Skip to main content

Perception of the Environment

  • Chapter
  • First Online:
Autonomous Intelligent Cyber Defense Agent (AICA)

Part of the book series: Advances in Information Security ((ADIS,volume 87))

Abstract

This chapter discusses the intricacies of cybersecurity agents’ perception. It addresses the complexity of perception and illuminates how perception is shaping and influencing the decision-making process. It then explores the necessary considerations when crafting the world representation and discusses the power and bandwidth constraints of perception and the underlying issues of AICA’s trust in perception. On these foundations, it provides the reader with a guide to developing perception models for AICA, discussing the trade-offs of each objective state approximation. The guide is written in the context of the CYST cybersecurity simulation engine, which aims to closely model cybersecurity interactions and can be used as a basis for developing AICA. Because CYST is freely available, the reader is welcome to try implementing and evaluating the proposed methods for themselves.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Ackoff, R. (1989). From data to wisdom. Journal of Applied Systems Analysis, 16, 3–9.

    Google Scholar 

  • Baldasarre, M. (2017). Think big: learning contexts, algorithms and data science. Research on Education and Media, stránky 69–83.

    Google Scholar 

  • Drašar, M. (2022). CYST. Načteno z. https://muni.cz/go/cyst/

  • Drašar, M., Moskal, S., Yang, S., & Zaťko, P. (2020). Session-level adversary intent-driven cyberattack simulator. In 2020 IEEE/ACM 24th International Symposium on Distributed Simulation and Real Time Applications (DS-RT).

    Google Scholar 

  • Liu, J., & Park, J.-M. (2021). “Seeing is not always believing”: Detecting perception error attacks against autonomous vehicles. IEEE Transactions on Dependable and Secure Computing, stránky 2209–2223.

    Google Scholar 

  • Man, Y., Li, M., & Gerdes, R. (2020). GhostImage: Remote perception attacks against camera-based image classification systems. In RAID 2020.

    Google Scholar 

  • Mikolov, T., Corrado, G. S., Chen, K., & Dean, J. (2013). Efficient estimation of word representations in vector space. In Proceedings of the International Conference on Learning Representations.

    Google Scholar 

  • MITRE. (nedatováno). CVE. Načteno z. https://cve.mitre.org/

  • Modarez, H., Kiumarsi, B., Lewis, F. L., Frank, F., & Davoudi, A. (2020). Resilient and robust synchronization of multiagent systems under attacks on sensors and actuators. IEEE Transactions on Cybernetics, stránky 1240–1250.

    Google Scholar 

  • Nasralla, M. M., García-Magariño, I., & Lloret, J. (2020). Defenses against perception-layer attacks on iot smart furniture for impaired people. IEEE Access, stránky 119795–119805.

    Google Scholar 

  • Russel, S., & Norvig, P. (2020). Artificial intelligence: A modern approach (4th ed.). Pearson.

    Google Scholar 

  • Saul, L. K., & Roweis, S. T. (2003). Think globally, fit locally: Unsupervised learning of low dimensional manifolds. Journal of Machine Learning Research, stránky 119–155.

    Google Scholar 

  • Shoukry, Y., Martin, P., Yona, Y., Diggavi, S., & Srivastava, M. (2015). PyCRA: Physical challenge-response authentication for active sensors under spoofing attacks. In CCS ‘15: Proceedings of the 22nd ACM SIGSAC conference on computer and communications security (stránky 1004–1015).

    Google Scholar 

  • Theron, P., Kott, A., Drašar, M., Rzadca, K., LeBlanc, B., Pihelgas, M., …, de Gaspari, F. (2020). Reference architecture of an autonomous agent for cyber defense of complex military systems. V Adaptive Autonomous Secure Cyber Systems (stránky 1–21).

    Google Scholar 

  • Yan, C., Xu, W., & Liu, J. (2016). Can you trust autonomous vehicles: Contactless attacks. DEF CON, 24.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Martin Drasar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Drasar, M. (2023). Perception of the Environment. In: Kott, A. (eds) Autonomous Intelligent Cyber Defense Agent (AICA). Advances in Information Security, vol 87. Springer, Cham. https://doi.org/10.1007/978-3-031-29269-9_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-29269-9_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-29268-2

  • Online ISBN: 978-3-031-29269-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics