Intrusion Detection and Recovery from Information Warfare Attacks
Small Business Information
P.O. Box 4046, Torrance, CA, 90510
Donald J. Reifer
AbstractThe ability to detect and recover from information warfare attacks is becoming more and more important as the use of networks proliferates within both government and the commercial sector. To counter identified threats, the contractor proposes to perform a vulnerability analysis using patterns of system architectures to identify weaknesses. Then, effective recovery methods will be mapped to the threat using game theory so that a time ordered sequence of events can be planned as the attack unfolds. Finally, a spreadsheet-like tool will be prepared to demonstrate the feasibility of using the approach to counter threats to critical systems that have damaging effects. The contactor will also conduct a market survey and examine the potential commercial market for products and services that can be generated using the detection and recovery methodology during Phase II should the feasibility demo be successful.
* information listed above is at the time of submission.