Share Email Print
cover

Proceedings Paper

DARPA OPX information assurance: technologies and lessons learned
Author(s): John H. Lowry; Doug Maughan
Format Member Price Non-Member Price
PDF $14.40 $18.00

Paper Abstract

The behavior of cyber-terrorists and other cyber-adversaries can be modeled to identify critical phases of their behavior yielding insights into necessary behavior for them to accomplish their mission. Focusing technology on thwarting the adversary mission rather than particular exploits is a critical component of successful defense-in-depth. This paper presents the results of modeling workshops that led to a set of experiments that successfully thwarted a cyber-adversary’s mission.

Paper Details

Date Published: 22 September 2003
PDF: 11 pages
Proc. SPIE 5071, Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Defense and Law Enforcement II, (22 September 2003); doi: 10.1117/12.500843
Show Author Affiliations
John H. Lowry, BBN Technologies (United States)
Doug Maughan, DARPA (United States)


Published in SPIE Proceedings Vol. 5071:
Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Defense and Law Enforcement II
Edward M. Carapezza, Editor(s)

© SPIE. Terms of Use
Back to Top