Skip to main content

Network Security Situation Prediction of Improved Lanchester Equation Based on Time Action Factor


Existing network security situational awareness assessment and prediction are not fully considered network defense utility, time factor and other indicators, and the randomness of attacks and the accuracy of the prediction of attack intentions and methods may appear both in active and passive defense this situation leads to uncertainty in attack prediction, which makes it impossible to discover defects in the network system in a timely manner, and there is a lack of effective emergency response strategies for impending or already occurring network attacks. Therefore, this paper proposes a network behavior calculation model based on the Lanchester equation of time action factor is proposed. This paper uses smooth differential manifold homeomorphic transformation to define network behavior, defines the calculation method of behavior utility based on the principle of differential geometry, combines the second linear law of the Lanchester equation and the square law, and uses the time action factor to defend the active defense. The simulation results show that the model can be used to analyze the network offensive and defensive process, and can effectively predict the network offensive and defensive results under both active and passive defense.

This is a preview of subscription content, access via your institution.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17


  1. 1.

    Endsley MR (1988) Situation awareness global assessment technique[C]. Aerospace Electron Conf 3:789–795

    Google Scholar 

  2. 2.

    Endsley MR (1995) Toward a theory of situation awareness in dynamic systems[J]. Human actors: J Human Factors Ergonomics Soc 37(1):32–64

    Article  Google Scholar 

  3. 3.

    Bass T (1999) Multisensor data fusion for next generation distributed intrusion detection systems [J]. Proc Iris Natl Sympos Sens Data Fusion: 24–27

  4. 4.

    Salerno J, Hinman M, Boulware D (2004) Building a framework for situation awareness. http://www.fusion–0219.pdf

  5. 5.

    Lau S (2004) The spinning cube of potential doom.[J]. Commun ACM 47(6):25–26

    Article  Google Scholar 

  6. 6.

    Yegneswaran V, Barford P, Paxson V (2008) Using Honeynets for Internet Situational Awareness.

  7. 7.

    Årnes A, Valeur F, Vigna G et al (2006) Using hidden Markov models to evaluate the risks of intrusions[C]. Hamburg, Germany :Recent Advances in Intrusion Detection, International Symposium. RAID 2006:145–164

    Google Scholar 

  8. 8.

    Xie B, Zhao G, Chao M, Wang J (2020) A prediction model of cloud security situation based on evolutionary functional network[J]. Peer-to-Peer Networking and Applications, (prepublish)

  9. 9.

    Yang W, Zhang J, Wang C, Mo X (2019) Situation prediction of large-scale Internet of Things network security[J]. EURASIP J Inf Secur, 2019(1)

  10. 10.

    Caulkins J, Feichtinger G et al (2018) Lanchester model for three-way combat[J]. Eur J Operation Res 264(1):46–54

    MathSciNet  Article  Google Scholar 

  11. 11.

    Kalaivani CT, Kalaiarasi N (2019) Earliest deadline first scheduling technique for different networks in network control system[J]. Neural Comput & Applic 31:223–232

    Article  Google Scholar 

  12. 12.

    Lin KY, NJ MK (2014) The optimal policy for the one-against-many heterogeneous Lanchester model[J]. Operations Res Lett 42(6–7):473–477

    MathSciNet  Article  Google Scholar 

  13. 13.

    Rathore H, Fu C, Mohamed A et al (2020) Multi-layer security scheme for implantable medical devices[j]. Neural Comput & Applic 32:4347–4360

    Article  Google Scholar 

  14. 14.

    Johnson DDP, MacKay NJ (2015) Fight the power: Lanchester's laws of combat in human evolution[J]. Evol Human Behav 36:152–163

    Article  Google Scholar 

  15. 15.

    Yuan X, Hu H 2019 The Lanchester Mathematical Model Analysis of the Battle of Sarhu[J]. Acad J Comput Inform Sci 2(2)

  16. 16.

    Luckring JM (2019) The discovery and prediction of vortex flow aerodynamics[J]. Aeronautical J 123(1264)

  17. 17.

    Coulson SG (2019) Lanchester modelling of intelligence in combat[J]. IMA J Manag Math 30(2)

  18. 18.

    Hu W, Mei D, Liu Y (2017) Generalized Lanchester warfare model characterized by information asymmetry effect[J]. J Syst Eng Electron 02:315–321

    Google Scholar 

  19. 19.

    Dun-chun HE, Jia-sui ZHAN, Lian-hui XIE (2016) Problems challenges and future of plant disease management: from an ecological point of view[J]. J Integrative Agric 15(04):705–715

    Article  Google Scholar 

  20. 20.

    Waltz E (2004). Information warfare: Principles and operations[M].Wu H, translator. Beijing: Publishing House of Electronics Industry 13–15

  21. 21.

    Chern SS, Chen W (2001) Lectures on differential geometry[M]. Peking University Press, Beijing, pp 32–36

    Google Scholar 

Download references


Authors would like to thank the reviewers for their detailed reviews and constructive comments, which have helped, improve the quality of this study. This work was supported in part by The National Natural Science Fund under Grant No. 61672206 and The Key Research and Development Program of Hebei No. 20310701D.

Author information



Corresponding author

Correspondence to Dongmei Zhao.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Song, H., Zhao, D. & Yuan, C. Network Security Situation Prediction of Improved Lanchester Equation Based on Time Action Factor. Mobile Netw Appl 26, 1008–1023 (2021).

Download citation


  • Lanchester equation
  • Situation prediction
  • Time action factor
  • Differential manifold