Professional Documents
Culture Documents
SeminarCyber Automation and Autonomy
SeminarCyber Automation and Autonomy
Automation
By : Wasan Saad Ahmed
Supervisor Dr. Prof. Ziad Tariq
Introduction
As the near-constant stream of high-profile attacks suggests, the
cyber-threat landscape is rapidly evolving with no sign of slowing.
Cyber-attackers are not only moving faster, they are adding new
and innovative tools within their toolkits.
And as the entire world turns online, we are moving towards a
future where cyber-threats increasingly threaten the safety of not
just our data, but of our physical infrastructure too.
Autonomy, scale and complexity in our defense systems will trigger
new cyber-attack strategies, and autonomous intelligent malware
(AIM) will be part of the picture.
The battlefield of the future, “intelligent Things will fight
intelligent Things”
New cyber-defense doctrines and technologies are therefore
required.
Autonomous Cyber AI is revolutionizing cyber defense and may
prove to be our best line of defense against future AI attacks
Autonomous(Autonomy )and automated (Automation)
Self-learning
Deals with uncertainty
Autonomous detection and response
Responds without business disruption
Reinforcement learning (RL) for autonomous
cyber defense
Beyond the agent and environment, an RL system features four main
elements:
policy, reward function, value function, and optionally.
In fact, actions taken in one state of the system may affect not only
immediate rewards, but also all subsequent rewards. Thus, trial and-
error action search and delayed reward are two of the most important
distinguishing features of RL.