Autonomous Cyber Defense Agents for NATO: Threat Analysis, Design, and Experimentation

被引:2
|
作者
Velazquez, Alexander [1 ]
Lopes, Roberto Rigolin F. [2 ]
Becue, Adrien [3 ]
Loevenich, Johannes F. [2 ,7 ]
Rettore, Paulo H. L. [4 ]
Wrona, Konrad [5 ,6 ]
机构
[1] US Navy, Res Lab, Informat Technol Div, Washington, DC 20375 USA
[2] Thales Deutschland, Secure Commun & Informat SIX, Ditzingen, Germany
[3] THALES SIX GTS, Gennevilliers, France
[4] Fraunhofer FKIE, Dept Commun Syst, Bonn, Germany
[5] Mil Univ Technol, Warsaw, Poland
[6] NATO Cyber Secur Ctr, The Hague, Netherlands
[7] Univ Osnabruck, Dept Math Comp Sci, Osnabruck, Germany
关键词
Autonomous cyber defense; Autonomous agents; Protected core networking; Federated mission networking; Online planning and acting; Cybersecurity;
D O I
10.1109/MILCOM58377.2023.10356321
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper discusses the design and implementation of Autonomous Cyber Defense (ACD) agents for Protected Core Networking (PCN). Our solution includes two types of specialized, complementary agents placed in different parts of the network. One type of agent, ACD-Core, is deployed within the protected core segment of a particular nation and can monitor and act in the physical and IP layers. The other, ACD-CC, is deployed within a colored cloud and can monitor and act in the transport and application layers. We analyze the threat landscape and identify possible uses and misuses of these agents. Our work is part of an ongoing collaboration between two NATO research task groups, IST-162 and IST-196. The goal of this collaboration is to detail the design and roadmap for implementing ACD agents for PCN and to create a virtual lab for related experimentation and validation. Our vision is that ACD will contribute to improving the cybersecurity of military networks, protecting them against evolving cyber threats, and ensuring connectivity at the tactical edge.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Game-Theoretic Threat Screening and Deceptive Techniques for Cyber Defense
    Schlenker, Aaron
    THIRTY-SECOND AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTIETH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE / EIGHTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2018, : 8034 - 8035
  • [42] Generic and Autonomous System for airborne networks cyber-threat detection
    Gil Casals, Silvia
    Owezarski, Philippe
    Descargues, Gilles
    2013 IEEE/AIAA 32ND DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC), 2013,
  • [43] GENERIC AND AUTONOMOUS SYSTEM FOR AIRBORNE NETWORKS CYBER-THREAT DETECTION
    Casals, Silvia Gil
    Owezarski, Philippe
    Descargues, Gilles
    2013 IEEE/AIAA 32ND DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC), 2013,
  • [44] Cyber Threat Trees for Large System Threat Cataloging and Analysis
    Ongsakorn, P.
    Turney, K.
    Thornton, M.
    Nair, S.
    Szygenda, S.
    Manikas, T.
    2010 IEEE INTERNATIONAL SYSTEMS CONFERENCE, 2010, : 610 - 615
  • [46] A survey of the security assessment and security defense of a cyber physical power system under cyber failure threat
    Zhu B.
    Guo Y.
    Guo C.
    Jiang Z.
    Zhang X.
    Yuan X.
    Dianli Xitong Baohu yu Kongzhi/Power System Protection and Control, 2021, 49 (01): : 178 - 187
  • [47] Impact analysis for cyber defense optimization
    Noel, Steven
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2023, 20 (01): : 39 - 39
  • [48] When Autonomous Intelligent Goodware will Fight Autonomous Intelligent Malware: A Possible Future of Cyber Defense
    Theron, Paul
    Kott, Alxander
    MILCOM 2019 - 2019 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2019,
  • [49] The Design of Cyber Threat Hunting Games: A Case Study
    Miazi, Md Nazmus Sakib
    Pritom, Mir Mehedi A.
    Shehab, Mohamed
    Chu, Bill
    Wei, Jinpeng
    2017 26TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN 2017), 2017,
  • [50] A Cyber-Physical Experimentation Platform for Resilience Analysis
    Thorpe, Jamie
    Fasano, Raymond
    Sahakian, Meghan Galiardi
    Gonzales, Amanda
    Hahn, Andrew
    Morris, Joshua
    Ortiz, Timothy
    Reinbolt, Hannah
    Vugrin, Eric D.
    SAT-CPS'22: PROCEEDINGS OF THE 2022 ACM WORKSHOP ON SECURE AND TRUSTWORTHY CYBER-PHYSICAL SYSTEMS, 2022, : 3 - 12