J 2020

An introductory preview of Autonomous Intelligent Cyber-defense Agent reference architecture, release 2.0

KOTT, Alexander, Paul THERON, Luigi MANCINI, Edlira DUSHKU, Agostino PANICO et. al.

Základní údaje

Originální název

An introductory preview of Autonomous Intelligent Cyber-defense Agent reference architecture, release 2.0

Autoři

KOTT, Alexander (840 Spojené státy), Paul THERON (250 Francie), Luigi MANCINI, Edlira DUSHKU, Agostino PANICO, Martin DRAŠAR (203 Česká republika, garant, domácí), Benoit LEBLANC, Paul LOSIEWICZ, Alessandro GUARINO, Mauno PIHELGAS a Krzysztof RZADCA

Vydání

The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, THOUSAND OAKS, SAGE PUBLICATIONS INC, 2020, 1548-5129

Další údaje

Jazyk

angličtina

Typ výsledku

Článek v odborném periodiku

Obor

10201 Computer sciences, information science, bioinformatics

Stát vydavatele

Spojené státy

Utajení

není předmětem státního či obchodního tajemství

Odkazy

Kód RIV

RIV/00216224:14610/20:00118543

Organizační jednotka

Ústav výpočetní techniky

UT WoS

000496078600001

Klíčová slova anglicky

Intelligent agent; autonomy; cyber warfare; cyber defense; agent architecture

Štítky

Příznaky

Mezinárodní význam, Recenzováno
Změněno: 27. 4. 2021 15:58, Mgr. Alena Mokrá

Anotace

V originále

The North Atlantic Treaty Organization (NATO) Research Task Group IST-152 developed a concept and a reference architecture for intelligent software agents performing active, largely autonomous cyber-defense actions on military assets. The group released a detailed report, briefly reviewed in this article, where such an agent is referred to as an Autonomous Intelligent Cyber-defense Agent (AICA). In a conflict with a technically sophisticated adversary, NATO military networks will operate in a heavily contested battlefield. Enemy malware will likely infiltrate and attack friendly networks and systems. Today's reliance on human cyber defenders will be untenable on the future battlefield. Instead, artificially intelligent agents, such as AICAs, will be necessary to defeat the enemy malware in an environment of potentially disrupted communications where human intervention may not be possible. The IST-152 group identified specific capabilities of AICA. For example, AICA will have to be capable of autonomous planning and execution of complex multi-step activities for defeating or degrading sophisticated adversary malware, with the anticipation and minimization of resulting side effects. It will have to be capable of adversarial reasoning to battle against a thinking, adaptive malware. Crucially, AICA will have to keep itself and its actions as undetectable as possible, and will have to use deceptions and camouflage. The report identifies the key functions and components and their interactions for a potential reference architecture of such an agent, as well as a tentative roadmap toward the capabilities of AICA.

Návaznosti

EF16_019/0000822, projekt VaV
Název: Centrum excelence pro kyberkriminalitu, kyberbezpečnost a ochranu kritických informačních infrastruktur