2001
DOI: 10.1109/3468.935052
|View full text |Cite
|
Sign up to set email alerts
|

DARPA Information Assurance Program dynamic defense experiment summary

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2007
2007
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(20 citation statements)
references
References 13 publications
0
20
0
Order By: Relevance
“…DARPA has run a number of experiments where attack trees have been used, see for instance [25,27]. However, the purpose of these experiments was not to evaluate attack trees, but to evaluate the defence strategies and mechanisms employed by the team or system in responding to attacks from the outside.…”
Section: Attack Treesmentioning
confidence: 99%
“…DARPA has run a number of experiments where attack trees have been used, see for instance [25,27]. However, the purpose of these experiments was not to evaluate attack trees, but to evaluate the defence strategies and mechanisms employed by the team or system in responding to attacks from the outside.…”
Section: Attack Treesmentioning
confidence: 99%
“…In red teaming a team of security experts, referred to as the red team, act as attackers and tries to break-in the system by using and developing sophisticated attack tools while another group of experts, referred to as the blue team, lines up to defend the system. Such an exercise was conducted by DARPA under its Information Assurance program which showed the advantages of using red teaming (Wood and Duggan, 1999;Kewley and Bouchard, 2001). A similar antagonistic mutual relationship is found between the inhabitants of natural echo systems, such as the relationships between the plants and the herbivores or hosts and parasites.…”
Section: Coevolutionmentioning
confidence: 99%
“…In [4,5], Edge et al modeled an online banking scenario and homeland security via deriving protection trees from ATrees. Following the approach of [7], a methodology to construct ATrees based on the system architecture, risk assessment study outcomes and a security knowledge base is proposed in [14]. This methodology follows a layered approach to generate skeletons of attack trees.…”
Section: Background and Preliminariesmentioning
confidence: 99%