LEADER 04921nam 22006495 450 001 9910728948603321 005 20230602172103.0 010 $a3-031-29269-3 024 7 $a10.1007/978-3-031-29269-9 035 $a(MiAaPQ)EBC30564808 035 $a(Au-PeEL)EBL30564808 035 $a(OCoLC)1381710952 035 $a(DE-He213)978-3-031-29269-9 035 $a(BIP)088809076 035 $a(PPN)272261211 035 $a(CKB)26821658300041 035 $a(EXLCZ)9926821658300041 100 $a20230602d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAutonomous Intelligent Cyber Defense Agent (AICA) $eA Comprehensive Guide /$fedited by Alexander Kott 205 $a1st ed. 2023. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2023. 215 $a1 online resource (468 pages) 225 1 $aAdvances in Information Security,$x2512-2193 ;$v87 311 08$aPrint version: Kott, Alexander Autonomous Intelligent Cyber Defense Agent (AICA) Cham : Springer International Publishing AG,c2023 9783031292682 327 $aChapter. 1. Autonomous Intelligent Cyber-defense Agent: Introduction and Overview -- Chapter. 2. Alternative Architectural Approaches -- Chapter. 3. Perception of Environment -- Chapter. 4. Perception of Cyber Threats -- Chapter. 5. Situational Understanding and Diagnostics -- Chapter. 6. Learning about the Adversary -- Chapter. 7. Response Planning -- Chapter. 8. Recovery Planning -- Chapter. 9. Strategic Cyber Camouflage -- Chapter. 10. Adaptivity & Antifragility -- Chapter. 11. Negotiation and Collaboration -- Chapter. 12. Human Interactions -- Chapter. 13. Testing and Measurements -- Chapter. 14. Deployment and Operation -- Chapter. 15. Command in AICA-intensive Operations -- Chapter. 16. Risk Management -- Chapter. 17. Policy Issues -- Chapter. 18. Development Challenges -- Chapter. 19. Case Study A: A Prototype Autonomous Intelligent Cyber-defense Agent -- Chapter. 20. Case Study B: AI Agents for Tactical Edge -- Chapter. 21. Case Study C: the Sentinel Agents. 330 $aThis book offers a structured overview and a comprehensive guide to the emerging field of Autonomous Intelligent Cyber Defense Agents (AICA). The book discusses the current technical issues in autonomous cyber defense and offers information on practical design approaches. The material is presented in a way that is accessible to non-specialists, with tutorial information provided in the initial chapters and as needed throughout the book. The reader is provided with clear and comprehensive background and reference material for each aspect of AICA. Today?s cyber defense tools are mostly watchers. They are not active doers. They do little to plan and execute responses to attacks, and they don?t plan and execute recovery activities. Response and recovery ? core elements of cyber resilience ? are left to human cyber analysts, incident responders and system administrators. This is about to change. The authors advocate this vision, provide detailed guide to how such a vision can be realized in practice, and its current state of the art. This book also covers key topics relevant to the field, including functional requirements and alternative architectures of AICA, how it perceives and understands threats and the overall situation, how it plans and executes response and recovery, how it survives threats, and how human operators deploy and control AICA. Additionally, this book covers issues of testing, risk, and policy pertinent to AICA, and provides a roadmap towards future R&D in this field. This book targets researchers and advanced students in the field of cyber defense and resilience. Professionals working in this field as well as developers of practical products for cyber autonomy will also want to purchase this book. 410 0$aAdvances in Information Security,$x2512-2193 ;$v87 606 $aArtificial intelligence 606 $aComputer networks?Security measures 606 $aData protection?Law and legislation 606 $aArtificial Intelligence 606 $aMobile and Network Security 606 $aPrivacy 610 $aMilitary Art And Science 610 $aTechnology & Engineering 615 0$aArtificial intelligence. 615 0$aComputer networks?Security measures. 615 0$aData protection?Law and legislation. 615 14$aArtificial Intelligence. 615 24$aMobile and Network Security. 615 24$aPrivacy. 676 $a355.45 676 $a355.45 700 $aKott$b Alexander$01177877 702 $aKott$b Alexander$4edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910728948603321 996 $aAutonomous Intelligent Cyber Defense Agent (AICA)$93384461 997 $aUNINA