U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Advanced Network Defense Research

NCJ Number
Robert H. Anderson; Richard Brackney; Thomas Bozek
Date Published
August 2000
64 pages
This report presented the proceedings from a workshop held in 2000 with individuals engaged in network defense analyses and measures within the Pacific Command for a substantive exchange of information in the areas of tools, techniques, and capabilities.
In July 2000, the Office of the Assistant Secretary of Defense, the U.S. Space Command, the Defense Advanced Research Projects Agency, and the National Security Agency sponsored a workshop providing an environment where experts from the fields of industry, academe, and government could communicate technically with Pacific Command (PACOM) personnel. These PACOM personnel were responsible for defending critical U.S. defense information systems against cyber attacks. Workshop proceedings were presented summarizing the findings and recommendations that resulted from the workshop. The expectation for the workshop sponsors was to use the results and findings to align their research objectives with issues facing operational users similar to those in the PACOM arena. The workshop consisted of three breakout sessions: (1) analysis of incidents; (2) insider misuse mitigation; and (3) defensively engaging the attacker. Several recommendations resulted from the workshop and included: (1) researchers working towards establishing a consistent format for reporting from intrusion detection systems; (2) the need to find a means to let industry know the needs of the Government; and (3) establishing an informal exchange of information among analysts. The exchange of information between researchers and potential users was significant in that the sharing of information and evaluating promising research results were important in establishing a way of grounding network defense research in real-world requirements and demands. Appendices and references