Skip to main content

Situational Understanding and Diagnostics

  • Chapter
  • First Online:
Autonomous Intelligent Cyber Defense Agent (AICA)

Part of the book series: Advances in Information Security ((ADIS,volume 87))

  • 428 Accesses

Abstract

This chapter describes situational understanding and diagnostics for autonomous cyber-defense agents. It covers architectural patterns, functional aspects, and interfaces with other agent capabilities. It motivates the need for situational understanding and diagnostics, outlines the major challenges to be met, and considers several illustrative examples. The material centers on the core requirements of situational understanding: diagnosing the nature of a situation, projecting possible future states, assessing associated risks, and triggering responses when situations warrant them. From a functional standpoint, this chapter describes how an agent processes sensed information, continually updates its knowledge base, and assesses a given situation. It examines how these functions must consider adversarial presence, system vulnerabilities, potential adversarial movement, and cyber-to-mission dependencies. This chapter describes agent world models to be instantiated for a given situation, which span the agent, the defended system, perceived threats, and mission context. It also considers methods for managing model and algorithmic complexity and for adapting to new situations, along with practical concerns for agents deployed within operational environments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Ackoff, R. L. (1989). From data to wisdom. Journal of Applies Systems Analysis, 16, 3–9.

    Google Scholar 

  • Albanese, M., Jajodia, S., & Noel, S. (2012). Time-efficient and cost-effective network hardening using attack graphs. IEEE Computer Society.

    Book  Google Scholar 

  • Baumberger, C. (2014). Types of understanding: Their nature and their relation to knowledge. Conceptus, 40(98), 67–88.

    Article  Google Scholar 

  • Bellinger, G., Castro, D., & Mills, A. (2004). Data, information, knowledge, and wisdom. [Online] Available at: https://www.systems-thinking.org/dikw/dikw.htm. Accessed 8 Feb 2022.

  • Binduf, A., et al. (2018). Active directory and related aspects of security. IEEE.

    Book  Google Scholar 

  • Bodeau, D., Graubart, R., & Heinbockel, W. (2013). Mapping the cyber terrain – Enabling cyber defensibility claims and hypotheses to be stated and evaluated with greater rigor and utility (Technical Report MTR130433). The MITRE Corporation.

    Google Scholar 

  • Buckland, J. (2021). Brigade and battalion mobile tactical operations centers. Infantry, Summer, pp. 15–17.

    Google Scholar 

  • Dunagan, J., Zheng, A. X., & Simon, D. R. (2009). Heat-ray: Combating identity snowball attacks using machine learning, combinatorial optimization and attack graphs. ACM.

    Book  Google Scholar 

  • Endsley, M. (1995). Toward a theory of situation awareness in dynamic systems. Human Factors Journal, 37(1), 32–64.

    Article  Google Scholar 

  • Guion, J., & Reith, M. (2017). Cyber terrain mission mapping: Tools and methodologies. IEEE.

    Google Scholar 

  • Heinbockel, W., Noel, S., & Curbo, J. (2016). Mission dependency modeling for cyber situational awareness. NATO Science and Technology Organization (STO).

    Google Scholar 

  • Jungles, P., et al. (2014). Mitigating pass-the-hash and other credential theft. Microsoft Corporation.

    Google Scholar 

  • Kaynar, K. (2016). A taxonomy for attack graph generation and usage in network security. Journal of Information Security and Applications, 29, 27–56.

    Article  Google Scholar 

  • Kordy, B., Piètre-Cambacédès, L., & Schweitzer, P. (2014). DAG-based attack and defense modeling: Don’t miss the forest for the attack trees. Computer Science Review, 13–14, 1–38.

    Article  MATH  Google Scholar 

  • Musman, S., & Temin, A. (2015). A cyber mission impact assessment tool. s.n.

    Book  Google Scholar 

  • Nettis, K. (2020, March 16). Multi-domain operations: Bridging the gaps for dominance. Wild Blue Yonder, pp. 1–9.

    Google Scholar 

  • Noel, S. (2015). Interactive visualization and text mining for the CAPEC cyber attack catalog. ACM.

    Google Scholar 

  • Noel, S. (2018). A review of graph approaches to network security analytics. In From databases to cyber security (Lecture Notes in Computer Science) (pp. 300–323). Springer.

    Chapter  Google Scholar 

  • Noel, S., & Jajodia, S. (2004). Managing attack graph complexity through visual hierarchical aggregation. ACM.

    Book  Google Scholar 

  • Noel, S., & Jajodia, S. (2017). A suite of metrics for network attack graph analytics. In Network security metrics (pp. 141–176). Springer.

    Chapter  Google Scholar 

  • Noel, S., Harley, E., Tam, K. H., & Gyor, G. (2015). Big-data architecture for cyber attack graphs: Representing security relationships in NoSQL graph databases. IEEE.

    Google Scholar 

  • Noel, S., et al. (2016). CyGraph: Graph-based analytics and visualization for cybersecurity. In Cognitive computing: Theory and applications (Volume 35 of Handbook of Statistics) (pp. 117–167). Elsevier.

    Chapter  Google Scholar 

  • Noel, S., Bodeau, D., & McQuaid, R. (2017). Big-data graph knowledge bases for cyber resilience. NATO Science and Technology Organization (STO).

    Google Scholar 

  • Noel, S., et al. (2021a). Graph analytics and visualization for cyber situational understanding. Journal of Defense Modeling and Simulation, Volume Impact Analysis for Cyber Defense Optimization, 1–15.

    Google Scholar 

  • Noel, S., Swarup, V., & Johnsgard, K. (2021b). Optimizing network microsegmentation policy for cyber resilience. Journal of Defense Modeling and Simulation, Volume Impact Analysis for Cyber Defense Optimization, 1–23.

    Google Scholar 

  • Perkins, D. (1998). What is understanding? In Teaching for understanding: Linking research with practice (pp. 39–57). Wiley.

    Google Scholar 

  • Reiter, R. (1991). The frame problem in the situational calculus: A simple solution (sometimes) and a completeness result for goal regression. In Artificial intelligence and mathematical theory of computation: Papers in honor of John McCarthy (pp. 359–380). Academic.

    Chapter  Google Scholar 

  • Robbins, A., Vazarkar, R., & Schroeder, W. (2016–2019). Bloodhound: Six degrees of domain admin. [Online]. Available at: https://github.com/BloodHoundAD/BloodHound. Accessed 15 Jan 2022.

  • Sabur, A., Chowdhary, A., Huang, D., & Alshamran, A. (2022). Toward scalable graph-based security analysis for cloud networks. Computer Networks, 206, 1–20.

    Article  Google Scholar 

  • Schulz, A., Kotson, M., & Zipkin, J. (2015). Cyber network mission dependencies (Technical Report 1189). Lincoln Laboratory.

    Google Scholar 

  • Sowa, J. F. (1992). Semantic networks. In N. J. Hoboken (Ed.), Encyclopedia of artificial intelligence (2nd ed., pp. 1–25). Wiley.

    Google Scholar 

  • Tadda, G. (2008). Measuring performance of cyber situation awareness systems. s.n.

    Google Scholar 

  • The MITRE Corporation. (1999–2022). CVE® – Common vulnerabilities and exposures. [Online]. Available at: https://cve.mitre.org. Accessed 25 Jan 2022.

  • The MITRE Corporation. (2007–2021). CAPECâ„¢ – Common attack pattern enumeration and classification. [Online]. Available at: https://capec.mitre.org. Accessed 25 Jan 2022.

  • The MITRE Corporation. (2007–2022). Making security measurableâ„¢. [Online]. Available at: https://makingsecuritymeasurable.mitre.org. Accessed 25 Jan 2022.

  • The MITRE Corporation. (2015–2021). MITRE ATT&CK®. [Online] Available at: https://attack.mitre.org. Accessed 25 Jan 2022.

  • The MITRE Corporation (2020). Malware attribute enumeration and characterization (MAECâ„¢). [Online]. Available at: http://maecproject.github.io Accessed 25 Jan 2022.

  • Thieme, C., Mosleh, A., Utne, I., & Hegde, J. (2020). Incorporating software failure in risk analysis – Part 1: Software functional failure mode classification. Reliability Engineering and System Safety, 194, 1–13.

    Google Scholar 

  • U.S. Joint Chiefs of Staff. (2018). Cyberspace operations (Joint Publication 3-12). U.S. Department of Defense.

    Google Scholar 

  • Yee, E., Chrysikou, E. G., & Thompson-Schill, S. L. (2013). Semantic memory. In The Oxford handbook of cognitive neuroscience (Volume 1: Core Topics) (pp. 353–374). Oxford University Press.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Steven Noel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Noel, S., Swarup, V. (2023). Situational Understanding and Diagnostics. In: Kott, A. (eds) Autonomous Intelligent Cyber Defense Agent (AICA). Advances in Information Security, vol 87. Springer, Cham. https://doi.org/10.1007/978-3-031-29269-9_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-29269-9_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-29268-2

  • Online ISBN: 978-3-031-29269-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics