Skip to main content

Cyber Security Within a Cognitive Architecture

  • Chapter
  • First Online:
Artificial Cognition Architectures

Abstract

As with any electronic information processing system in today’s world of hackers, malware, spyware, etc., security is a major component of the overall operational capabilities of a SELF. All information within a SELF must be protected and kept from corruption (whether accidental or intentional). Accidental corruption of information and knowledge within a SELF is handled through continual cross-checking and self-assessment within the ACNF framework. Continuous communications between Cognitrons within the system and constant refresh of memory information keeps information from being arbitrarily modified (loss of bits) and from corruption due to memory failures and catastrophic interference problems discussed earlier. However, these do not protect the system from intentional corruptions and hackers. Since a SELF is intended to be a fully autonomous, self-evolving, self-learning, reasoning artificial entity, any corruption of information across a SELF’s artificial cognitive framework could have devastating effects on a SELF’s learning, reasoning, memory, and cognitive processes analoagously to what occurs in injured humans (e.g. head injury, Alzheimers). Corruption or incorrect modifications to a SELF’s needs, constraints, goals, memories, or algorithms could cause a SELF to act, evolve, remember, or learn, completely incorrectly and/or out of scope for the intentions of a SELF.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 159.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chandramouli R, Sandhu R (1998) Role based access control features in commercial database management systems. In: Proceedings of 21st national information systems security, Arlington

    Google Scholar 

  2. Crowder J, Carbone J (2012) Cyber physical system architectures for dynamic, real-time “need-to-know” authorization. In: Proceedings of the society for design and process science conference 2012, Berlin

    Google Scholar 

  3. Crowder J, Friess S (2010) Artificial neural diagnostics and prognostics: self-soothing in cognitive systems. In: Proceedings of the 12th annual international conference on artificial intelligence, Las Vegas

    Google Scholar 

  4. Dolan R, Vuilleumier P (2003) Amygdala automaticity in emotional processing. Ann N Y Acad Sci 985:348–355

    Article  Google Scholar 

  5. Dudai Y (2004) The neurobiology of consolidations, or, how stable is the engram? Annu Rev Psychol 55:51–86

    Article  Google Scholar 

  6. Kakas R, Kowlaski R, Toni F (1993) Abductive logic programming. J Logic Comput 2(6):719–770

    Article  Google Scholar 

  7. Lenz M, Barsch-Spörl B, Burkhard H, Wess S (1998) Case-based reasoning technology, from foundations to applications. Springer, Berlin

    Book  Google Scholar 

  8. Levesque HJ (1989) A knowledge-level account of abduction. In: Proceedings of the eleventh international joint conference on artificial intelligence, Detroit, pp 1061–1067

    Google Scholar 

  9. Duncan A (2008) Eliminate the impossible: an examination of the world of Sherlock Holmes on page and screen. MX Publishing, London. ISBN 978-1-904312-31-4

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media New York

About this chapter

Cite this chapter

Crowder, J.A., Carbone, J.N., Friess, S.A. (2014). Cyber Security Within a Cognitive Architecture. In: Artificial Cognition Architectures. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-8072-3_12

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-8072-3_12

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-8071-6

  • Online ISBN: 978-1-4614-8072-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics