Institute for Software Research
School of Computer Science, Carnegie Mellon University


Social Network Modeling and Simulation of
Integrated Resilient Command and Control (C2) in
Contested Cyber Environments

Michael J. Lanham, Geoffrey P. Morgan, Kathleen M. Carley

December 2011


Center for the Computational Analysis of Social and Organizational Systems
CASOS Technical Report

Keywords: Social Network Analysis, Social Network Modeling, Network Simulation, Command and Control, C2, Contested, Cyber

Department of Defense (DoD) leaders have a moral obligation to the nation to ensure that it can defend the nation and its interests. To meet this moral obligation, DoD leaders need ways of assessing the resilience of its forces–their ability to operate despite adversaries' actions. This report describes the application and analytic results of applying text mining and social network analysis to assessing resilient command and control (C2) of US Air Force Air Operations Centers (AOC) in a contested cyber environment. We also describe the progression from the static modeling to the construction and execution of a model with four doctrinally defined AOCs in an agent-based simulation named Construct. Through these modeling and simulation techniques, we have developed methods to assess impacts of simulated cyber attacks on the performance of single and multiple US Air Force (USAF) Air and Space Operations Centers (AOCs) and Operations Centers (OCs). With these assessments, analysts can make informed recommendations for developing mitigations to those attacks and provide simulations' results to assess the effectiveness of those mitigations.

92 pages

Return to: SCS Technical Report Collection
School of Computer Science

This page maintained by