Title :
An initial foray into understanding adversary planning and courses of action
Abstract :
The term information warfare encourages a mapping between traditional or `kinetic´ warfare and the use of information technology. To prevail in modern warfare, you need a high degree of knowledge of implicit and explicit behaviors exhibited by defenders and attackers. These behaviors revolve around logistics tactics, strategy, planning, and intelligence gathering and preparation. Little work has been done to examine these behaviors and activities in the domain of information warfare. The activity of planning and executing an attack, with fallback positions and alternatives is called attacker course of action. This paper describes an experiment that was designed to look explicitly for the broad characteristics of a sophisticated adversary during the planning and execution phases of an attack
Keywords :
information technology; military computing; security of data; strategic planning; DARPA Information Assurance program; adversary planning; attacker course of action; experiment; information technology; information warfare; intelligence gathering; logistics tactics; Computational modeling; Computer networks; Computer simulation; Information security; Information systems; Information technology; Logistics; Open source software; Process planning; System testing;
Conference_Titel :
DARPA Information Survivability Conference & Exposition II, 2001. DISCEX '01. Proceedings
Conference_Location :
Anaheim, CA
Print_ISBN :
0-7695-1212-7
DOI :
10.1109/DISCEX.2001.932201