Abstract
This chapter discusses the intricacies of cybersecurity agents’ perception. It addresses the complexity of perception and illuminates how perception is shaping and influencing the decision-making process. It then explores the necessary considerations when crafting the world representation and discusses the power and bandwidth constraints of perception and the underlying issues of AICA’s trust in perception. On these foundations, it provides the reader with a guide to developing perception models for AICA, discussing the trade-offs of each objective state approximation. The guide is written in the context of the CYST cybersecurity simulation engine, which aims to closely model cybersecurity interactions and can be used as a basis for developing AICA. Because CYST is freely available, the reader is welcome to try implementing and evaluating the proposed methods for themselves.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ackoff, R. (1989). From data to wisdom. Journal of Applied Systems Analysis, 16, 3–9.
Baldasarre, M. (2017). Think big: learning contexts, algorithms and data science. Research on Education and Media, stránky 69–83.
Drašar, M. (2022). CYST. Načteno z. https://muni.cz/go/cyst/
Drašar, M., Moskal, S., Yang, S., & Zaťko, P. (2020). Session-level adversary intent-driven cyberattack simulator. In 2020 IEEE/ACM 24th International Symposium on Distributed Simulation and Real Time Applications (DS-RT).
Liu, J., & Park, J.-M. (2021). “Seeing is not always believing”: Detecting perception error attacks against autonomous vehicles. IEEE Transactions on Dependable and Secure Computing, stránky 2209–2223.
Man, Y., Li, M., & Gerdes, R. (2020). GhostImage: Remote perception attacks against camera-based image classification systems. In RAID 2020.
Mikolov, T., Corrado, G. S., Chen, K., & Dean, J. (2013). Efficient estimation of word representations in vector space. In Proceedings of the International Conference on Learning Representations.
MITRE. (nedatováno). CVE. Načteno z. https://cve.mitre.org/
Modarez, H., Kiumarsi, B., Lewis, F. L., Frank, F., & Davoudi, A. (2020). Resilient and robust synchronization of multiagent systems under attacks on sensors and actuators. IEEE Transactions on Cybernetics, stránky 1240–1250.
Nasralla, M. M., García-Magariño, I., & Lloret, J. (2020). Defenses against perception-layer attacks on iot smart furniture for impaired people. IEEE Access, stránky 119795–119805.
Russel, S., & Norvig, P. (2020). Artificial intelligence: A modern approach (4th ed.). Pearson.
Saul, L. K., & Roweis, S. T. (2003). Think globally, fit locally: Unsupervised learning of low dimensional manifolds. Journal of Machine Learning Research, stránky 119–155.
Shoukry, Y., Martin, P., Yona, Y., Diggavi, S., & Srivastava, M. (2015). PyCRA: Physical challenge-response authentication for active sensors under spoofing attacks. In CCS ‘15: Proceedings of the 22nd ACM SIGSAC conference on computer and communications security (stránky 1004–1015).
Theron, P., Kott, A., Drašar, M., Rzadca, K., LeBlanc, B., Pihelgas, M., …, de Gaspari, F. (2020). Reference architecture of an autonomous agent for cyber defense of complex military systems. V Adaptive Autonomous Secure Cyber Systems (stránky 1–21).
Yan, C., Xu, W., & Liu, J. (2016). Can you trust autonomous vehicles: Contactless attacks. DEF CON, 24.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Drasar, M. (2023). Perception of the Environment. In: Kott, A. (eds) Autonomous Intelligent Cyber Defense Agent (AICA). Advances in Information Security, vol 87. Springer, Cham. https://doi.org/10.1007/978-3-031-29269-9_3
Download citation
DOI: https://doi.org/10.1007/978-3-031-29269-9_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-29268-2
Online ISBN: 978-3-031-29269-9
eBook Packages: Computer ScienceComputer Science (R0)