Book ChapterDOI
Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems
Paul Theron,Alexander Kott,Martin Drašar,Krzysztof Rzadca,Benoît Leblanc,Mauno Pihelgas,Luigi V. Mancini,Fabio De Gaspari +7 more
- pp 1-21
Reads0
Chats0
TLDR
This chapter presents and illustrates the rationale, concept and future research directions of (Multiple) Autonomous Intelligent Cyber defense Agents, (M)AICA, and NATO’s initial AICA Reference Architecture, AICARA.Abstract:
Military strategies will shortly make intensive use of autonomous systems while the Internet of Battle Things (IoBT) will grow military systems’ complexity to new heights. The cyber defense of the battlespace will then become arduous for humans, if not impossible, due to disconnections, the difficulty of supervising masses of interconnected devices, and the scarcity of cyber defense competences on the battleground. An autonomous intelligent cyber defense of the battlefield becomes necessary in such a context. In response to such needs, this chapter presents and illustrates the rationale, concept and future research directions of (Multiple) Autonomous Intelligent Cyber defense Agents, (M)AICA, and NATO’s initial AICA Reference Architecture, AICARA.read more
Citations
More filters
Proceedings ArticleDOI
The Cybersecurity Dynamics Way of Thinking and Landscape
TL;DR: The landscape and way-of-thinking that guide the Cybersecurity Dynamics model are discussed, including two killer applications and the technical barriers that serve as outstanding open problems for future research.
Proceedings ArticleDOI
Session-level Adversary Intent-Driven Cyberattack Simulator
TL;DR: A new event-driven simulation model and implementation is presented to reveal the efforts needed by attackers who have various entry points into a network and provides an abstraction of how the network infrastructure reacts to access credentials the adversary might have obtained through a variety of strategies.
Journal ArticleDOI
Use of cyber attack and defense agents in cyber ranges: A case study
TL;DR: In this paper , an agent-based system that emulates cyber attack and defense actions during cybersecurity exercise execution is presented, which helps provide realistic and efficient cybersecurity training. But, the proposed solutions for cyber range training platforms focus on automating the deployment of the cybersecurity exercise infrastructure but not on the execution part.
Journal ArticleDOI
DOLOS: A Novel Architecture for Moving Target Defense
Giulio Pagnotta,Fabio De Gaspari,Dorjan Hitaj,Mauro Andreolini,Michele Colajanni,Luigi V. Mancini +5 more
TL;DR: In this paper , a novel architecture that unifies Cyber Deception and Moving Target Defense (MTD) approaches is presented, which is motivated by the insight that deceptive techniques are much more powerful when integrated into production systems rather than deployed alongside them.
Journal ArticleDOI
Perception of the Environment
TL;DR: In this article , the authors discuss the complexity of perception and illuminates how perception is shaping and influencing the decision-making process in cybersecurity agents' perception and explore the necessary considerations when crafting the world representation and discuss the power and bandwidth constraints of perception.
References
More filters
Book
Design Patterns: Elements of Reusable Object-Oriented Software
TL;DR: The book is an introduction to the idea of design patterns in software engineering, and a catalog of twenty-three common patterns, which most experienced OOP designers will find out they've known about patterns all along.
Book
Artificial Intelligence: A Modern Approach
Stuart Russell,Peter Norvig +1 more
TL;DR: In this article, the authors present a comprehensive introduction to the theory and practice of artificial intelligence for modern applications, including game playing, planning and acting, and reinforcement learning with neural networks.
Journal ArticleDOI
Mastering the game of Go without human knowledge
David Silver,Julian Schrittwieser,Karen Simonyan,Ioannis Antonoglou,Aja Huang,Arthur Guez,Thomas Hubert,Lucas Baker,Matthew Lai,Adrian Bolton,Yutian Chen,Timothy P. Lillicrap,Fan Hui,Laurent Sifre,George van den Driessche,Thore Graepel,Demis Hassabis +16 more
TL;DR: An algorithm based solely on reinforcement learning is introduced, without human data, guidance or domain knowledge beyond game rules, that achieves superhuman performance, winning 100–0 against the previously published, champion-defeating AlphaGo.
Journal ArticleDOI
Intelligent Agents: Theory and Practice
TL;DR: Agent theory is concerned with the question of what an agent is, and the use of mathematical formalisms for representing and reasoning about the properties of agents as discussed by the authors ; agent architectures can be thought of as software engineering models of agents; and agent languages are software systems for programming and experimenting with agents.
Journal ArticleDOI
The Collapse of Sensemaking in Organizations: The Mann Gulch Disaster
TL;DR: The KatzNewcomb lecture as mentioned in this paper celebrated the life of Rensis Likert, the founding director of the Institute for Social Relations, who was born in 1903, which meant this lecture also celebrated their 90th birthdays.