Autonomous Cyber Defense Agents for NATO: Threat Analysis, Design, and Experimentation

被引:2
|
作者
Velazquez, Alexander [1 ]
Lopes, Roberto Rigolin F. [2 ]
Becue, Adrien [3 ]
Loevenich, Johannes F. [2 ,7 ]
Rettore, Paulo H. L. [4 ]
Wrona, Konrad [5 ,6 ]
机构
[1] US Navy, Res Lab, Informat Technol Div, Washington, DC 20375 USA
[2] Thales Deutschland, Secure Commun & Informat SIX, Ditzingen, Germany
[3] THALES SIX GTS, Gennevilliers, France
[4] Fraunhofer FKIE, Dept Commun Syst, Bonn, Germany
[5] Mil Univ Technol, Warsaw, Poland
[6] NATO Cyber Secur Ctr, The Hague, Netherlands
[7] Univ Osnabruck, Dept Math Comp Sci, Osnabruck, Germany
关键词
Autonomous cyber defense; Autonomous agents; Protected core networking; Federated mission networking; Online planning and acting; Cybersecurity;
D O I
10.1109/MILCOM58377.2023.10356321
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper discusses the design and implementation of Autonomous Cyber Defense (ACD) agents for Protected Core Networking (PCN). Our solution includes two types of specialized, complementary agents placed in different parts of the network. One type of agent, ACD-Core, is deployed within the protected core segment of a particular nation and can monitor and act in the physical and IP layers. The other, ACD-CC, is deployed within a colored cloud and can monitor and act in the transport and application layers. We analyze the threat landscape and identify possible uses and misuses of these agents. Our work is part of an ongoing collaboration between two NATO research task groups, IST-162 and IST-196. The goal of this collaboration is to detail the design and roadmap for implementing ACD agents for PCN and to create a virtual lab for related experimentation and validation. Our vision is that ACD will contribute to improving the cybersecurity of military networks, protecting them against evolving cyber threats, and ensuring connectivity at the tactical edge.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Proactive Defense Model Based on Cyber Threat Analysis
    Osako, Takeshi
    Suzuki, Tomoyoshi
    Iwata, Yoichi
    FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2016, 52 (03): : 72 - 77
  • [2] Proactive defense model based on cyber threat analysis
    Osako, Takeshi
    Suzuki, Tomoyoshi
    Iwata, Yoichi
    Fujitsu Scientific and Technical Journal, 2016, 52 (03): : 72 - 77
  • [3] Towards an Active, Autonomous and Intelligent Cyber Defense of Military Systems: the NATO AICA Reference Architecture
    Theron, Paul
    Kott, Alexander
    Drasar, Martin
    Rzadca, Krzysztof
    LeBlanc, Benoit
    Pihelgas, Mauno
    Mancini, Luigi
    Panico, Agostino
    2018 INTERNATIONAL CONFERENCE ON MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS (ICMCIS), 2018,
  • [4] Towards a High Fidelity Training Environment for Autonomous Cyber Defense Agents
    Oesch, Sean
    Chaulagain, Amul
    Austria, Phillipe
    Weber, Brian
    Sadovnik, Amir
    Watson, Cory
    Dixson, Matthew
    Roberson, Benjamin
    PROCEEDINGS OF 17TH CYBER SECURITY EXPERIMENTATION AND TEST WORKSHOP, CSET 2024, 2024, : 91 - 99
  • [5] European Defense cooperation: Asset or threat to NATO?
    Rohan, S
    JOURNAL OF STRATEGIC STUDIES, 2005, 28 (01) : 144 - 147
  • [6] European Defense cooperation: Asset or threat to NATO?
    Rohan, S
    JOURNAL OF STRATEGIC STUDIES, 2005, 28 (03) : 549 - 551
  • [7] Neuroevolution for Autonomous Cyber Defense
    Heckel, Kade M.
    PROCEEDINGS OF THE 2023 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE COMPANION, GECCO 2023 COMPANION, 2023, : 651 - 654
  • [8] Reinforcement Learning as a Path to Autonomous Intelligent Cyber-Defense Agents in Vehicle Platforms
    Raio, Stephen
    Corder, Kevin
    Parker, Travis W.
    Shearer, Gregory G.
    Edwards, Joshua S.
    Thogaripally, Manik R.
    Park, Song J.
    Nelson, Frederica F.
    APPLIED SCIENCES-BASEL, 2023, 13 (21):
  • [9] A cyber-security framework for development, defense and innovation at NATO
    Efthymiopoulos M.P.
    Journal of Innovation and Entrepreneurship, 8 (1)
  • [10] Cyber risk management for autonomous passenger ships using threat-informed defense-in-depth
    Amro, Ahmed
    Gkioulos, Vasileios
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (01) : 249 - 288