Intrusion Detection and Recovery from Information Warfare Attacks
Agency / Branch:
DOD / MDA
The ability to detect and recover from information warfare attacks is becoming more and more important as the use of networks proliferates within both government and the commercial sector. To counter identified threats, the contractor proposes to perform a vulnerability analysis using patterns of system architectures to identify weaknesses. Then, effective recovery methods will be mapped to the threat using game theory so that a time ordered sequence of events can be planned as the attack unfolds. Finally, a spreadsheet-like tool will be prepared to demonstrate the feasibility of using the approach to counter threats to critical systems that have damaging effects. The contactor will also conduct a market survey and examine the potential commercial market for products and services that can be generated using the detection and recovery methodology during Phase II should the feasibility demo be successful.
Small Business Information at Submission:
Principal Investigator:Donald J. Reifer
REIFER CONSULTANTS, INC.
P.O. Box 4046 Torrance, CA 90510
Number of Employees: