Kill Chain Search and Evaluation of Weapon System of Systems Based on GAT-DFS
Abstract
1. Introduction
- Unlike most equipment system graph models, this paper embeds indicator information into the graph model nodes to construct a WSoS network model with richer information.
- Through GAT learning to encode node attributes and network topology information, the embedded information is used as inspiration information to guide the search direction of DFS, expanding the research field of graph data mining and analysis of WSoS network models.
- The simulation experiment covers the complete process from modeling and analysis to kill chain assessment, forming an “end-to-end” assessment process. The effectiveness of the proposed method is verified through comparison and experimental analysis.
2. WSoS Network Model Based on OODA Loop
2.1. WSoS Modeling
2.2. Capability Index System of WSoS
2.3. Embedding of Indicators and Attributes of WSoS Nodes
3. Search Evaluation Algorithm Based on GAT-DFS
3.1. Limitations of the DFS Algorithm
- Step 1: First visit vertex , where is the number of a node in the graph;
- Step 2: Calculate the adjacent nodes of node , traverse all adjacent nodes, and search along the connected paths to ensure that all vertices are visited;
- Step 3: Ensure that all vertices in the graph are visited, and repeat Step 1 and Step 2 from the vertices that have not been visited until all vertices are visited. The DFS algorithm can be understood in conjunction with the Fibonacci sequence, which is shown in Formula (4).
3.2. Design of GAT-DFS Algorithm
- Step 1: Process the network model of the WSoS and convert the model into graph data that can be read by GAT;
- Step 2: Read the WSoS graph data , and use GAT to extract node feature vectors.
- Step 3: Determine the kill chain metapath as the graph path pattern, such as ;
- Step 4: Find the vertex through the graph path pattern, such as the node with node type is the current path pattern vertex;
- Step 5: Traverse the nodes that are vertices in the graph and select one of the vertices to search deeply;
- Step 6: Calculate the edge adjacent nodes of the node that meets the path pattern position currently searched to form a list;
- Step 7: Index the calculated node-embedding vector similarity matrix to sort the adjacent node list. The calculation formula of cosine similarity is shown in Formula (9);
- Step 8: If a node that meets the path pattern is found, add the node to the current search path and search for the next node until the path pattern is fully met and finally return to the starting vertex to save the searched path;
- Step 9: Repeat Step 4–Step 7 until all nodes that meet the vertex conditions of the graph path pattern are traversed and the final searched path is output;
- Step 10: Perform performance calculation and output the effectiveness evaluation results of the searched kill chain.
4. Example Analysis
4.1. Construction of WSoS Network
4.2. Graph Dataset Construction
4.3. Obtaining Node-Embedding Vectors
4.4. Kill Chain Search and Effectiveness Evaluation
5. Discussion and Conclusions
Author Contributions
Funding
Data Availability Statement
DURC Statement
Conflicts of Interest
References
- Rashid, A.B.; Kausik, A.K.; Al Hassan Sunny, A.; Bappy, M.H. Artificial Intelligence in the Military: An Overview of the Capabilities, Applications, and Challenges. Int. J. Intell. Syst. 2023, 8676366. [Google Scholar] [CrossRef]
- Sharma, P.; Sarma, K.K.; Mastorakis, N.E. Artificial Intelligence Aided Electronic Warfare Systems-Recent Trends and Evolving Applications. IEEE Access 2020, 8, 224761–224780. [Google Scholar] [CrossRef]
- Chin, W. Technology, War and the State: Past, Present and Future. Int. Aff. 2019, 95, 765–783. [Google Scholar] [CrossRef]
- Maurer, J.D. The Future of Precision-Strike Warfare. Nav. War Coll. Rev. 2023, 76, 13–38. [Google Scholar]
- Chen, Z.; Hong, D.; Cui, W.; Xue, W.; Wang, Y.; Zhong, J. Resilience Evaluation and Optimal Design for Weapon System of Systems with Dynamic Reconfiguration. Reliab. Eng. Syst. Saf. 2023, 237, 109409. [Google Scholar] [CrossRef]
- Li, J.; Tan, Y.; Yang, K.; Zhang, X.; Ge, B. Structural Robustness of Combat Networks of Weapon System-of-Systems Based on the Operation Loop. Int. J. Syst. Sci. 2017, 48, 659–674. [Google Scholar] [CrossRef]
- Chen, D.; Chen, C.; Zhou, C. Importance Evaluation of Kill Web Nodes Based on OODA Loop. Acta Armamentarii 2024, 45, 363–372. [Google Scholar] [CrossRef]
- Shu, Z.; Jia, Q.; Li, X.; Wang, W. An OODA Loop-Based Function Network Modeling and Simulation Evaluation Method for Combat System-of-Systems; Springer: Singapore, 2016; pp. 393–402. [Google Scholar]
- Li, J.; Fu, C.; Chen, Y.; Yang, K.; Zhang, X. An Operational Efficiency Evaluation Method for Weapon System-of-Systems Combat Networks Based on Operation Loop; IEEE: New York, NY, USA, 2014; pp. 219–223. [Google Scholar]
- Li, J.; Zhao, D.; Jiang, J.; Yang, K.; Chen, Y. Capability Oriented Equipment Contribution Analysis in Temporal Combat Networks. IEEE Trans. Syst. Man Cybern. Syst. 2018, 51, 696–704. [Google Scholar] [CrossRef]
- Tan, Y.; Zhang, X.; Yang, K. Research on Networked Description and Modeling Methods of Armament System-of-Systems. J. Syst. Manag. 2012, 21, 781–786. [Google Scholar]
- Li, J.; Tan, Y. Operation Loop Recommendation Method Based on Integrated Improved Ant Colony Algorithm. Syst. Eng. Electron. 2024, 46. [Google Scholar]
- Zhao, D.; Tan, Y.; Li, J.; Dou, Y.; Li, L.; Liu, J. Research on Structural Robustness of Weapon System-of-Systems Based on Heterogeneous Network. Syst. Eng.-Theory Pract. 2019, 39, 3197–3207. [Google Scholar]
- Tarjan, R.E.; Zwick, U. Finding Strong Components Using Depth-First Search. Eur. J. Comb. 2024, 119, 103815. [Google Scholar] [CrossRef]
- Sun, Z.; Song, K. GEMimp: An Accurate and Robust Imputation Method for Microbiome Data Using Graph Embedding Neural Network. J. Mol. Biol. 2024, 436, 168841. [Google Scholar] [CrossRef]
- Joshi, N.S.; Sambrekar, K.P.; Patankar, A.J.; Jadhav, A.; Khadkikar, P.A. Enhancing Performance and Privacy on Cloud-Based Multi-Keyword Ranked Search Encryption Using Greedy Depth-First Encryption. Int. J. Fuzzy Log. Intell. Syst. 2024, 24, 416–427. [Google Scholar] [CrossRef]
- Zhang, Q.; Li, J.; Shen, D.; Ma, C. Research on Network Modeling and Optimization of Operation System of Systems Based on Complex Network. Syst. Eng. Electron. 2015, 37, 1066–1071. [Google Scholar]
- Zhao, D. Research on Contribution Rate of Weapon and Equipment System Evaluation Method Based on Heterogeneous Net-Work; National University of Defense Technology: Changsha, China, 2019. [Google Scholar]
- Onan, A.; Alhumyani, H. Knowledge-Enhanced Transformer Graph Summarization (KETGS): Integrating Entity and Discourse Relations for Advanced Extractive Text Summarization. Mathematics 2024, 12, 3638. [Google Scholar] [CrossRef]
- Xiao, Z.; Wang, Y.; Tan, G.; He, D.; Li, J.; Zhou, W. SCML-GNN: A Graph Neural Network Model Leveraging Sensor Causality and Meta-Learning for Mechanical Fault Classification. Int. J. Pattern Recognit. Artif. Intell. 2024, 38, 2456011. [Google Scholar] [CrossRef]
- Xu, S.; He, Q. Spatio-Temporal Dynamic Graph Attention Network-Based Detector for Sea-Surface Small Targets. IEEE Trans. Aerosp. Electron. Syst. 2024, 1–12. [Google Scholar] [CrossRef]
- Wang, X.; Zhang, L.; Jiang, Y.; Zhao, H. Optimizing Military Target Recognition in Urban Battlefields: An Intelligent Framework Based on Graph Neural Networks and YOLO. Signal Image Video Process. 2025, 19, 6. [Google Scholar] [CrossRef]
- Zhou, Y.; Zheng, H.; Huang, X.; Hao, S.; Li, D.; Zhao, J. Graph Neural Networks: Taxonomy, Advances, and Trends. ACM Trans. Intell. Syst. Technol. (TIST) 2022, 13, 1–54. [Google Scholar] [CrossRef]
- Veličković, P.; Cucurull, G.; Casanova, A.; Romero, A.; Lio, P.; Bengio, Y. Graph Attention Networks. arXiv 2017, arXiv:1710.10903. [Google Scholar]
- Cares, J.R.; Dickmann, J.Q., Jr. Operations Research for Unmanned Systems; John Wiley & Sons: Hoboken, NJ, USA, 2016; ISBN 1-118-91894-0. [Google Scholar]
- Peng, L.; Jichao, L.; Boyuan, X.; Danling, Z.; Yuejin, T. Weapons Equipment Portfolios Selection Based on Equipment System Contribution Rates. J. Syst. Eng. Electron. 2021, 32, 584–595. [Google Scholar] [CrossRef]
- Liu, P.; Zhu, L.; Zhou, Z.; Xiao, H. Research on Kill Chain Analysis Method Based on Template-Bayesian Network; IEEE: New York, NY, USA, 2021; pp. 972–976. [Google Scholar]
- Wang, S.; Du, Y.; Zhao, S.; Hao, J.; Gan, L. Research on the Construction of Weaponry Indicator System and Intelligent Evaluation Methods. Sci. Rep. 2023, 13, 19370. [Google Scholar] [CrossRef]
- Piaggesi, S.; Khosla, M.; Panisson, A.; Anand, A. Dine: Dimensional Interpretability of Node Embeddings. IEEE Trans. Knowl. Data Eng. 2024, 36, 7986–7997. [Google Scholar] [CrossRef]
- Wang, C.; Sun, J.; Meng, X.; Zhang, Y.; Li, H. Multi-Stage Degradation Feature with Dynamic Feedback Mechanism for Remaining Useful Life Prediction. Nondestruct. Test. Eval. 2025, 1–34. [Google Scholar] [CrossRef]
S | D | I | T | |
---|---|---|---|---|
S | Information Sharing | Information Reporting | Information Reporting | Information Reconnaissance |
D | Command Orders | Command Coordination | Command Orders | Command Strike |
I | Combat Guidance | Combat Feedback | Combat Coordination | Combat Strike |
T | Enemy Feedback | Enemy Strike | Enemy Strike | Enemy Coordination |
Kill Chain MetaPath | Explanation |
---|---|
Conventional kill chain, information flow and energy flow are unidirectional | |
Kill chain format including collaborative decision-making | |
Kill chain format including collaborative reconnaissance, information sharing | |
Kill chain format including collaborative strike | |
Kill chain format including multiple information reporting | |
Kill chain format including information sharing and collaborative decision-making | |
Kill chain format including information reporting and collaborative decision-making | |
Kill chain format including information sharing and multiple information reporting |
Mapping Relationship | Explanation |
---|---|
Reconnaissance Capability→Reconnaissance Range | Numerical data, simulation range 50–100 km |
Data Transmission Capability→Data Transmission Rate | Numerical data, simulation range 100–1000 Mbps |
Covert Reconnaissance Capability→Stealthiness of Reconnaissance Unit | Fuzzy evaluation (High, Medium, Low) |
Rapid Deployment Capability→Reconnaissance Deployment Speed | Numerical data, simulation range 1–10 min |
Auxiliary Decision-Making Capability→Auxiliary Decision-Making Capability | Fuzzy evaluation (High, Medium, Low) |
Decision-Making Coordination Capability→Decision-Making Coordination Efficiency | Fuzzy evaluation (High, Medium, Low) |
Decision-Making Response Capability→Decision-Making Response Time | Numerical data, simulation range 1–30 min |
Strike Capability→Strike Range | Numerical data, simulation range 100–1000 km |
Damage Capability→Damage Capability | Numerical data, simulation range 50–100 m |
Anti-Interference Capability→Anti-Interference Capability | Fuzzy evaluation (High, Medium, Low) |
Node Number | Type | Node-Embedding Vector |
---|---|---|
64 | Reconnaissance Intelligence | (17.70739, 8.754444, −13.18729,−15.216236) |
10 | Command Control | (2.3362615, 12.0068865, 2.5842578, −12.225582) |
46 | Firepower Strike | (−8.85523, 2.8137453, 11.996569, 2.6401925) |
50 | Strike Target | (−0.03856343, −7.2275743, 2.1043668, 12.093641) |
Kill Chain (Chain-Style Node Numbers) | Effectiveness Value |
---|---|
62, 61, 8, 29, 62 | 352.048514 |
92, 85, 4, 34, 92 | 382.050391 |
80, 67, 4, 69, 80 | 363.505117 |
2, 38, 5, 24, 2 | 319.608901 |
59, 78, 3, 18, 59 | 306.811419 |
59, 75, 3, 18, 59 | 331.561419 |
96, 95, 0, 51, 96 | 383.883659 |
96, 74, 7, 33, 96 | 357.213186 |
96, 74, 7, 15, 96 | 380.000000 |
Number of Nodes | Search Time | |||
---|---|---|---|---|
GAT-DFS | DFS | BFS | Adjacency Matrix | |
200 | 0.0050 | 0.0060 | 0.0082 | 0.0120 |
300 | 0.0399 | 0.0411 | 0.0530 | 0.0644 |
400 | 0.1050 | 0.1106 | 0.2035 | 0.1248 |
500 | 0.2375 | 0.2417 | 1.3692 | 0.2914 |
600 | 0.6437 | 0.7274 | 6.1792 | 0.7229 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
You, Y.; Zhang, X.; He, H.; Zhang, Q.; Liu, X. Kill Chain Search and Evaluation of Weapon System of Systems Based on GAT-DFS. Systems 2025, 13, 703. https://doi.org/10.3390/systems13080703
You Y, Zhang X, He H, Zhang Q, Liu X. Kill Chain Search and Evaluation of Weapon System of Systems Based on GAT-DFS. Systems. 2025; 13(8):703. https://doi.org/10.3390/systems13080703
Chicago/Turabian StyleYou, Yongquan, Xin Zhang, Huafeng He, Qi Zhang, and Xiang Liu. 2025. "Kill Chain Search and Evaluation of Weapon System of Systems Based on GAT-DFS" Systems 13, no. 8: 703. https://doi.org/10.3390/systems13080703
APA StyleYou, Y., Zhang, X., He, H., Zhang, Q., & Liu, X. (2025). Kill Chain Search and Evaluation of Weapon System of Systems Based on GAT-DFS. Systems, 13(8), 703. https://doi.org/10.3390/systems13080703