Abstract
The AICA International Working Group (IWG) spent 2021 collaboratively developing an initial prototype implementation of the AICA reference architecture, AICAproto21. This prototype was built using open-source software components in a containerized manner to allow for the quickest time-to-completion with maximum flexibility for future capabilities. This prototype was a fully self-contained demonstration of the ability of the agent to respond to an indicated attack with a defensive action, though the scope of scenarios was constrained due to the primary focus on the construction of the framework itself. Future work would include incorporation of computational intelligence (i.e., knowledge representation and automated reasoning components) and additional scenarios. The authors found that the chosen approach did lead to a very easy-to-scale solution that is likely to work in a cross-platform manner. Complicating factors encountered include the difficulty in constructing the framework to operate with various external systems in a generalizable way, and the likely host-system impact of needing to run multiple containers simultaneously to achieve desired functionality, especially when host systems could be low-power “things” such as drones, weapons platforms, et cetera. A critical question to answer as work on AICAproto21 and related experimentation continues is whether the effort required to build a more “ground-up” monolithic application is justified by the potential savings in resource consumption and optimization for the specified purpose.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
References
Bellifemine, F., Poggi, A., & Rimassa, G. (2001). Developing multi-agent systems with JADE. In C. Castelfranchi & Y. Lespérance (Eds.), Intelligent agents VII agent theories architectures and languages (pp. 89–103). Springer. https://doi.org/10.1007/3-540-44631-1_7
Beydoun, G., Low, G., Henderson-Sellers, B., Mouratidis, H., Gomez-Sanz, J. J., Pavon, J., & Gonzalez-Perez, C. (2009). FAML: A generic metamodel for MAS development. IEEE Transactions on Software Engineering, 35(6), 841–863. https://doi.org/10.1109/TSE.2009.34
Blakely, B., Horsthemke, W., Poczatec, A., Nowak, L., & Evans, N. (2019). Moving target, deception, and other adaptive defenses. In C. Rieger, I. Ray, Q. Zhu, & M. A. Haney (Eds.), Industrial control systems security and resiliency: Practice and theory (pp. 95–118). Springer. https://doi.org/10.1007/978-3-030-18214-4_6
Bresciani, P., Perini, A., Giorgini, P., Giunchiglia, F., & Mylopoulos, J. (2004). Tropos: An agent-oriented software development methodology. Autonomous Agents and Multi-Agent Systems, 8(3), 203–236. https://doi.org/10.1023/B:AGNT.0000018806.20944.ef
Briskin, G., Fayette, D., Evancich, N., Rajabian-Schwart, V., Macera, A., & Li, J. (2016). Design considerations for building cyber deception systems. In S. Jajodia, V. S. Subrahmanian, V. Swarup, & C. Wang (Eds.), Cyber deception: Building the scientific foundation (pp. 69–80). Springer International Publishing. https://doi.org/10.1007/978-3-319-32699-3
Cossentino, M., Gaud, N., Hilaire, V., Galland, S., & Koukam, A. (2010). ASPECS: An agent-oriented software process for engineering complex systems: How to design agent societies under a holonic perspective. Autonomous Agents and Multi-Agent Systems, 20(2), 260–304. https://doi.org/10.1007/s10458-009-9099-4
De Gaspari, F., Jajodia, S., Mancini, L. V., & Panico, A. (2016). AHEAD: A new architecture for active defense. In Proceedings of the 2016 ACM workshop on automated decision making for active cyber defense (pp. 11–16). https://doi.org/10.1145/2994475.2994481
García-Sánchez, F., Valencia-García, R., Martínez-Béjar, R., & Fernández-Breis, J. T. (2009). An ontology, intelligent agent-based framework for the provision of semantic web services. Expert Systems with Applications, 36(2), 3167–3187. https://doi.org/10.1016/j.eswa.2008.01.037
Introduction to STIX. (n.d.). Retrieved February 21, 2022, from https://oasis-open.github.io/cti-documentation/stix/intro
Introduction to TAXII. (n.d.). Retrieved February 21, 2022, from https://oasis-open.github.io/cti-documentation/taxii/intro.html
Kazil, J., Masad, D., & Crooks, A. (2020). Utilizing python for agent-based modeling: The mesa framework. In R. Thomson, H. Bisgin, C. Dancy, A. Hyder, & M. Hussain (Eds.), Social, cultural, and behavioral modeling (pp. 308–317). Springer International Publishing. https://doi.org/10.1007/978-3-030-61255-9_30
Kendrick, P., Criado, N., Hussain, A., & Randles, M. (2018). A self-organising multi-agent system for decentralised forensic investigations. Expert Systems with Applications, 102, 12–26. https://doi.org/10.1016/j.eswa.2018.02.023
Kott, A., Thomas, R., Drašar, M., Kont, M., Poylisher, A., Blakely, B., Theron, P., Evans, N., Leslie, N., Singh, R., Rigaki, M., Yang, S. J., LeBlanc, B., Losiewicz, P., Hourlier, S., Blowers, M., Harney, H., Wehner, G., Guarino, A., et al. (2018). Toward intelligent autonomous agents for cyber defense: Report of the 2017 Workshop by the North Atlantic Treaty Organization (NATO) Research Group IST-152-RTG. ArXiv:1804.07646 [Cs]. http://arxiv.org/abs/1804.07646
Kott, A., Théron, P., Mancini, L. V., Dushku, E., Panico, A., Drašar, M., LeBlanc, B., Losiewicz, P., Guarino, A., Pihelgas, M., & Rzadca, K. (2020). An introductory preview of autonomous intelligent cyber-defense agent reference architecture, release 2.0. The Journal of Defense Modeling and Simulation, 17(1), 51–54. https://doi.org/10.1177/1548512919886163
Luke, S. (2019). Multiagent simulation and the MASON library. George Mason University. https://cs.gmu.edu/~eclab/projects/mason/manual.pdf
Melo, L. S., Sampaio, R. F., Leão, R. P. S., Barroso, G. C., & Bezerra, J. R. (2019). Python-based multi-agent platform for application on power grids. International Transactions on Electrical Energy Systems, 29(6), e12012. https://doi.org/10.1002/2050-7038.12012
Molina-Markham, A., Winder, R. K., & Ridley, A. (2021). Network Defense is not a game. ArXiv:2104.10262 [Cs]. http://arxiv.org/abs/2104.10262
OsBrain—0.6.5—OsBrain 0.6.5 documentation. (n.d.). Retrieved February 21, 2022, from https://osbrain.readthedocs.io/en/stable/
Padgham, L., & Winikoff, M. (2003). Prometheus: A methodology for developing intelligent agents. In F. Giunchiglia, J. Odell, & G. Weiß (Eds.), Agent-oriented software engineering III (pp. 174–185). Springer. https://doi.org/10.1007/3-540-36540-0_14
Pavón, J., & Gómez-Sanz, J. (2003). Agent oriented software engineering with INGENIAS. In V. Mařík, M. Pěchouček, & J. Müller (Eds.), Multi-agent systems and applications III (Vol. 2691, pp. 394–403). Springer. https://doi.org/10.1007/3-540-45023-8_38
Pawlick, J., Colbert, E., & Zhu, Q. (2019). A game-theoretic taxonomy and survey of defensive deception for cybersecurity and privacy. ACM Computing Surveys, 52(4), 1–28. https://doi.org/10.1145/3337772
Shiang, C. W., & Sterling, L. (2008). Analysis and design of multi agent knowledge development process. In 19th Australian Conference on Software Engineering (Aswec 2008) (pp. 402–411). https://doi.org/10.1109/ASWEC.2008.4483229
Standen, M., Lucas, M., Bowman, D., Richer, T. J., Kim, J., & Marriott, D. (2021). CybORG: A Gym for the development of autonomous cyber agents. ArXiv:2108.09118 [Cs]. http://arxiv.org/abs/2108.09118
Wilensky, U. (1999). NetLogo. Center for connected learning and computer-based modeling, Northwestern University. Northwestern University. https://ccl.northwestern.edu/netlogo/
Wooldridge, M., Jennings, N. R., & Kinny, D. (2000). The Gaia methodology for agent-oriented analysis and design. Autonomous Agents and Multi-Agent Systems, 3(3), 285–312. https://doi.org/10.1023/A:1010071910869
Xu, J., Guo, P., Zhao, M., Erbacher, R. F., Zhu, M., & Liu, P. (2014). Comparing different moving target defense techniques. In Proceedings of the first ACM workshop on moving target defense (pp. 97–107). https://doi.org/10.1145/2663474.2663486
Zaffarano, K., Taylor, J., & Hamilton, S. (2015). A quantitative framework for moving target defense effectiveness evaluation. In Proceedings of the second ACM workshop on moving target defense (pp. 3–10). https://doi.org/10.1145/2808475.2808476
Zhuang, R., DeLoach, S. A., & Ou, X. (2014). Towards a theory of moving target defense. In Proceedings of the first ACM workshop on moving target defense (pp. 31–40). https://doi.org/10.1145/2663474.2663479
Acknowledgements
The work presented in this chapter was partially supported by the U.S. Department of Energy, Office of Science under DOE contract number DE-AC02-06CH11357. The submitted manuscript has been created by UChicago Argonne, LLC, operator of Argonne National Laboratory. Argonne, a DOE Office of Science laboratory, is operated under Contract No. DE-AC02-06CH11357. The U.S. Government retains for itself, and others acting on its behalf, a paid-up nonexclusive, irrevocable worldwide license in said article to reproduce, prepare derivative works, distribute copies to the public, and perform publicly and display publicly, by or on behalf of the Government.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Blakely, B., Horsthemke, W., Evans, N., Harkness, D. (2023). Case Study A: A Prototype Autonomous Intelligent Cyber-Defense Agent. In: Kott, A. (eds) Autonomous Intelligent Cyber Defense Agent (AICA). Advances in Information Security, vol 87. Springer, Cham. https://doi.org/10.1007/978-3-031-29269-9_19
Download citation
DOI: https://doi.org/10.1007/978-3-031-29269-9_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-29268-2
Online ISBN: 978-3-031-29269-9
eBook Packages: Computer ScienceComputer Science (R0)