Autonomous Cyber Defense Agents for NATO: Threat Analysis, Design, and Experimentation

被引:2
|
作者
Velazquez, Alexander [1 ]
Lopes, Roberto Rigolin F. [2 ]
Becue, Adrien [3 ]
Loevenich, Johannes F. [2 ,7 ]
Rettore, Paulo H. L. [4 ]
Wrona, Konrad [5 ,6 ]
机构
[1] US Navy, Res Lab, Informat Technol Div, Washington, DC 20375 USA
[2] Thales Deutschland, Secure Commun & Informat SIX, Ditzingen, Germany
[3] THALES SIX GTS, Gennevilliers, France
[4] Fraunhofer FKIE, Dept Commun Syst, Bonn, Germany
[5] Mil Univ Technol, Warsaw, Poland
[6] NATO Cyber Secur Ctr, The Hague, Netherlands
[7] Univ Osnabruck, Dept Math Comp Sci, Osnabruck, Germany
关键词
Autonomous cyber defense; Autonomous agents; Protected core networking; Federated mission networking; Online planning and acting; Cybersecurity;
D O I
10.1109/MILCOM58377.2023.10356321
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper discusses the design and implementation of Autonomous Cyber Defense (ACD) agents for Protected Core Networking (PCN). Our solution includes two types of specialized, complementary agents placed in different parts of the network. One type of agent, ACD-Core, is deployed within the protected core segment of a particular nation and can monitor and act in the physical and IP layers. The other, ACD-CC, is deployed within a colored cloud and can monitor and act in the transport and application layers. We analyze the threat landscape and identify possible uses and misuses of these agents. Our work is part of an ongoing collaboration between two NATO research task groups, IST-162 and IST-196. The goal of this collaboration is to detail the design and roadmap for implementing ACD agents for PCN and to create a virtual lab for related experimentation and validation. Our vision is that ACD will contribute to improving the cybersecurity of military networks, protecting them against evolving cyber threats, and ensuring connectivity at the tactical edge.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Evaluating Network Cyber Resiliency Methods using Cyber Threat, Vulnerability and Defense Modeling and Simulation
    Hassell, Suzanne
    Beraud, Paul
    Cruz, Alen
    Ganga, Gangadhar
    Martin, Steve
    Toennies, Justin
    Vazquez, Pablo
    Wright, Gary
    Gomez, Daniel
    Pietryka, Frank
    Srivastava, Niraj
    Hester, Travis
    Hyde, David
    Mastropietro, Brian
    2012 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2012), 2012,
  • [32] Predictive Cyber Defense Remediation against Advanced Persistent Threat in Cyber-Physical Systems
    Hasanl, Kamrul
    Shetty, Sachin
    Islam, Tariqul
    Ahmed, Imtiaz
    2022 31ST INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2022), 2022,
  • [33] Autonomous Cyber Warfare Agents: Dynamic Reinforcement Learning for Defensive Cyber Operations
    Bierbrauer, David A.
    Schabinger, Robert M.
    Carlin, Caleb
    Mullin, Jonathan
    Pavlik, John A.
    Bastian, Nathaniel D.
    ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING FOR MULTI-DOMAIN OPERATIONS APPLICATIONS V, 2023, 12538
  • [34] Design of a Cyber Threat Information Collection System for Cyber Attack Correlation
    Kim, Nakhyun
    Lee, Seulgi
    Cho, Hyeisun
    Kim, Byun-Ik
    Jun, MoonSeog
    2018 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON18), 2018, : 216 - 219
  • [35] Cyber Resilience Using Autonomous Agents and Reinforcement Learning
    Cam, Hasan
    ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING FOR MULTI-DOMAIN OPERATIONS APPLICATIONS II, 2020, 11413
  • [36] Reward Shaping for Happier Autonomous Cyber Security Agents
    Bates, Elizabeth
    Mavroudis, Vasilios
    Hicks, Chris
    PROCEEDINGS OF THE 16TH ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, AISEC 2023, 2023, : 221 - 232
  • [37] Cyber Threat Detection and Application Analysis
    Yang, Shuangmao
    Wang, Ji
    Zhang, Jing
    Li, Hao
    2016 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY PROCEEDINGS - CYBERC 2016, 2016, : 46 - 49
  • [38] Resource Allocation for Threat Defense in Cyber-security IoT system
    Wang, Manxi
    Liu, Bingjie
    Xu, Haitao
    2019 28TH WIRELESS AND OPTICAL COMMUNICATIONS CONFERENCE (WOCC), 2019, : 1 - 3
  • [39] Boundary Defense Against Cyber Threat for Power System State Estimation
    Jin, Ming
    Lavaei, Javad
    Sojoudi, Somayeh
    Baldick, Ross
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 1752 - 1767
  • [40] Research survey on defense strategy of attack threat in cyber physical systems
    Wen, Cheng-Lin
    Yang, Li
    Kongzhi Lilun Yu Yingyong/Control Theory and Applications, 2024, 41 (12): : 2224 - 2236