Skip to main content

Showing 1–50 of 54 results for author: Kott, A

.
  1. arXiv:2304.12408  [pdf

    cs.CR

    Autonomous Intelligent Cyber-defense Agent: Introduction and Overview

    Authors: Alexander Kott

    Abstract: This chapter introduces the concept of Autonomous Intelligent Cyber-defense Agents (AICAs), and briefly explains the importance of this field and the motivation for its emergence. AICA is a software agent that resides on a system, and is responsible for defending the system from cyber compromises and enabling the response and recovery of the system, usually autonomously. The autonomy of the agent… ▽ More

    Submitted 24 April, 2023; originally announced April 2023.

  2. arXiv:2303.16307  [pdf, other

    cs.CR math.DS

    Quantitative Measurement of Cyber Resilience: Modeling and Experimentation

    Authors: Michael J. Weisman, Alexander Kott, Jason E. Ellis, Brian J. Murphy, Travis W. Parker, Sidney Smith, Joachim Vandekerckhove

    Abstract: Cyber resilience is the ability of a system to resist and recover from a cyber attack, thereby restoring the system's functionality. Effective design and development of a cyber resilient system requires experimental methods and tools for quantitative measuring of cyber resilience. This paper describes an experimental method and test bed for obtaining resilience-relevant data as a system (in our ca… ▽ More

    Submitted 28 March, 2023; originally announced March 2023.

    Comments: arXiv admin note: text overlap with arXiv:2302.04413, arXiv:2302.07941

  3. An Experimentation Infrastructure for Quantitative Measurements of Cyber Resilience

    Authors: Jason E. Ellis, Travis W. Parker, Joachim Vandekerckhove, Brian J. Murphy, Sidney Smith, Alexander Kott, Michael J. Weisman

    Abstract: The vulnerability of cyber-physical systems to cyber attack is well known, and the requirement to build cyber resilience into these systems has been firmly established. The key challenge this paper addresses is that maturing this discipline requires the development of techniques, tools, and processes for objectively, rigorously, and quantitatively measuring the attributes of cyber resilience. Rese… ▽ More

    Submitted 15 February, 2023; originally announced February 2023.

    Comments: 6 pages, 2022 IEEE Military Communications Conference, pp. 855-860

  4. arXiv:2302.04982  [pdf, other

    cs.CR math.DS stat.AP

    Piecewise Linear and Stochastic Models for the Analysis of Cyber Resilience

    Authors: Michael J. Weisman, Alexander Kott, Joachim Vandekerckhove

    Abstract: We model a vehicle equipped with an autonomous cyber-defense system in addition to its inherent physical resilience features. When attacked, this ensemble of cyber-physical features (i.e., ``bonware'') strives to resist and recover from the performance degradation caused by the malware's attack. We model the underlying differential equations governing such attacks for piecewise linear characteriza… ▽ More

    Submitted 16 February, 2023; v1 submitted 9 February, 2023; originally announced February 2023.

    Comments: 6 pages, Invited Session on "Estimation and Learning in Stochastic Systems" for the 57th Annual Conference on Information Sciences and Systems. Co-sponsorship of Johns Hopkins University and the IEEE Information Theory Society

  5. Mathematical Modeling of Cyber Resilience

    Authors: Alexander Kott, Michael J. Weisman, Joachim Vandekerckhove

    Abstract: We identify quantitative characteristics of responses to cyber compromises that can be learned from repeatable, systematic experiments. We model a vehicle equipped with an autonomous cyber-defense system and which also has some inherent physical resilience features. When attacked by malware, this ensemble of cyber-physical features (i.e., "bonware") strives to resist and recover from the performan… ▽ More

    Submitted 27 February, 2023; v1 submitted 8 February, 2023; originally announced February 2023.

    Comments: 7 pages, 2022 IEEE Military Communications Conference

  6. arXiv:2201.11152  [pdf

    cs.CR

    Cyber Resilience: by Design or by Intervention?

    Authors: Alexander Kott, Maureen S. Golan, Benjamin D. Trump, Igor Linkov

    Abstract: The term "cyber resilience by design" is growing in popularity. Here, by cyber resilience we refer to the ability of the system to resist, minimize and mitigate a degradation caused by a successful cyber-attack on a system or network of computing and communicating devices. Some use the term "by design" when arguing that systems must be designed and implemented in a provable mission assurance fashi… ▽ More

    Submitted 26 January, 2022; originally announced January 2022.

  7. arXiv:2201.11148  [pdf

    cs.CR

    Autonomous Cyber Defense Introduces Risk: Can We Manage the Risk?

    Authors: Alexandre K. Ligo, Alexander Kott, Igor Linkov

    Abstract: From denial-of-service attacks to spreading of ransomware or other malware across an organization's network, it is possible that manually operated defenses are not able to respond in real time at the scale required, and when a breach is detected and remediated the damage is already made. Autonomous cyber defenses therefore become essential to mitigate the risk of successful attacks and their damag… ▽ More

    Submitted 26 January, 2022; originally announced January 2022.

  8. arXiv:2201.11117  [pdf

    cs.AI

    Cybertrust: From Explainable to Actionable and Interpretable AI (AI2)

    Authors: Stephanie Galaitsi, Benjamin D. Trump, Jeffrey M. Keisler, Igor Linkov, Alexander Kott

    Abstract: To benefit from AI advances, users and operators of AI systems must have reason to trust it. Trust arises from multiple interactions, where predictable and desirable behavior is reinforced over time. Providing the system's users with some understanding of AI operations can support predictability, but forcing AI to explain itself risks constraining AI capabilities to only those reconcilable with hu… ▽ More

    Submitted 26 January, 2022; originally announced January 2022.

  9. arXiv:2201.11111  [pdf

    cs.CR

    Doers, not Watchers: Intelligent Autonomous Agents are a Path to Cyber Resilience

    Authors: Alexander Kott, Paul Theron

    Abstract: Today's cyber defense tools are mostly watchers. They are not active doers. To be sure, watching too is a demanding affair. These tools monitor the traffic and events; they detect malicious signatures, patterns and anomalies; they might classify and characterize what they observe; they issue alerts, and they might even learn while doing all this. But they don't act. They do little to plan and exec… ▽ More

    Submitted 26 January, 2022; originally announced January 2022.

  10. arXiv:2110.11305  [pdf, other

    cs.LG cs.MA

    On games and simulators as a platform for development of artificial intelligence for command and control

    Authors: Vinicius G. Goecks, Nicholas Waytowich, Derrik E. Asher, Song Jun Park, Mark Mittrick, John Richardson, Manuel Vindiola, Anne Logie, Mark Dennison, Theron Trout, Priya Narayanan, Alexander Kott

    Abstract: Games and simulators can be a valuable platform to execute complex multi-agent, multiplayer, imperfect information scenarios with significant parallels to military applications: multiple participants manage resources and make decisions that command assets to secure specific areas of a map or neutralize opposing forces. These characteristics have attracted the artificial intelligence (AI) community… ▽ More

    Submitted 21 October, 2021; originally announced October 2021.

    Comments: Preprint submitted to the Journal of Defense Modeling and Simulation (JDMS) for peer review

    ACM Class: I.2.6; I.6.3; A.1

  11. arXiv:2102.09455  [pdf

    cs.CR

    To Improve Cyber Resilience, Measure It

    Authors: Alexander Kott, Igor Linkov

    Abstract: We are not very good at measuring -- rigorously and quantitatively -- the cyber security of systems. Our ability to measure cyber resilience is even worse. And without measuring cyber resilience, we can neither improve it nor trust its efficacy. It is difficult to know if we are improving or degrading cyber resilience when we add another control, or a mix of controls, to harden the system. The onl… ▽ More

    Submitted 18 February, 2021; originally announced February 2021.

  12. arXiv:2102.00528  [pdf

    cs.CR

    How to Measure Cyber Resilience of an Autonomous Agent: Approaches and Challenges

    Authors: Alexandre Ligo, Alexander Kott, Igor Linkov

    Abstract: Several approaches have been used to assess the performance of cyberphysical systems and their exposure to various types of risks. Such assessments have become increasingly important as autonomous attackers ramp up the frequency, duration and intensity of threats while autonomous agents have the potential to respond to cyber-attacks with unprecedented speed and scale. However, most assessment appr… ▽ More

    Submitted 31 January, 2021; originally announced February 2021.

  13. arXiv:1912.01959  [pdf

    cs.CR

    When Autonomous Intelligent Goodware will Fight Autonomous Intelligent Malware: A Possible Future of Cyber Defense

    Authors: Paul Théron, Alexander Kott

    Abstract: In the coming years, the future of military combat will include, on one hand, artificial intelligence-optimized complex command, control, communications, computers, intelligence, surveillance and reconnaissance (C4ISR) and networks and, on the other hand, autonomous intelligent Things fighting autonomous intelligent Things at a fast pace. Under this perspective, enemy forces will seek to disable o… ▽ More

    Submitted 25 November, 2019; originally announced December 2019.

    Comments: MILCOM-2019

  14. arXiv:1908.03435  [pdf

    stat.AP

    Discovering a Regularity: the Case of An 800-year Law of Advances in Small-Arms Technologies

    Authors: Alexander Kott, Philip Perconti, Nandi Leslie

    Abstract: Considering a broad family of technologies where a measure of performance (MoP) is difficult or impossible to formulate, we seek an alternative measure that exhibits a regular pattern of evolution over time, similar to how a MoP may follow a Moore's law. In an empirical case study, we explore an approach to identifying such a composite measure called a Figure of Regularity (FoR). We use the propos… ▽ More

    Submitted 9 August, 2019; originally announced August 2019.

    Comments: under review, Technology Analysis and Strategic Management journal

  15. arXiv:1905.05253  [pdf

    cs.CR

    Features and Operation of an Autonomous Agent for Cyber Defense

    Authors: Michael J. De Lucia, Allison Newcomb, Alexander Kott

    Abstract: An ever increasing number of battlefield devices that are capable of collecting, processing, storing, and communicating information are rapidly becoming interconnected. The staggering number of connected devices on the battlefield greatly increases the possibility that an adversary could find ways to exploit hardware or software vulnerabilities, degrading or denying Warfighters the assured and sec… ▽ More

    Submitted 13 May, 2019; originally announced May 2019.

    Journal ref: CSIAC Journal, v.7, n.1, April 2019, pp.6-13

  16. arXiv:1902.10086  [pdf

    cs.AI cs.CY

    Intelligent Autonomous Things on the Battlefield

    Authors: Alexander Kott, Ethan Stump

    Abstract: Numerous, artificially intelligent, networked things will populate the battlefield of the future, operating in close collaboration with human warfighters, and fighting as teams in highly adversarial environments. This chapter explores the characteristics, capabilities and intelli-gence required of such a network of intelligent things and humans - Internet of Battle Things (IOBT). The IOBT will exp… ▽ More

    Submitted 26 February, 2019; originally announced February 2019.

    Comments: This is a much expanded version of an earlier conference paper available at arXiv:803.11256

    Journal ref: In Artificial Intelligence for the Internet of Everything, pp. 47-65. Academic Press, 2019

  17. Statistical Models for the Number of Successful Cyber Intrusions

    Authors: Nandi O. Leslie, Richard E. Harang, Lawrence P. Knachel, Alexander Kott

    Abstract: We propose several generalized linear models (GLMs) to predict the number of successful cyber intrusions (or "intrusions") into an organization's computer network, where the rate at which intrusions occur is a function of the following observable characteristics of the organization: (i) domain name server (DNS) traffic classified by their top-level domains (TLDs); (ii) the number of network securi… ▽ More

    Submitted 14 January, 2019; originally announced January 2019.

    Journal ref: The Journal of Defense Modeling and Simulation, 15(1), 49-63

  18. arXiv:1812.08014  [pdf

    cs.CR

    Intelligent Autonomous Agents are Key to Cyber Defense of the Future Army Networks

    Authors: Alexander Kott

    Abstract: Intelligent autonomous agents will be widely present on the battlefield of the future. The proliferation of intelligent agents is the emerging reality of warfare, and they will form an ever growing fraction of total military assets. By necessity, intelligent autonomous cyber defense agents are likely to become primary cyber fighters on the future battlefield. Initial explorations have identified t… ▽ More

    Submitted 18 December, 2018; originally announced December 2018.

    Comments: This is a pre-print version of the article appearing in The Cyber Defense Review journal, Fall 2018. arXiv admin note: text overlap with arXiv:1803.11256

  19. arXiv:1809.10808  [pdf

    cs.CR

    Game-Theoretic Model and Experimental Investigation of Cyber Wargaming

    Authors: Edward Colbert, Alexander Kott, Lawrence Knachel

    Abstract: We demonstrate that game-theoretic calculations serve as a useful tool for assisting cyber wargaming teams in identifying useful strategies. We note a significant similarity between formulating cyber wargaming strategies and the methodology known in military practice as Course of Action (COA) generation. For scenarios in which the attacker must penetrate multiple layers in a defense-in-depth secur… ▽ More

    Submitted 27 September, 2018; originally announced September 2018.

    Comments: Preliminary version to be published in JDMS

    Journal ref: JDMS 2018

  20. arXiv:1807.08339  [pdf

    cs.CY

    Long-Term Forecasts of Military Technologies for a 20-30 Year Horizon: An Empirical Assessment of Accuracy

    Authors: Alexander Kott, Philip Perconti

    Abstract: During the 1990s, while exploring the impact of the collapse of the Soviet Union on developments in future warfare, a number of authors offered forecasts of military technology appearing by the year 2020. This paper offers a quantitative assessment of the accuracy of this group of forecasts. The overall accuracy - by several measures - was assessed as quite high, thereby pointing to the potential… ▽ More

    Submitted 22 July, 2018; originally announced July 2018.

    Comments: under review at the Technological Forecasting and Social Change journal

  21. arXiv:1806.08657  [pdf

    cs.CR

    Towards an Active, Autonomous and Intelligent Cyber Defense of Military Systems: the NATO AICA Reference Architecture

    Authors: Paul Theron, Alexander Kott, Martin Drašar, Krzysztof Rzadca, Benoît LeBlanc, Mauno Pihelgas, Luigi Mancini, Agostino Panico

    Abstract: Within the future Global Information Grid, complex massively interconnected systems, isolated defense vehicles, sensors and effectors, and infrastructures and systems demanding extremely low failure rates, to which human security operators cannot have an easy access and cannot deliver fast enough reactions to cyber-attacks, need an active, autonomous and intelligent cyber defense. Multi Agent Syst… ▽ More

    Submitted 7 June, 2018; originally announced June 2018.

    Comments: This is a pre-print version of the paper that appears in the Proceedings of the International Conference on Military Communications and Information Systems, Warsaw, Poland, 22-23 May 2018. arXiv admin note: substantial text overlap with arXiv:1803.10664

  22. arXiv:1806.08349  [pdf

    cs.CR

    Towards a Reconceptualisation of Cyber Risk: An Empirical and Ontological Study

    Authors: Alessandro Oltramari, Alexander Kott

    Abstract: The prominence and use of the concept of cyber risk has been rising in recent years. This paper presents empirical investigations focused on two important and distinct groups within the broad community of cyber-defense professionals and researchers: (1) cyber practitioners and (2) developers of cyber ontologies. The key finding of this work is that the ways the concept of cyber risk is treated by… ▽ More

    Submitted 21 June, 2018; originally announced June 2018.

    Comments: This is a pre-print version of the paper published in the Journal of Information Warfare, volume 17, issue 1, Winter 2018

  23. arXiv:1806.02852  [pdf

    cs.CR

    Fundamental Concepts of Cyber Resilience: Introduction and Overview

    Authors: Igor Linkov, Alexander Kott

    Abstract: Given the rapid evolution of threats to cyber systems, new management approaches are needed that address risk across all interdependent domains (i.e., physical, information, cognitive, and social) of cyber systems. Further, the traditional approach of hardening of cyber systems against identified threats has proven to be impossible. Therefore, in the same way that biological systems develop immuni… ▽ More

    Submitted 7 June, 2018; originally announced June 2018.

    Comments: This is a preprint version of a chapter that appears in the book "Cyber Resilience of Systems and Networks," Springer 2018

  24. arXiv:1804.07651  [pdf

    cs.CR

    Approaches to Enhancing Cyber Resilience: Report of the North Atlantic Treaty Organization (NATO) Workshop IST-153

    Authors: Alexander Kott, Benjamin Blakely, Diane Henshel, Gregory Wehner, James Rowell, Nathaniel Evans, Luis Muñoz-González, Nandi Leslie, Donald W French, Donald Woodard, Kerry Krutilla, Amanda Joyce, Igor Linkov, Carmen Mas-Machuca, Janos Sztipanovits, Hugh Harney, Dennis Kergl, Perri Nejib, Edward Yakabovicz, Steven Noel, Tim Dudman, Pierre Trepagnier, Sowdagar Badesha, Alfred Møller

    Abstract: This report summarizes the discussions and findings of the 2017 North Atlantic Treaty Organization (NATO) Workshop, IST-153, on Cyber Resilience, held in Munich, Germany, on 23-25 October 2017, at the University of Bundeswehr. Despite continual progress in managing risks in the cyber domain, anticipation and prevention of all possible attacks and malfunctions are not feasible for the current or fu… ▽ More

    Submitted 20 April, 2018; originally announced April 2018.

    Report number: ARL-SR-0396

  25. arXiv:1804.07646  [pdf

    cs.CR

    Toward Intelligent Autonomous Agents for Cyber Defense: Report of the 2017 Workshop by the North Atlantic Treaty Organization (NATO) Research Group IST-152-RTG

    Authors: Alexander Kott, Ryan Thomas, Martin Drašar, Markus Kont, Alex Poylisher, Benjamin Blakely, Paul Theron, Nathaniel Evans, Nandi Leslie, Rajdeep Singh, Maria Rigaki, S Jay Yang, Benoit LeBlanc, Paul Losiewicz, Sylvain Hourlier, Misty Blowers, Hugh Harney, Gregory Wehner, Alessandro Guarino, Jana Komárková, James Rowell

    Abstract: This report summarizes the discussions and findings of the Workshop on Intelligent Autonomous Agents for Cyber Defence and Resilience organized by the NATO research group IST-152-RTG. The workshop was held in Prague, Czech Republic, on 18-20 October 2017. There is a growing recognition that future cyber defense should involve extensive use of partially autonomous agents that actively patrol the fr… ▽ More

    Submitted 20 April, 2018; originally announced April 2018.

    Report number: ARL-SR-0395

  26. arXiv:1803.11256  [pdf

    cs.CY cs.AI

    Challenges and Characteristics of Intelligent Autonomy for Internet of Battle Things in Highly Adversarial Environments

    Authors: Alexander Kott

    Abstract: Numerous, artificially intelligent, networked things will populate the battlefield of the future, operating in close collaboration with human warfighters, and fighting as teams in highly adversarial environments. This paper explores the characteristics, capabilities and intelligence required of such a network of intelligent things and humans - Internet of Battle Things (IOBT). It will experience u… ▽ More

    Submitted 13 April, 2018; v1 submitted 20 March, 2018; originally announced March 2018.

    Comments: This is a version of the paper that was presented at, and will appear in the Proceedings of the 2018 Spring Symposium of AAAI, March 26-28, 2018, Palo Alto, CA

  27. arXiv:1803.10664  [pdf

    cs.CR

    Autonomous Intelligent Cyber-defense Agent (AICA) Reference Architecture. Release 2.0

    Authors: Alexander Kott, Paul Théron, Martin Drašar, Edlira Dushku, Benoît LeBlanc, Paul Losiewicz, Alessandro Guarino, Luigi Mancini, Agostino Panico, Mauno Pihelgas, Krzysztof Rzadca, Fabio De Gaspari

    Abstract: This report - a major revision of its previous release - describes a reference architecture for intelligent software agents performing active, largely autonomous cyber-defense actions on military networks of computing and communicating devices. The report is produced by the North Atlantic Treaty Organization (NATO) Research Task Group (RTG) IST-152 "Intelligent Autonomous Agents for Cyber Defense… ▽ More

    Submitted 22 March, 2023; v1 submitted 28 March, 2018; originally announced March 2018.

    Comments: This is a major revision and extension of the earlier release of AICA Reference Architecture

    Report number: ARL-SR-0421

  28. arXiv:1712.08980  [pdf

    cs.CY

    The Internet of Battle Things

    Authors: Alexander Kott, Ananthram Swami, Bruce J West

    Abstract: The battlefield of the future will be densely populated by a variety of entities ("things") -- some intelligent and some only marginally so -- performing a broad range of tasks: sensing, communicating, acting, and collaborating with each other and human warfighters. We call this the Internet of Battle Things, IoBT. In some ways, IoBT is already becoming a reality, but 20-30 years from now it is li… ▽ More

    Submitted 24 December, 2017; originally announced December 2017.

    Comments: This is a version of the article that appears in IEEE Computer as: Kott, Alexander, Ananthram Swami, and Bruce J. West. "The Internet of Battle Things." Computer 49.12 (2016): 70-75

    Journal ref: Computer 49.12 (2016): 70-75

  29. arXiv:1712.08976  [pdf

    cs.CY

    How do you Command an Army of Intelligent Things?

    Authors: Alexander Kott, David Alberts

    Abstract: Within a decade, probably less, we will need to find ways to work effectively with ever growing numbers of intelligent things, including robots and intelligent agents. The networked workforce of the near future will thus consist of not only interconnected and interdependent humans but also of intelligent things. This raises a number of challenging issues, none more compelling and urgent than findi… ▽ More

    Submitted 24 December, 2017; originally announced December 2017.

    Comments: This is a version of the article that appears in IEEE Computer as: Kott, Alexander, and David S. Alberts. "How Do You Command an Army of Intelligent Things?." Computer 12 (2017): 96-100

    Journal ref: Computer 12 (2017): 96-100

  30. arXiv:1710.04148  [pdf

    cs.CR

    Approaches to Modeling the Impact of Cyber Attacks on a Mission

    Authors: Alexander Kott, Mona Lange, Jackson Ludwig

    Abstract: The success of a business mission is highly dependent on the Communications and Information Systems (CIS) that support the mission. Mission Impact Assessment (MIA) seeks to assist the integration of business or military operations with cyber defense, particularly in bridging the cognitive gap between operational decision-makers and cyber defenders. Recent years have seen a growing interest in mode… ▽ More

    Submitted 11 October, 2017; originally announced October 2017.

    Comments: This is an earlier version (more verbose and less polished) of the paper titled "Assessing Mission Impact of Cyberattacks: Toward a Model-Driven Paradigm" that appeared in October 2017 issue of IEEE Security & Privacy. arXiv admin note: text overlap with arXiv:1601.00912

  31. arXiv:1708.07424  [pdf

    cs.CR

    Cyber-Physical War Gaming

    Authors: E. J. M. Colbert, D. T. Sullivan, A Kott

    Abstract: This paper presents general strategies for cyber war gaming of Cyber-Physical Systems (CPSs) that are used for cyber security research at the U.S. Army Research Laboratory (ARL). Since Supervisory Control and Data Acquisition (SCADA) and other CPSs are operational systems, it is difficult or impossible to perform security experiments on actual systems. The authors describe how table-top strategy s… ▽ More

    Submitted 24 August, 2017; originally announced August 2017.

    Comments: To appear in Journal of Information Warfare, Volume 16

  32. arXiv:1707.03927  [pdf

    cs.CR

    Burstiness of Intrusion Detection Process: Empirical Evidence and a Modeling Approach

    Authors: Richard Harang, Alexander Kott

    Abstract: We analyze sets of intrusion detection records observed on the networks of several large, nonresidential organizations protected by a form of intrusion detection and prevention service. Our analyses reveal that the process of intrusion detection in these networks exhibits a significant degree of burstiness as well as strong memory, with burstiness and memory properties that are comparable to those… ▽ More

    Submitted 12 July, 2017; originally announced July 2017.

    Comments: This is a version of the paper that is to appear as Harang, R., & Kott, A. (2017). Burstiness of Intrusion Detection Process: Empirical Evidence and a Modeling Approach. IEEE Transactions on Information Forensics and Security

  33. arXiv:1703.03306  [pdf

    cs.CR

    Recommendations for Model-Driven Paradigms for Integrated Approaches to Cyber Defense

    Authors: Mona Lange, Alexander Kott, Noam Ben-Asher, Wim Mees, Nazife Baykal, Cristian-Mihai Vidu, Matteo Merialdo, Marek Malowidzki, Bhopinder Madahar

    Abstract: The North Atlantic Treaty Organization (NATO) Exploratory Team meeting, "Model-Driven Paradigms for Integrated Approaches to Cyber Defense," was organized by the NATO Science and Technology Organization's (STO) Information Systems and Technology (IST) panel and conducted its meetings and electronic exchanges during 2016. This report describes the proceedings and outcomes of the team's efforts. M… ▽ More

    Submitted 9 March, 2017; originally announced March 2017.

  34. arXiv:1702.04652  [pdf

    cs.CR

    Overview of Cyber Science and Technology Programs at the U.S. Army Research Laboratory

    Authors: Alexander Kott

    Abstract: This paper provides an overview of research programs in cyber security performed by the U.S Army Research Laboratory. Although ARL is the U.S. Army's corporate laboratory that focuses on fundamental and early applied research, the fundamental science endeavors are closely integrated with extensive operationally-oriented programs. One example is the Cyber Collaborative Research Alliance (CRA) that… ▽ More

    Submitted 3 January, 2017; originally announced February 2017.

    Comments: A version of this paper appeared in the special issue of the Journal of Cyber Security and Information Systems, vol.5, n.1, December 2016

  35. arXiv:1610.01953  [pdf

    cs.CY cs.CR

    The Future Internet of Things and Security of its Control Systems

    Authors: Misty Blowers, Jose Iribarne, Edward Colbert, Alexander Kott

    Abstract: We consider the future cyber security of industrial control systems. As best as we can see, much of this future unfolds in the context of the Internet of Things (IoT). In fact, we envision that all industrial and infrastructure environments, and cyber-physical systems in general, will take the form reminiscent of what today is referred to as the IoT. IoT is envisioned as multitude of heterogeneous… ▽ More

    Submitted 6 October, 2016; originally announced October 2016.

    Comments: A version of this paper appeared as a chapter of the book "Cyber Security of SCADA and Other Industrial Control Systems," Springer 2016

  36. arXiv:1607.08139  [pdf

    eess.SY

    Inducing and Mitigating a Self-Reinforcing Degradation in Decision-making Teams

    Authors: Paul Hubbard, Alexander Kott, Michael Martin

    Abstract: The models in this paper demonstrate how self-reinforcing error due to positive feedback can lead to overload and saturation of decision-making elements, and ultimately the cascading collapse of an organization due to the propagation of overload and erroneous decisions throughout the organization. We begin the paper with an analysis of the stability of the decision-making aspects of command organi… ▽ More

    Submitted 27 July, 2016; originally announced July 2016.

    Comments: A version of this paper appeared as a chapter in the book "Information Warfare and Organizational Decision-Making"

  37. arXiv:1607.07288  [pdf

    cs.AI

    Validation of Information Fusion

    Authors: Alexander Kott, Wes Milks

    Abstract: We motivate and offer a formal definition of validation as it applies to information fusion systems. Common definitions of validation compare the actual state of the world with that derived by the fusion process. This definition conflates properties of the fusion system with properties of systems that intervene between the world and the fusion system. We propose an alternative definition where val… ▽ More

    Submitted 22 July, 2016; originally announced July 2016.

    Comments: This is a version of the paper presented at FUSION'09

  38. arXiv:1607.06759  [pdf

    cs.AI

    Predicting Enemy's Actions Improves Commander Decision-Making

    Authors: Michael Ownby, Alexander Kott

    Abstract: The Defense Advanced Research Projects Agency (DARPA) Real-time Adversarial Intelligence and Decision-making (RAID) program is investigating the feasibility of "reading the mind of the enemy" - to estimate and anticipate, in real-time, the enemy's likely goals, deceptions, actions, movements and positions. This program focuses specifically on urban battles at echelons of battalion and below. The R… ▽ More

    Submitted 22 July, 2016; originally announced July 2016.

    Comments: A version of this paper was presented at CCRTS'06

  39. arXiv:1607.06515  [pdf

    cs.CY

    The Role of PMESII Modeling in a Continuous Cycle of Anticipation and Action

    Authors: Alexander Kott, Stephen Morse

    Abstract: The inevitable incompleteness of any collection of PMESII models, along with poorly understood methods for combining heterogeneous models, leads to major uncertainty regarding the reliability of computational tools. This uncertainty is further exacerbated by difficulties in validation of such tools. They should only be used as aids to human analysis and decision-making. A practitioner must wonder:… ▽ More

    Submitted 21 July, 2016; originally announced July 2016.

    Comments: A version of this paper appeared as a book chapter in Kott, A., & Citrenbaum, G. (Eds.). Estimating Impact: A Handbook of Computational Methods and Models for Anticipating Economic, Social, Political and Security Effects in International Interventions. Springer, 2010

  40. arXiv:1606.01288  [pdf

    cs.RO

    A Survey of Research on Control of Teams of Small Robots in Military Operations

    Authors: Stuart Young, Alexander Kott

    Abstract: While a number of excellent review articles on military robots have appeared in existing literature, this paper focuses on a distinct sub-space of related problems: small military robots organized into moderately sized squads, operating in a ground combat environment. Specifically, we consider the following: - Command of practical small robots, comparable to current generation, small unmanned grou… ▽ More

    Submitted 3 June, 2016; originally announced June 2016.

    Comments: a version of this paper was presented at the 14th CCRTS Symposium

  41. arXiv:1603.01787  [pdf

    cs.MA cs.CY cs.SI

    Approaches to Modeling Insurgency

    Authors: Alexander Kott, Bruce Skarin

    Abstract: This paper begins with an introduction to qualitative theories and models of insurgency, quantitative measures of insurgency, influence diagrams, system dynamics models of insurgency, agent based molding of insurgency, human-in-the-loop wargaming of insurgency, and statistical models of insurgency. The paper then presents a detailed case study of an agent-based model that focuses on the Troubles i… ▽ More

    Submitted 5 March, 2016; originally announced March 2016.

    Comments: A version of this paper appeared as a book chapter in Kott, A., & Citrenbaum, G. (Eds.). Estimating Impact: A Handbook of Computational Methods and Models for Anticipating Economic, Social, Political and Security Effects in International Interventions. Springer, 2010

  42. arXiv:1601.06731  [pdf

    cs.SI cs.NI physics.soc-ph

    Resiliency and Robustness of Complex, Multi-Genre Networks

    Authors: Alexander Kott, Tarek Abdelzaher

    Abstract: We explore the resiliency and robustness of systems while viewing them as complex, multi-genre networks. The term "complex, multi-genre networks" refers to networks that combine several distinct genres - networks of physical resources, communication networks, information networks, and social and cognitive networks. We show that this perspective is fruitful and adds to our understanding of fundamen… ▽ More

    Submitted 25 January, 2016; originally announced January 2016.

    Comments: A version of this paper appeared as a book chapter in Adaptive, Dynamic, and Resilient Systems published by Springer

  43. arXiv:1601.06108  [pdf

    cs.AI

    Decision Aids for Adversarial Planning in Military Operations: Algorithms, Tools, and Turing-test-like Experimental Validation

    Authors: Alexander Kott, Ray Budd, Larry Ground, Lakshmi Rebbapragada, John Langston

    Abstract: Use of intelligent decision aids can help alleviate the challenges of planning complex operations. We describe integrated algorithms, and a tool capable of translating a high-level concept for a tactical military operation into a fully detailed, actionable plan, producing automatically (or with human guidance) plans with realistic degree of detail and of human-like quality. Tight interleaving of s… ▽ More

    Submitted 22 January, 2016; originally announced January 2016.

    Comments: A version of this paper appeared in the Applied Intelligence journal

  44. arXiv:1601.06069  [pdf

    cs.AI

    Coalition-based Planning of Military Operations: Adversarial Reasoning Algorithms in an Integrated Decision Aid

    Authors: Larry Ground, Alexander Kott, Ray Budd

    Abstract: Use of knowledge-based planning tools can help alleviate the challenges of planning a complex operation by a coalition of diverse parties in an adversarial environment. We explore these challenges and potential contributions of knowledge-based tools using as an example the CADET system, a knowledge-based tool capable of producing automatically (or with human guidance) battle plans with realistic d… ▽ More

    Submitted 22 January, 2016; originally announced January 2016.

    Comments: A version of this paper appeared in proceedings of the 2002 International Conference on Knowledge Systems for Coalition Operations (KSCO)

  45. arXiv:1601.00912  [pdf

    cs.CR

    Assessing Mission Impact of Cyberattacks: Report of the NATO IST-128 Workshop

    Authors: Alexander Kott, Nikolai Stoianov, Nazife Baykal, Alfred Moller, Reginald Sawilla, Pram Jain, Mona Lange, Cristian Vidu

    Abstract: This report presents the results of a workshop conducted by the North Atlantic Treaty Organization (NATO) Information Systems Technology (IST) Panel in Istanbul, Turkey, in June 2015 to explore science and technology for characterizing the impact of cyber-attacks on missions. Military mission success is highly dependent on the communications and information systems (CISs) that support the mission… ▽ More

    Submitted 5 January, 2016; originally announced January 2016.

    Report number: ARL-TR-7566

  46. arXiv:1512.08515  [pdf

    cs.CR cs.CY cs.SE physics.data-an

    Security Metrics in Industrial Control Systems

    Authors: Zachary A. Collier, Mahesh Panwar, Alexander A. Ganin, Alex Kott, Igor Linkov

    Abstract: Risk is the best known and perhaps the best studied example within a much broader class of cyber security metrics. However, risk is not the only possible cyber security metric. Other metrics such as resilience can exist and could be potentially very valuable to defenders of ICS systems. Often, metrics are defined as measurable properties of a system that quantify the degree to which objectives of… ▽ More

    Submitted 25 December, 2015; originally announced December 2015.

    Comments: Chapter in In: Colbert, E. and Kott, A. (eds.), "Cyber Security of Industrial Control Systems, Including SCADA Systems," Springer, NY, 2016

  47. arXiv:1512.07943  [pdf

    cs.AI

    Toward a Research Agenda in Adversarial Reasoning: Computational Approaches to Anticipating the Opponent's Intent and Actions

    Authors: Alexander Kott, Michael Ownby

    Abstract: This paper defines adversarial reasoning as computational approaches to inferring and anticipating an enemy's perceptions, intents and actions. It argues that adversarial reasoning transcends the boundaries of game theory and must also leverage such disciplines as cognitive modeling, control theory, AI planning and others. To illustrate the challenges of applying adversarial reasoning to real-worl… ▽ More

    Submitted 24 December, 2015; originally announced December 2015.

    Comments: A version of this paper was presented at the SPIE Symposium on Enabling Technologies for Simulation Science

  48. arXiv:1512.07941  [pdf

    cs.CY

    An Experimental Evaluation of Computational Techniques for Planning and Assessment of International Interventions

    Authors: Alexander Kott, Jeff Hansberger, Edward Waltz, Peter Corpac

    Abstract: We describe the experimental methodology developed and employed in a series of experiments within the Defense Advanced Research Projects Agency (DARPA) Conflict Modeling, Planning, and Outcomes Exploration (COMPOEX) Program. The primary purpose of the effort was development of tools and methods for analysis, planning and predictive assessment of plans for complex operations where integrated politi… ▽ More

    Submitted 24 December, 2015; originally announced December 2015.

    Comments: A version of this paper appeared in the International Journal of Command and Control

  49. arXiv:1512.07937  [pdf

    cs.CR

    Towards Approaches to Continuous Assessment of Cyber Risk in Security of Computer Networks

    Authors: Alexander Kott, Curtis Arnold

    Abstract: We review the current status and research challenges in the area of cyber security often called continuous monitoring and risk scoring (CMRS). We focus on two most salient aspects of CMRS. First, continuous collection of data through automated feeds; hence the term continuous monitoring. Typical data collected for continuous monitoring purposes include network traffic information as well as host i… ▽ More

    Submitted 24 December, 2015; originally announced December 2015.

    Comments: A version of this paper appeared in IEEE Security and Privacy

  50. arXiv:1512.00407  [pdf

    cs.CR

    Science of Cyber Security as a System of Models and Problems

    Authors: Alexander Kott

    Abstract: Terms like "Science of Cyber" or "Cyber Science" have been appearing in literature with growing frequency, and influential organizations initiated research initiatives toward develo** such a science even though it is not clearly defined. We propose to define the domain of the science of cyber security by noting the most salient artifact within cyber security -- malicious software -- and defining… ▽ More

    Submitted 29 November, 2015; originally announced December 2015.