A proposed modeling protocol for evaluating information attacks / John H. Brand II.
| Author/creator | Brand, John H author. |
| Other author | U.S. Army Research Laboratory, issuing body. |
| Format | Electronic |
| Publication | Aberdeen Proving Ground, MD : Army Research Laboratory, January 1999. |
| Description | 1 online resource (vi, 28 pages) : illustrations. |
| Supplemental Content | https://purl.fdlp.gov/GPO/gpo62132 |
| Supplemental Content | http://handle.dtic.mil/100.2/ADA362101 |
| Subjects |
| Series | ARL-TN ; 112 ARL-TN ; 112. ^A1279298 |
| Abstract | The essence of an information attack is to alter, either by intrusion into and manipulation of a database or by deception, the scenario under which a target mind or organization evaluates and selects future courses of action. The aim is to influence the actions of the target. The method is alteration of the perceived desirability or expected payoff of specific courses of action. This alteration of the information in possession of the target can be described as alteration of the perceived reality under which the target operates. Probable success by an attacker in altering the target's perceived behavior, given a successful manipulation of the target's information, has, in the past, been subjective. A modeling protocol based on the use of game theory is proposed that may, in certain cases, allow optimization of the scenario, or reality, imposed on the target to force the choice of a desired course of action. It should also allow a quantitative estimate of the likelihood of the target's adopting a given course of action. This tool can be used to estimate friendly susceptibility to information attack. |
| General note | Title from title screen (viewed on Nov. 23, 2015). |
| Bibliography note | Includes bibliographical references (page 23). |
| Access restriction | APPROVED FOR PUBLIC RELEASE. |
| Report note | Final; January-November 1997. |
| Funding information | 2182040 6U-6U01 P611102.B48 *TEP10 BFTA0 S18129 |
| Issued in other form | Print version: Proposed modeling protocol for evaluating information attacks |
| GPO item number | 0325 (online) |
| Govt. docs number | D 101.2:IN 3/11 |
Availability
| Library | Location | Call Number | Status | Item Actions |
|---|---|---|---|---|
| Electronic Resources | ✔ Available |