Features and Operation of an Autonomous Agent for Cyber Defense

CSIAC Journal, v.7, n.1, April 2019, pp.6-13 An ever increasing number of battlefield devices that are capable of collecting, processing, storing, and communicating information are rapidly becoming interconnected. The staggering number of connected devices on the battlefield greatly increases the po...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: De Lucia, Michael J, Newcomb, Allison, Kott, Alexander
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator De Lucia, Michael J
Newcomb, Allison
Kott, Alexander
description CSIAC Journal, v.7, n.1, April 2019, pp.6-13 An ever increasing number of battlefield devices that are capable of collecting, processing, storing, and communicating information are rapidly becoming interconnected. The staggering number of connected devices on the battlefield greatly increases the possibility that an adversary could find ways to exploit hardware or software vulnerabilities, degrading or denying Warfighters the assured and secure use of those devices. Autonomous software agents will become necessities to manage, defend, and react to cyber threats in the future battlespace. The number of connected devices increases disproportionately to the number of cyber experts that could be available within an operational environment. In this paper, an autonomous agent capability and a scenario of how it could operate are proposed. The goal of developing such capability is to increase the security posture of the Internet of Battlefield Things and meet the challenges of an increasingly complex battlefield. This paper describes an illustrative scenario in a notional use case and discusses the challenges associated with such autonomous agents. We conclude by offering ideas for potential research into developing autonomous agents suitable for cyber defense in a battlefield environment.
doi_str_mv 10.48550/arxiv.1905.05253
format Article
fullrecord <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_1905_05253</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1905_05253</sourcerecordid><originalsourceid>FETCH-LOGICAL-a673-d0db7a72fb81d21a8681fdde448589a9bad8d891e1aa7c6bd1ca323d24a9373a3</originalsourceid><addsrcrecordid>eNotz71OwzAUBWAvDKjwAEz1CyT4J47tCUWBAlKlLt2j695rFInalZMg-vaUwnSkMxydj7EHKerGGSMeoXyPX7X0wtTCKKNv2dOGYF4KTRwS8t2JCsxjTjzHS8G7Zc4pH_My8e6D0sxjLrw_Byr8mSKlie7YTYTPie7_c8X2m5d9_1Ztd6_vfbetoLW6QoHBglUxOIlKgmudjIjUXG45Dz4AOnRekgSwhzagPIBWGlUDXlsNesXWf7NXwXAq4xHKefiVDFeJ_gGdx0OF</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Features and Operation of an Autonomous Agent for Cyber Defense</title><source>arXiv.org</source><creator>De Lucia, Michael J ; Newcomb, Allison ; Kott, Alexander</creator><creatorcontrib>De Lucia, Michael J ; Newcomb, Allison ; Kott, Alexander</creatorcontrib><description>CSIAC Journal, v.7, n.1, April 2019, pp.6-13 An ever increasing number of battlefield devices that are capable of collecting, processing, storing, and communicating information are rapidly becoming interconnected. The staggering number of connected devices on the battlefield greatly increases the possibility that an adversary could find ways to exploit hardware or software vulnerabilities, degrading or denying Warfighters the assured and secure use of those devices. Autonomous software agents will become necessities to manage, defend, and react to cyber threats in the future battlespace. The number of connected devices increases disproportionately to the number of cyber experts that could be available within an operational environment. In this paper, an autonomous agent capability and a scenario of how it could operate are proposed. The goal of developing such capability is to increase the security posture of the Internet of Battlefield Things and meet the challenges of an increasingly complex battlefield. This paper describes an illustrative scenario in a notional use case and discusses the challenges associated with such autonomous agents. We conclude by offering ideas for potential research into developing autonomous agents suitable for cyber defense in a battlefield environment.</description><identifier>DOI: 10.48550/arxiv.1905.05253</identifier><language>eng</language><subject>Computer Science - Cryptography and Security</subject><creationdate>2019-05</creationdate><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,777,882</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/1905.05253$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.1905.05253$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>De Lucia, Michael J</creatorcontrib><creatorcontrib>Newcomb, Allison</creatorcontrib><creatorcontrib>Kott, Alexander</creatorcontrib><title>Features and Operation of an Autonomous Agent for Cyber Defense</title><description>CSIAC Journal, v.7, n.1, April 2019, pp.6-13 An ever increasing number of battlefield devices that are capable of collecting, processing, storing, and communicating information are rapidly becoming interconnected. The staggering number of connected devices on the battlefield greatly increases the possibility that an adversary could find ways to exploit hardware or software vulnerabilities, degrading or denying Warfighters the assured and secure use of those devices. Autonomous software agents will become necessities to manage, defend, and react to cyber threats in the future battlespace. The number of connected devices increases disproportionately to the number of cyber experts that could be available within an operational environment. In this paper, an autonomous agent capability and a scenario of how it could operate are proposed. The goal of developing such capability is to increase the security posture of the Internet of Battlefield Things and meet the challenges of an increasingly complex battlefield. This paper describes an illustrative scenario in a notional use case and discusses the challenges associated with such autonomous agents. We conclude by offering ideas for potential research into developing autonomous agents suitable for cyber defense in a battlefield environment.</description><subject>Computer Science - Cryptography and Security</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotz71OwzAUBWAvDKjwAEz1CyT4J47tCUWBAlKlLt2j695rFInalZMg-vaUwnSkMxydj7EHKerGGSMeoXyPX7X0wtTCKKNv2dOGYF4KTRwS8t2JCsxjTjzHS8G7Zc4pH_My8e6D0sxjLrw_Byr8mSKlie7YTYTPie7_c8X2m5d9_1Ztd6_vfbetoLW6QoHBglUxOIlKgmudjIjUXG45Dz4AOnRekgSwhzagPIBWGlUDXlsNesXWf7NXwXAq4xHKefiVDFeJ_gGdx0OF</recordid><startdate>20190513</startdate><enddate>20190513</enddate><creator>De Lucia, Michael J</creator><creator>Newcomb, Allison</creator><creator>Kott, Alexander</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20190513</creationdate><title>Features and Operation of an Autonomous Agent for Cyber Defense</title><author>De Lucia, Michael J ; Newcomb, Allison ; Kott, Alexander</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a673-d0db7a72fb81d21a8681fdde448589a9bad8d891e1aa7c6bd1ca323d24a9373a3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Computer Science - Cryptography and Security</topic><toplevel>online_resources</toplevel><creatorcontrib>De Lucia, Michael J</creatorcontrib><creatorcontrib>Newcomb, Allison</creatorcontrib><creatorcontrib>Kott, Alexander</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>De Lucia, Michael J</au><au>Newcomb, Allison</au><au>Kott, Alexander</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Features and Operation of an Autonomous Agent for Cyber Defense</atitle><date>2019-05-13</date><risdate>2019</risdate><abstract>CSIAC Journal, v.7, n.1, April 2019, pp.6-13 An ever increasing number of battlefield devices that are capable of collecting, processing, storing, and communicating information are rapidly becoming interconnected. The staggering number of connected devices on the battlefield greatly increases the possibility that an adversary could find ways to exploit hardware or software vulnerabilities, degrading or denying Warfighters the assured and secure use of those devices. Autonomous software agents will become necessities to manage, defend, and react to cyber threats in the future battlespace. The number of connected devices increases disproportionately to the number of cyber experts that could be available within an operational environment. In this paper, an autonomous agent capability and a scenario of how it could operate are proposed. The goal of developing such capability is to increase the security posture of the Internet of Battlefield Things and meet the challenges of an increasingly complex battlefield. This paper describes an illustrative scenario in a notional use case and discusses the challenges associated with such autonomous agents. We conclude by offering ideas for potential research into developing autonomous agents suitable for cyber defense in a battlefield environment.</abstract><doi>10.48550/arxiv.1905.05253</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.48550/arxiv.1905.05253
ispartof
issn
language eng
recordid cdi_arxiv_primary_1905_05253
source arXiv.org
subjects Computer Science - Cryptography and Security
title Features and Operation of an Autonomous Agent for Cyber Defense
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-18T00%3A04%3A31IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Features%20and%20Operation%20of%20an%20Autonomous%20Agent%20for%20Cyber%20Defense&rft.au=De%20Lucia,%20Michael%20J&rft.date=2019-05-13&rft_id=info:doi/10.48550/arxiv.1905.05253&rft_dat=%3Carxiv_GOX%3E1905_05253%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true