IEEE Transactions on Software Engineering - Special issue on computer security and privacy
SADT: structured analysis and design technique
SADT: structured analysis and design technique
Computer Simulation in Management Science
Computer Simulation in Management Science
Hacking Exposed: Network Security Secrets and Solutions,Third Edition
Hacking Exposed: Network Security Secrets and Solutions,Third Edition
Hacking for Dummies
Scenario graphs and attack graphs
Scenario graphs and attack graphs
Unifying planning and control using an OODA-based architecture
SAICSIT '05 Proceedings of the 2005 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
Lessons learned from the deployment of a high-interaction honeypot
EDCC '06 Proceedings of the Sixth European Dependable Computing Conference
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
Hi-index | 0.00 |
Intrusion in information systems is a major problem in security management. Present-day intrusion detection systems detect attacks too late to counter them in real-time. Several authors in the digital forensics literature have proposed using Boyd's Observe-Orient-Decide-Act (OODA) model for intrusion protection, but none have taken these proposals further. This paper reports on hand-simulation of the adversarial interaction between an intruder and a system administrator intended to demonstrate the feasibility of implementing a rationally reconstructed OODA (OODA-RR) model. An OODA-RR test-bed is currently being implemented.