Title :
Net force maneuver - a JTF-GNO construct
Author :
Hunt, Col Carl ; Bowes, Jeffrey R. ; Gardner, Doug
Abstract :
It would seem that few would willingly choose a battle of attrition, but it is a reasonable characterization of our defensive computer network strategy today, with one major caveat. When it comes to our sensitive but unclassified military computer networks, with the exception of an occasional arrest, our adversaries are able to inflict a substantial amount of harassment and a measurable amount of damage at practically no cost to themselves. It´s probably only a slight exaggeration to say we are fighting an attrition battle where we are the only ones being attrited. This paper examines ways to leverage our ability to control the battlespace (our networks) to protect our critical information while engaging the enemy on the battleground of our choosing.
Keywords :
military computing; security of data; token networks; JTF-GNO; NAT; attrition battle; critical information; defensive computer network strategy; honeynet; honeypot; honeytokens; information assurance; military computer networks; net force maneuver; network address translation; obfuscation; Computer networks; Costs; Europe; History; Information technology; Kinetic theory; Military computing; Network address translation; Protection; Reflection;
Conference_Titel :
Information Assurance Workshop, 2005. IAW '05. Proceedings from the Sixth Annual IEEE SMC
Print_ISBN :
0-7803-9290-6
DOI :
10.1109/IAW.2005.1495982