Autonomous Cyber Defense Introduces Risk: Can We Manage the Risk?

01/26/2022
by   Alexandre K. Ligo, et al.
0

From denial-of-service attacks to spreading of ransomware or other malware across an organization's network, it is possible that manually operated defenses are not able to respond in real time at the scale required, and when a breach is detected and remediated the damage is already made. Autonomous cyber defenses therefore become essential to mitigate the risk of successful attacks and their damage, especially when the response time, effort and accuracy required in those defenses is impractical or impossible through defenses operated exclusively by humans. Autonomous agents have the potential to use ML with large amounts of data about known cyberattacks as input, in order to learn patterns and predict characteristics of future attacks. Moreover, learning from past and present attacks enable defenses to adapt to new threats that share characteristics with previous attacks. On the other hand, autonomous cyber defenses introduce risks of unintended harm. Actions arising from autonomous defense agents may have harmful consequences of functional, safety, security, ethical, or moral nature. Here we focus on machine learning training, algorithmic feedback, and algorithmic constraints, with the aim of motivating a discussion on achieving trust in autonomous cyber defenses.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/18/2023

Proceedings of the 2nd International Workshop on Adaptive Cyber Defense

The 2nd International Workshop on Adaptive Cyber Defense was held at the...
research
11/25/2019

When Autonomous Intelligent Goodware will Fight Autonomous Intelligent Malware: A Possible Future of Cyber Defense

In the coming years, the future of military combat will include, on one ...
research
08/19/2021

Proceedings of the 1st International Workshop on Adaptive Cyber Defense

The 1st International Workshop on Adaptive Cyber Defense was held as par...
research
07/12/2022

Markov Decision Process For Automatic Cyber Defense

It is challenging for a security analyst to detect or defend against cyb...
research
11/29/2022

Sludge for Good: Slowing and Imposing Costs on Cyber Attackers

Choice architecture describes the design by which choices are presented ...
research
09/13/2017

On the Accuracy of Formal Verification of Selective Defenses for TDoS Attacks

Telephony Denial of Service (TDoS) attacks target telephony services, su...

Please sign up or login with your details

Forgot password? Click here to reset