TY - CHAP
T1 - Deployment and Operation
AU - Blakely, Benjamin
AU - Horsthemke, William
AU - Harkness, Daniel
AU - Evans, Nate
N1 - Publisher Copyright:
© 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG.
PY - 2023
Y1 - 2023
N2 - Autonomous Intelligence Cyber-defense Agents are expected to operate in a continuous, unmanned, collaborative capacity in a variety of target network or battlefield environments. They should be able to maintain situational awareness of the nature of the cyber environment and other “agents” within it, monitor for activity that presents a potential threat or advantage, incorporate new knowledge into their environmental model, share parameters of such a model with peers, and take appropriate actions to maximize their own mission success and/or survival (potentially in a collaborative manner). In this chapter, we analyze several scenarios to consider the types of threats such agents might be expected to encounter and what actions would potentially be beneficial for them to take in response. These scenarios include an unmanned automated system (UAS, or “drone”) – solo or as part of a swarm, an electrical distribution grid, an orbital or deep-space communication network, and a large-scale computational array (such as found in a cloud vendor offering or high-performance computing).
AB - Autonomous Intelligence Cyber-defense Agents are expected to operate in a continuous, unmanned, collaborative capacity in a variety of target network or battlefield environments. They should be able to maintain situational awareness of the nature of the cyber environment and other “agents” within it, monitor for activity that presents a potential threat or advantage, incorporate new knowledge into their environmental model, share parameters of such a model with peers, and take appropriate actions to maximize their own mission success and/or survival (potentially in a collaborative manner). In this chapter, we analyze several scenarios to consider the types of threats such agents might be expected to encounter and what actions would potentially be beneficial for them to take in response. These scenarios include an unmanned automated system (UAS, or “drone”) – solo or as part of a swarm, an electrical distribution grid, an orbital or deep-space communication network, and a large-scale computational array (such as found in a cloud vendor offering or high-performance computing).
UR - http://www.scopus.com/inward/record.url?scp=85162008635&partnerID=8YFLogxK
U2 - 10.1007/978-3-031-29269-9_14
DO - 10.1007/978-3-031-29269-9_14
M3 - Chapter
AN - SCOPUS:85162008635
T3 - Advances in Information Security
SP - 295
EP - 310
BT - Advances in Information Security
PB - Springer
ER -