A Developmental Approach to Learning Causal Models for Cyber Security

被引:2
作者
Mugan, Jonathan [1 ]
机构
[1] 21CT Inc, Austin, TX USA
来源
MACHINE INTELLIGENCE AND BIO-INSPIRED COMPUTATION: THEORY AND APPLICATIONS VII | 2013年 / 8751卷
关键词
machine learning; automation; automation assurance; autonomic computing; verification and validation; cyber resilience; causal models;
D O I
10.1117/12.2014418
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To keep pace with our adversaries, we must expand the scope of machine learning and reasoning to address the breadth of possible attacks. One approach is to employ an algorithm to learn a set of causal models that describes the entire cyber network and each host end node. Such a learning algorithm would run continuously on the system and monitor activity in real time. With a set of causal models, the algorithm could anticipate novel attacks, take actions to thwart them, and predict the second-order effects of those actions. Designing such an algorithm is a complex task because computer systems generate a flood of information, and the algorithm would have to determine which streams of that flood were relevant in which situations. This paper will present the results of efforts toward the application of a developmental learning algorithm to the problem of cyber security. The algorithm is modeled on the principles of human developmental learning and is designed to allow an agent to learn about the computer system in which it resides through active exploration. Children are flexible learners who acquire knowledge by actively exploring their environment and making predictions about what they will find,(1,2) and our algorithm is inspired by the work of the developmental psychologist Jean Piaget.(3) Piaget described how children construct knowledge in stages and learn new concepts on top of those they already know. Developmental learning allows our algorithm to focus on subsets of the environment that are most helpful for learning given its current knowledge. In experiments, the algorithm was able to learn the conditions for file exfiltration and use that knowledge to protect sensitive files.
引用
收藏
页数:10
相关论文
共 18 条
[1]  
[Anonymous], 2004, FDN MIND ORIGINS CON
[2]  
Apap R, 2002, LECT NOTES COMPUT SC, V2516, P36
[3]  
Chan P., 2003, A machine learning approach to anomaly detection
[4]  
Drescher G. L., 1991, Made-up Minds: A Constructivist Approach to Artificial Intelligence
[5]  
Gergely G, 1999, EARLY SOCIAL COGNITION, P101
[6]  
Gopnik Alison., 2009, The Philosophical Baby: What Children's Minds Tell Us About Truth, Love, and the Meaning of Life, V1st
[7]  
Koller Ricardo, 2008, 2008 International Conference on Autonomic Computing (ICAC '08), P151, DOI 10.1109/ICAC.2008.24
[8]  
MOREL B, 2011, INTRUSION DETECTION
[9]  
MUGAN J, 2012, Patent No. 61720969
[10]  
MUGAN J, IEEE T AUTONOMOUS ME, V4, P70