Dohmen, K. Inclusion-exclusion and network reliability. Electron. J. Comb. 1998, 5, R36. [Google Scholar]
  30. Ball, M.O. Complexity of network reliability computations. Networks 1980, 10, 153–165. [Google Scholar] [CrossRef]
  31. Yu, X.; Li, Y.; Zheng, X. Node importance evaluation based on communication network performance grads. J. Tsinghua Univ. (Sci.Technol.) 2008, 48, 542–544. [Google Scholar]
Figure 1. Process of change in the capabilities of combat SoS.
Figure 1. Process of change in the capabilities of combat SoS.
Systems 12 00031 g001
Figure 2. Node types and function mapping relationships.
Figure 2. Node types and function mapping relationships.
Systems 12 00031 g002
Figure 3. Kill chain diagram.
Figure 3. Kill chain diagram.
Systems 12 00031 g003
Figure 4. Illustration of two kill chains.
Figure 4. Illustration of two kill chains.
Systems 12 00031 g004
Figure 5. Monte Carlo simulation flow.
Figure 5. Monte Carlo simulation flow.
Systems 12 00031 g005
Figure 6. Logical framework diagram.
Figure 6. Logical framework diagram.
Systems 12 00031 g006
Figure 7. Performance of the two methods under different attack strategies. (a) The number of target nodes is 15. (b) The number of target nodes is 20. (c) The number of target nodes is 25. (d) The number of target nodes is 30. (e) The number of target nodes is 35. (f) The number of target nodes is 40.
Figure 7. Performance of the two methods under different attack strategies. (a) The number of target nodes is 15. (b) The number of target nodes is 20. (c) The number of target nodes is 25. (d) The number of target nodes is 30. (e) The number of target nodes is 35. (f) The number of target nodes is 40.
Systems 12 00031 g007
Figure 8. Combat capability of the SoS under two attack strategies.
Figure 8. Combat capability of the SoS under two attack strategies.
Systems 12 00031 g008
Figure 9. SoS resilience performance under two attack strategies. (a) Resilience under random attack. (b) Resilience under deliberate attack.
Figure 9. SoS resilience performance under two attack strategies. (a) Resilience under random attack. (b) Resilience under deliberate attack.
Systems 12 00031 g009
Table 1. Node connection relationships.
Table 1. Node connection relationships.
NumberEdgeSignificance
1 E 1 : T O Target nodes are detected by observation functional nodes
2 E 2 : O D Observation functional nodes upload intelligence information to decision functional nodes
3 E 3 : O O Sharing of reconnaissance intelligence information between observation functional nodes
4 E 4 : D D Sharing of decision informational between decision function nodes
5 E 5 : D A Decision functional nodes issue commands to the action functional nodes
6 E 6 : A T Action functional nodes strike the target enemy nodes
Table 2. Typical kill chains.
Table 2. Typical kill chains.
Killing ChainMeaning
T-O-D-A-TBasic kill chain
T-O-O-D-A-TKill chain including collaborative reconnaissance
T-O-D-D-A-TKill chain including decision-making synergy
T-O-O-D-D-A-TKill chain including coordinated reconnaissance and decision-making
Table 3. Nodes of operation.
Table 3. Nodes of operation.
Node
Type
Proportion (%)Functional TypeEdge Capability ExpectationEdge Capability VarianceReliability ExpectationReliability
Variance
S10O0.20.10.850.02
C20D0.20.10.850.02
I20A0.20.10.850.02
SC20O0.20.10.850.02
D0.20.1
SI20O0.20.10.850.02
A0.20.1
SCI10O0.20.10.850.02
D0.20.1
A0.20.1
Table 4. Node recovery durations.
Table 4. Node recovery durations.
Node TypeSCISCSISCI
Recovery Duration
(h)
5558810
Table 5. The degree of importance of our combat SoS nodes.
Table 5. The degree of importance of our combat SoS nodes.
Node v S 1 v S 2 v S 3 v S 4 v C 1 v C 2 v C 3 v C 4 v C 5 v C 6
Degree21.1621.7122.5521.7716.0616.0815.2415.7117.7917.36
Node v C 7 v C 8 v I 1 v I 2 v I 3 v I 4 v I 5 v I 6 v I 7 v I 8
Degree14.0415.5311.6410.9210.9312.6111.4211.3211.7411.94
Node v S C 1 v S C 2 v S C 3 v S C 4 v S C 5 v S C 6 v S C 7 v S C 8 v S I 1 v S I 2
Degree37.4536.9336.6737.1138.0938.4536.2436.1231.9434.64
Node v S I 3 v S I 4 v S I 5 v S I 6 v S I 7 v S I 8 v S C I 1 v S C I 2 v S C I 3 v S C I 4
Degree34.1731.4235.8435.9831.9734.5647.4848.4149.4349.03
Table 6. The situation of losing nodes in each wave.
Table 6. The situation of losing nodes in each wave.
WaveRandom AttackDeliberate Attack
The Attacked NodesThe Number of Attacked NodesThe Attacked NodesThe Number of Attacked Nodes
Wave 1
( t = 5 h )
v S 1 , v S 2 , v S 3 , v C 2 , v C 4 , v C 5 , v C 8 , v I 3 , v I 8 , v S C 3 , v S I 1 , v S I 5 , v S C I 3 13 v S C I 3 , v S C I 4 , v S C I 2 , v S C I 1 , v S C 6 , v S C 5 , v S C 1 , v S C 4 , v S C 2 , v S C 3 , v S C 7 , v S C 8 , v S I 6 13
Wave 2
( t = 6 h )
v S C 8 , v S C 4 , v S C I 1 3 v S I 5 , v S I 2 , v S I 8 3
Wave 3
( t = 7 h )
v C 7 , v I 7 , v S C 7 , v S C I 2 4 v S I 3 , v S I 7 , v S I 1 , v S I 4 4
Wave 4
( t = 8 h )
v S 4 , v C 1 , v I 4 , v S I 2 4 v S 3 , v S 4 , v S 2 , v S 1 4
Wave 5
( t = 9 h )
v C 3 , v I 2 , v S I 4 , v S I 6 4 v C 5 , v C 6 , v C 2 , v C 1 4
Table 7. Combat SoS resilience under two attack strategies.
Table 7. Combat SoS resilience under two attack strategies.
Attack StrategyAnti-Destruction CapabilitySurvival CapabilityRecovery CapabilityResilience
Random attack6.60800.412120.131127.1512
Deliberate attack4.51650.396517.422322.3353
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Chen, W.; Li, W.; Zhang, T. Complex Network-Based Resilience Capability Assessment for a Combat System of Systems. Systems 2024, 12, 31. https://doi.org/10.3390/systems12010031

AMA Style

Chen W, Li W, Zhang T. Complex Network-Based Resilience Capability Assessment for a Combat System of Systems. Systems. 2024; 12(1):31. https://doi.org/10.3390/systems12010031

Chicago/Turabian Style

Chen, Wenyu, Weimin Li, and Tao Zhang. 2024. "Complex Network-Based Resilience Capability Assessment for a Combat System of Systems" Systems 12, no. 1: 31. https://doi.org/10.3390/systems12010031

APA Style

Chen, W., Li, W., & Zhang, T. (2024). Complex Network-Based Resilience Capability Assessment for a Combat System of Systems. Systems, 12(1), 31. https://doi.org/10.3390/systems12010031

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop