DocumentCode :
1747261
Title :
An initial foray into understanding adversary planning and courses of action
Author :
Lowry, John
Volume :
1
fYear :
2001
fDate :
2001
Firstpage :
123
Abstract :
The term information warfare encourages a mapping between traditional or `kinetic´ warfare and the use of information technology. To prevail in modern warfare, you need a high degree of knowledge of implicit and explicit behaviors exhibited by defenders and attackers. These behaviors revolve around logistics tactics, strategy, planning, and intelligence gathering and preparation. Little work has been done to examine these behaviors and activities in the domain of information warfare. The activity of planning and executing an attack, with fallback positions and alternatives is called attacker course of action. This paper describes an experiment that was designed to look explicitly for the broad characteristics of a sophisticated adversary during the planning and execution phases of an attack
Keywords :
information technology; military computing; security of data; strategic planning; DARPA Information Assurance program; adversary planning; attacker course of action; experiment; information technology; information warfare; intelligence gathering; logistics tactics; Computational modeling; Computer networks; Computer simulation; Information security; Information systems; Information technology; Logistics; Open source software; Process planning; System testing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
DARPA Information Survivability Conference & Exposition II, 2001. DISCEX '01. Proceedings
Conference_Location :
Anaheim, CA
Print_ISBN :
0-7695-1212-7
Type :
conf
DOI :
10.1109/DISCEX.2001.932201
Filename :
932201
Link To Document :
بازگشت