Intelligent Agent Technology Within Information Warfare

ABSTRACT

Research into Intelligent Agent (IA) technology and how it can assist computer systems in the autonomous completion of common office and home computing tasks is extremely widespread. The use of IA’s is becoming more feasible as the functionality moves into line with what users require for their everyday computing needs. However, this does not mean that IA technology cannot be exploited or developed for use in a malicious manner, such as within an Information Warfare (IW) scenario, where systems may be attacked autonomously by agent system implementations. This paper will discuss the current state of malicious use of IA’ s as well as focusing on attack techniques, the difficulties brought about by such attacks as well as security methods, both proactive and reactive, that could be instated within compromised or sensitive systems.


AUTHORS

School of Information Systems, Deakin University
Australia

Tyrone Busuttil is currently undertaking his 1st year of a PhD at Deakin University. His area of research concerns Information Warfare and Risk Analysis. This paper is based on scholarship work, which was concerned with Intelligent Agents and how they can be used within an Information Warfare theatre this project was completed in collaboration with Dr Matthew Warren (Deakin University)

School of Information Systems,Deakin University, Melbourne
Australia

Matt Warren Ph.D, is a senior information systems lecturer in the Department of Computing & Mathematics, Deakin University, Victoria, Australia. He specializes in computer security and information warfare. He is a member of Australian Standards Committee IT/12/4 Security Techniques and is the Australian Representative on IFIP 11 WG11 – Security Management. Matthew has published numerous pages in the area of Information Warfare and is co-author of Information Warfare: Corporate Attack and Defence in the Digital Age.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
    23690
  • 757.871.3949
  • jiw@gbpts.com