Description |
1 online resource (vi, 28 pages) : illustrations |
|
text txt rdacontent |
|
computer c rdamedia |
|
online resource cr rdacarrier |
Series |
ARL-TN ; 112 |
|
ARL-TN ; 112.
|
Type Of Report |
Final; January-November 1997 |
Note |
Title from title screen (viewed on Nov. 23, 2015). |
Bibliography |
Includes bibliographical references (page 23). |
Access |
APPROVED FOR PUBLIC RELEASE. |
Summary |
The essence of an information attack is to alter, either by intrusion into and manipulation of a database or by deception, the scenario under which a target mind or organization evaluates and selects future courses of action. The aim is to influence the actions of the target. The method is alteration of the perceived desirability or expected payoff of specific courses of action. This alteration of the information in possession of the target can be described as alteration of the perceived reality under which the target operates. Probable success by an attacker in altering the target's perceived behavior, given a successful manipulation of the target's information, has, in the past, been subjective. A modeling protocol based on the use of game theory is proposed that may, in certain cases, allow optimization of the scenario, or reality, imposed on the target to force the choice of a desired course of action. It should also allow a quantitative estimate of the likelihood of the target's adopting a given course of action. This tool can be used to estimate friendly susceptibility to information attack. |
Funding |
2182040 6U-6U01 P611102.B48 *TEP10 BFTA0 S18129 |
Subject |
Hacking -- Mathematical models.
|
|
Information warfare -- Mathematical models.
|
|
Computer security -- Mathematical models.
|
|
Linear programming.
|
|
Game theory.
|
|
Information warfare.
|
|
Data bases.
|
|
Scenarios.
|
|
Optimization.
|
|
Data processing security.
|
|
Army planning.
|
|
Intrusion.
|
|
Computer Systems Management and Standards.
|
Indexed Term |
PE61102A |
Added Author |
U.S. Army Research Laboratory, issuing body.
|
Other Form: |
Print version: Proposed modeling protocol for evaluating information attacks (OCoLC)45516659 |
Standard No. |
DTICE ADA362101 |
Gpo Item No. |
0324-A-03 (online) |
Sudoc No. |
D 101.133/2:112 |
|