Features and Operation of an Autonomous Agent for Cyber Defense
CSIAC Journal, v.7, n.1, April 2019, pp.6-13 An ever increasing number of battlefield devices that are capable of collecting, processing, storing, and communicating information are rapidly becoming interconnected. The staggering number of connected devices on the battlefield greatly increases the po...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | De Lucia, Michael J Newcomb, Allison Kott, Alexander |
description | CSIAC Journal, v.7, n.1, April 2019, pp.6-13 An ever increasing number of battlefield devices that are capable of
collecting, processing, storing, and communicating information are rapidly
becoming interconnected. The staggering number of connected devices on the
battlefield greatly increases the possibility that an adversary could find ways
to exploit hardware or software vulnerabilities, degrading or denying
Warfighters the assured and secure use of those devices. Autonomous software
agents will become necessities to manage, defend, and react to cyber threats in
the future battlespace. The number of connected devices increases
disproportionately to the number of cyber experts that could be available
within an operational environment. In this paper, an autonomous agent
capability and a scenario of how it could operate are proposed. The goal of
developing such capability is to increase the security posture of the Internet
of Battlefield Things and meet the challenges of an increasingly complex
battlefield. This paper describes an illustrative scenario in a notional use
case and discusses the challenges associated with such autonomous agents. We
conclude by offering ideas for potential research into developing autonomous
agents suitable for cyber defense in a battlefield environment. |
doi_str_mv | 10.48550/arxiv.1905.05253 |
format | Article |
fullrecord | <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_1905_05253</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1905_05253</sourcerecordid><originalsourceid>FETCH-LOGICAL-a673-d0db7a72fb81d21a8681fdde448589a9bad8d891e1aa7c6bd1ca323d24a9373a3</originalsourceid><addsrcrecordid>eNotz71OwzAUBWAvDKjwAEz1CyT4J47tCUWBAlKlLt2j695rFInalZMg-vaUwnSkMxydj7EHKerGGSMeoXyPX7X0wtTCKKNv2dOGYF4KTRwS8t2JCsxjTjzHS8G7Zc4pH_My8e6D0sxjLrw_Byr8mSKlie7YTYTPie7_c8X2m5d9_1Ztd6_vfbetoLW6QoHBglUxOIlKgmudjIjUXG45Dz4AOnRekgSwhzagPIBWGlUDXlsNesXWf7NXwXAq4xHKefiVDFeJ_gGdx0OF</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Features and Operation of an Autonomous Agent for Cyber Defense</title><source>arXiv.org</source><creator>De Lucia, Michael J ; Newcomb, Allison ; Kott, Alexander</creator><creatorcontrib>De Lucia, Michael J ; Newcomb, Allison ; Kott, Alexander</creatorcontrib><description>CSIAC Journal, v.7, n.1, April 2019, pp.6-13 An ever increasing number of battlefield devices that are capable of
collecting, processing, storing, and communicating information are rapidly
becoming interconnected. The staggering number of connected devices on the
battlefield greatly increases the possibility that an adversary could find ways
to exploit hardware or software vulnerabilities, degrading or denying
Warfighters the assured and secure use of those devices. Autonomous software
agents will become necessities to manage, defend, and react to cyber threats in
the future battlespace. The number of connected devices increases
disproportionately to the number of cyber experts that could be available
within an operational environment. In this paper, an autonomous agent
capability and a scenario of how it could operate are proposed. The goal of
developing such capability is to increase the security posture of the Internet
of Battlefield Things and meet the challenges of an increasingly complex
battlefield. This paper describes an illustrative scenario in a notional use
case and discusses the challenges associated with such autonomous agents. We
conclude by offering ideas for potential research into developing autonomous
agents suitable for cyber defense in a battlefield environment.</description><identifier>DOI: 10.48550/arxiv.1905.05253</identifier><language>eng</language><subject>Computer Science - Cryptography and Security</subject><creationdate>2019-05</creationdate><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,777,882</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/1905.05253$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.1905.05253$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>De Lucia, Michael J</creatorcontrib><creatorcontrib>Newcomb, Allison</creatorcontrib><creatorcontrib>Kott, Alexander</creatorcontrib><title>Features and Operation of an Autonomous Agent for Cyber Defense</title><description>CSIAC Journal, v.7, n.1, April 2019, pp.6-13 An ever increasing number of battlefield devices that are capable of
collecting, processing, storing, and communicating information are rapidly
becoming interconnected. The staggering number of connected devices on the
battlefield greatly increases the possibility that an adversary could find ways
to exploit hardware or software vulnerabilities, degrading or denying
Warfighters the assured and secure use of those devices. Autonomous software
agents will become necessities to manage, defend, and react to cyber threats in
the future battlespace. The number of connected devices increases
disproportionately to the number of cyber experts that could be available
within an operational environment. In this paper, an autonomous agent
capability and a scenario of how it could operate are proposed. The goal of
developing such capability is to increase the security posture of the Internet
of Battlefield Things and meet the challenges of an increasingly complex
battlefield. This paper describes an illustrative scenario in a notional use
case and discusses the challenges associated with such autonomous agents. We
conclude by offering ideas for potential research into developing autonomous
agents suitable for cyber defense in a battlefield environment.</description><subject>Computer Science - Cryptography and Security</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotz71OwzAUBWAvDKjwAEz1CyT4J47tCUWBAlKlLt2j695rFInalZMg-vaUwnSkMxydj7EHKerGGSMeoXyPX7X0wtTCKKNv2dOGYF4KTRwS8t2JCsxjTjzHS8G7Zc4pH_My8e6D0sxjLrw_Byr8mSKlie7YTYTPie7_c8X2m5d9_1Ztd6_vfbetoLW6QoHBglUxOIlKgmudjIjUXG45Dz4AOnRekgSwhzagPIBWGlUDXlsNesXWf7NXwXAq4xHKefiVDFeJ_gGdx0OF</recordid><startdate>20190513</startdate><enddate>20190513</enddate><creator>De Lucia, Michael J</creator><creator>Newcomb, Allison</creator><creator>Kott, Alexander</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20190513</creationdate><title>Features and Operation of an Autonomous Agent for Cyber Defense</title><author>De Lucia, Michael J ; Newcomb, Allison ; Kott, Alexander</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a673-d0db7a72fb81d21a8681fdde448589a9bad8d891e1aa7c6bd1ca323d24a9373a3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Computer Science - Cryptography and Security</topic><toplevel>online_resources</toplevel><creatorcontrib>De Lucia, Michael J</creatorcontrib><creatorcontrib>Newcomb, Allison</creatorcontrib><creatorcontrib>Kott, Alexander</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>De Lucia, Michael J</au><au>Newcomb, Allison</au><au>Kott, Alexander</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Features and Operation of an Autonomous Agent for Cyber Defense</atitle><date>2019-05-13</date><risdate>2019</risdate><abstract>CSIAC Journal, v.7, n.1, April 2019, pp.6-13 An ever increasing number of battlefield devices that are capable of
collecting, processing, storing, and communicating information are rapidly
becoming interconnected. The staggering number of connected devices on the
battlefield greatly increases the possibility that an adversary could find ways
to exploit hardware or software vulnerabilities, degrading or denying
Warfighters the assured and secure use of those devices. Autonomous software
agents will become necessities to manage, defend, and react to cyber threats in
the future battlespace. The number of connected devices increases
disproportionately to the number of cyber experts that could be available
within an operational environment. In this paper, an autonomous agent
capability and a scenario of how it could operate are proposed. The goal of
developing such capability is to increase the security posture of the Internet
of Battlefield Things and meet the challenges of an increasingly complex
battlefield. This paper describes an illustrative scenario in a notional use
case and discusses the challenges associated with such autonomous agents. We
conclude by offering ideas for potential research into developing autonomous
agents suitable for cyber defense in a battlefield environment.</abstract><doi>10.48550/arxiv.1905.05253</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | DOI: 10.48550/arxiv.1905.05253 |
ispartof | |
issn | |
language | eng |
recordid | cdi_arxiv_primary_1905_05253 |
source | arXiv.org |
subjects | Computer Science - Cryptography and Security |
title | Features and Operation of an Autonomous Agent for Cyber Defense |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-18T00%3A04%3A31IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Features%20and%20Operation%20of%20an%20Autonomous%20Agent%20for%20Cyber%20Defense&rft.au=De%20Lucia,%20Michael%20J&rft.date=2019-05-13&rft_id=info:doi/10.48550/arxiv.1905.05253&rft_dat=%3Carxiv_GOX%3E1905_05253%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |