scholarly journals An introductory preview of Autonomous Intelligent Cyber-defense Agent reference architecture, release 2.0

Author(s):  
Alexander Kott ◽  
Paul Théron ◽  
Luigi V Mancini ◽  
Edlira Dushku ◽  
Agostino Panico ◽  
...  

The North Atlantic Treaty Organization (NATO) Research Task Group IST-152 developed a concept and a reference architecture for intelligent software agents performing active, largely autonomous cyber-defense actions on military assets. The group released a detailed report, briefly reviewed in this article, where such an agent is referred to as an Autonomous Intelligent Cyber-defense Agent (AICA). In a conflict with a technically sophisticated adversary, NATO military networks will operate in a heavily contested battlefield. Enemy malware will likely infiltrate and attack friendly networks and systems. Today’s reliance on human cyber defenders will be untenable on the future battlefield. Instead, artificially intelligent agents, such as AICAs, will be necessary to defeat the enemy malware in an environment of potentially disrupted communications where human intervention may not be possible. The IST-152 group identified specific capabilities of AICA. For example, AICA will have to be capable of autonomous planning and execution of complex multi-step activities for defeating or degrading sophisticated adversary malware, with the anticipation and minimization of resulting side effects. It will have to be capable of adversarial reasoning to battle against a thinking, adaptive malware. Crucially, AICA will have to keep itself and its actions as undetectable as possible, and will have to use deceptions and camouflage. The report identifies the key functions and components and their interactions for a potential reference architecture of such an agent, as well as a tentative roadmap toward the capabilities of AICA.

2011 ◽  
pp. 104-112 ◽  
Author(s):  
Mahesh S. Raisinghani ◽  
Christopher Klassen ◽  
Lawrence L. Schkade

Although there is no firm consensus on what constitutes an intelligent agent (or software agent), an intelligent agent, when a new task is delegated by the user, should determine precisely what its goal is, evaluate how the goal can be reached in an effective manner, and perform the necessary actions by learning from past experience and responding to unforeseen situations with its adaptive, self-starting, and temporal continuous reasoning strategies. It needs to be not only cooperative and mobile in order to perform its tasks by interacting with other agents but also reactive and autonomous to sense the status quo and act independently to make progress towards its goals (Baek et al., 1999; Wang, 1999). Software agents are goal-directed and possess abilities such as autonomy, collaborative behavior, and inferential capability. Intelligent agents can take different forms, but an intelligent agent can initiate and make decisions without human intervention and have the capability to infer appropriate high-level goals from user actions and requests and take actions to achieve these goals (Huang, 1999; Nardi et al., 1998; Wang, 1999). The intelligent software agent is a computational entity than can adapt to the environment, making it capable of interacting with other agents and transporting itself across different systems in a network.


Author(s):  
Stefan Kirn ◽  
Mathias Petsch ◽  
Brian Lees

For a new technology, such as that offered by intelligent agents, to be successful and widely accepted, it is necessary for systems, based on that technology, to be capable of maintaining security and consistency of operation when integrated into the existing infrastructure of an organisation. This paper explores some of the security issues relating to application of intelligent agents and the integration of such systems into existing organisations. First, existing information security issues for enterprises are considered. Then, a short introduction to the new technology of agents and agent systems is given. Following this, the special security problems of the new technology of software agents and the emerging risks for software and enterprises are discussed. Finally, a new security architecture for multi-agent systems is proposed, together with an explanation of how this multilevel architecture can help to improve the security of agent systems.


Author(s):  
ELIANE L. BODANESE ◽  
LAURIE G. CUTHBERT

As the demand for mobile services has increased, the need for an efficient allocation of channels is essential to ensure good performance, given the limited spectrum available. Techniques for increasing flexibility in radio resource acquisition are needed to handle the heterogeneity of services and bit rates to be supported in the forthcoming generations of mobile communications. To improve the performance and efficiency of the channel allocation, we propose the use of a particular agent architecture that allows base stations to be more flexible and intelligent, including planning to attempt to balance the load in advance of reactive requests. The simulation results prove that the use of intelligent agents controlling the allocation of channels is feasible and the agent negotiation is an important feature of the system in order to improve perceived quality of service and to improve the load balancing of the traffic.


Author(s):  
CHUNYAN MIAO ◽  
ANGELA GOH ◽  
YUAN MIAO ◽  
ZHONGHUA YANG

This paper proposes an Agent Inference Model (AIM) for constructing intelligent software agents. AIM has the ability of representing various types of fuzzy concepts, temporal concepts, and dynamic causal relationships between concepts. It also has the ability of handling feedback and analyzing inference patterns over different causal impact models. Based on AIM, a new type of intelligent agent, Dynamic Inference Agent (DIA) is presented. A dynamic inference agent has the ability to model, infer and make decisions on behalf of human beings. It uses numeric representations and computation instead of symbolic representation and logic deduction to represent knowledge and to carry out the inferences respectively. Thus the construction of DIA is simplified and the implementation code is compact. The application of DIA to various areas, especially for electronic commerce over the Internet is exemplified.


1995 ◽  
Vol 11 (2) ◽  
Author(s):  
James Meek

<span>A review of intelligent software agents and their relevance to networked information touching on some of their emerging potential and on interface considerations.</span>


Author(s):  
Jaroslav Meleško ◽  
Eugenijus Kurilovas

In this article, the authors suggest a methodology to adapt learning units to the needs and talents of individual students using an intelligent learning system. Learning personalisation is done based on several factors. Felder and Silverman Learning Styles model is used to create student's profile with conjunction of data mining technologies and previously recorded behaviour of the student. Firstly, the authors perform systematic review of application of intelligent software agents in teaching throughout Clarivate Analytics Web of Science database. Secondly, they present methodologies to personalise learning by means of intelligent technologies. They analyse preferences of students according to Soloman-Felder Learning Styles questionnaire. The resulting model of a student is used in the creation of a personalised learning unit. The model of an adaptive intelligent teaching system based on application of aforementioned technologies is presented in more detail.


Author(s):  
Oksana Zvozdetska

The focus of the article revolves around NATO’s roadmap of smart defense against cyber attacks as the bedrock of Euro-Atlantic security. The author discloses NATO’S new policy and cutting-edge technical initiatives, aimed at focusing on countering global threats and cyber security challenges. It is stressed out, that new ideas towards a more synergetic approach between all the NATO Cyber Defense agencies should be explored to develop a shared framework for cybersecurity that might provide up-to-the date intelligence in order to ensure the development, acquisition and maintenance of the necessary military capabilities. The research highlights the core aspects of the 2010 Lisbon Summit that adopted NATO’s Strategic Concept ‘Active Engagement, Modern Defense: Strategic Concept for the Members of the North Atlantic. Treaty Organization’, that recognizes Cyber Defense as one of its strategic priorities. In particular, to foster Allied Nations’ cooperative efforts to counter terrorism, cyber attacks, prevent the proliferation of nuclear weapons and other weapons of mass destruction (WMD), Reinforce energy security and environmental constraints. Develop the capacity to contribute to energy security, including protection of critical energy infrastructure and transit areas and lines, cooperation with partners, and consultations among Allies on the basis of trategic assessments and contingency planning; In July 2011, NATO Defense Ministers adopted revised NATO Policy on Cyber Defense, which highlighted three areas: • The principles of subsidiarity and proportionality, which involve the assistance provided only upon request, in any other cases, the principle of selfresponsibility of sovereign states is applied; • Avoiding unnecessary duplication of the structures or capabilities and approaches on the international, regional and national levels; • Collaboration based on trust, with regard to the potential sensitivity and vulnerability of the system, the access to which has to be given. After the 2014 Wales Summit, in the revised NATO Cyber Defense Policy, cyber threats were identified as a potential prerequisite for collective defense under the Article 5 of the NATO Treaty. Noteworthy, Cyber Security is responsible for providing the broad spectrum of services in the following specialist security areas: CIS Security, Cyber Defense, Information Assurance, and Computer & Communications Security. Cyber defense is provided by many Alliance bodies: any NATO response concerning collective defense against cyber attacks will be subordinated to the North Atlantic Council (NAC), The Cyber Defense Committee (CDC) – the leading advisory body of the NAC. The executive level is represented by The Cyber Defense Management Board (CDMB), NATO Communications and Information Agency (NCI Agency), Cyber Security incorporates the NATO Computer Incident Response Capability (NCIRC) Technical Centre, providing specialist services to prevent, detect, respond to and recover from cyber security incidents.


1892 ◽  
Vol 34 (872supp) ◽  
pp. 13940-13941
Author(s):  
Richard Beynon

Sign in / Sign up

Export Citation Format

Share Document