Extended defense systems :I. adversary-defender modeling grammar for vulnerability analysis and threat assessment. Page: 19 of 33
This report is part of the collection entitled: Office of Scientific & Technical Information Technical Reports and was provided to UNT Digital Library by the UNT Libraries Government Documents Department.
Extracted Text
The following text was automatically extracted from the image on this page using optical character recognition software:
{OT} = { {Ok,1}, {Ok,2 } } (14)
{Ok,1} = Strategic defender objectives, target k (15)
{Ok,2} = Tactical defender objectives, target k (16)
Strategic defender objectives can include goals such as "deny access to the gold vault" or
"recover the stolen gold if the vault is opened ". These objectives must be developed and
deployed as operational guidelines before or during defensive phase di, prior to the initiation of
the terminal attack sequence. Examples of tactical defender objectives are "hold position in the
guard house until assistance arrives" and "cover all exits with suppressing fire". These objectives
may be developed and adopted at any time during di and d2.
Defender's Adversary Knowledge, { KA} and Veracity { V}T
The superset {KA} of the defender's knowledge of adversaries is comprised particular and
general types, such that:
{KA} _ { {Kj}, {Kp} } (17)
{Kj} = General adversary knowledge (18)
{Kp} = Specific knowledge for adversary P (19)
For the defender, general adversary knowledge includes elements such as awareness of historical
adversary characteristics and generic adversary scenarios. Knowledge of a particular adversary
group includes elements such as identities, unique tactics and weapons. The defender forms
empirical knowledge from access to information within Is. For each element of {KA}, there is a
corresponding Veracity descriptor set {V}T that may be quantitative or linguistic.
Defender's Operations Plans, { ET}
A defender deploys systems and agents under an assumed threat, T, and develops defensive plans
for normal and contingency operations. For j =1, {Ek,1} is the set of apriori defender operations
plans concerning target k that are developed during defense phase di. These encompass all
tactics, techniques, and procedures for defender systems and agents. For j =2, {Ek,2} is the set of
emergent plans, devised in phase d2.
{ET} = { {Ek,1}, {Ek,2 } } (20)
{Ek,1} = a priori operations plans, phase di (21)
{Ek,2} = emergent operations plans, phase d2 (22)19
Upcoming Pages
Here’s what’s next.
Search Inside
This report can be searched. Note: Results may vary based on the legibility of text within the document.
Tools / Downloads
Get a copy of this page or view the extracted text.
Citing and Sharing
Basic information for referencing this web page. We also provide extended guidance on usage rights, references, copying or embedding.
Reference the current page of this Report.
Merkle, Peter Benedict. Extended defense systems :I. adversary-defender modeling grammar for vulnerability analysis and threat assessment., report, March 1, 2006; United States. (https://digital.library.unt.edu/ark:/67531/metadc876813/m1/19/: accessed May 4, 2024), University of North Texas Libraries, UNT Digital Library, https://digital.library.unt.edu; crediting UNT Libraries Government Documents Department.