• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Excelitas Qioptiq banner

BATTLESPACE Updates

   +44 (0)77689 54766
   j.nettlefold@battle-technology.com

  • Home
  • Features
  • News Updates
  • Company Directory
  • About
  • Subscribe
  • Contact
  • Media Pack 2021

NEW TECHNOLOGIES

December 29, 2017 by

Web Page sponsor Oxley Developments

www.oxleygroup.com
————————————————————————
26 Dec 17. How DARPA sparked dreams of self-healing networks. On an August day in 2016, computer security gurus traveled to Las Vegas to prove that artificial intelligence, or AI, could find and fix flaws in software at machine speeds. There, teams battled for nearly 12 hours to see whose automated systems could best identify and patch vulnerabilities in software, with the top three prizes ranging from $750,000 to $2m. Judges had winnowed a field of 100 teams to seven finalists for the Defense Advanced Research Projects Agency-hosted Cyber Grand Challenge (CGC) Final Event. Nearly 18 months later, DARPA officials and winnings contestants agree: AI is fast emerging as a way to give Department of Defense agencies the edge in the ongoing cat-and-mouse battle for cyber supremacy.
“Current computer security is just too complicated,” said David Brumley. As CEO of Pittsburgh startup ForAllSecure, he helped lead the winning team. “There are too many processes involved. Downloading a patch, deciding to install it, making sure it doesn’t crash things. We need to reduce the human timeline, to make these responses happen in minutes rather than in hours or days.”
In launching the cyber event, DARPA challenged researchers to envision cybersecurity that is enhanced and empowered by machine learning. It’s an evolution that some outside the defense community have long been urging.
“Trading in stocks is now dominated by algorithms and human floor traders are largely superfluous. Why is this not a likely future for cyber conflict also and, if so, what are the implications for U.S. Cyber Command staffing and projects and overall U.S. cyber defense?” said Jason Healey, a researcher at Columbia University’s School of International and Public Affairs, in testimony last spring before the House Armed Services Committee.
At DARPA’s cyber event, the winning teams were able to implement AI as both an offensive and defensive tool. They taught the machines to quickly and accurately exploit known defenses in the systems of other teams, and also used machine intelligence to rapidly deploy appropriate patches to their own systems.
The likelihood of AI working in a cyber scenario was “a very open question” prior to the competition, said Dustin Fraze, a program manager in DARPA’s Information Innovation Office. “We didn’t know if it would work, but the results of the CGC show that we are on the path to where automation can in fact identify vulnerabilities and find remediations.”
If that is so, it could have profound operational implications for military cyber operators who today find themselves too often playing catch-up in the face of a rapidly evolving threat landscape.
In short, military leaders envision self-healing networks.
Fraze described how CGC competitors tackled a typical scenario, in which an operator detects a vulnerability in software and uses it to attack an opponent’s systems. The opponent deploys a patch and in the next round the aggressor identifies that patch and devises a counter-exploit.
“Within 20 minutes we saw discovery, a patch, mitigation of that patch and a mitigation of that mitigation,” Fraze said. In the field today, “such an interaction would take days or weeks or months, if it were done manually.”
This is not to suggest that AI is going to dramatically reshape military cyber tomorrow. More than a year after the DARPA challenge proved it could be done, researchers say they still need to make significant progress to be able to use machine learning in operations as a large-scale cyber asset.
Brumley cautions that any military use of AI for cyber will have to take into account the possibility that the enemy will take a counter-AI approach: If our computers can learn, the adversary might try to teach them the wrong things.
“If network security becomes about AI, then people will start to attac

Primary Sidebar

Advertisers

  • qioptiq.com
  • Exensor
  • TCI
  • Visit the Oxley website
  • Visit the Viasat website
  • Blighter
  • Arnold Defense logo
  • SPECTRA
  • InVeris
  • Britbots logo
  • Faun Trackway
  • Systematic
Hilux Vehicles situational awareness conference

Contact Us

BATTLESPACE Publications
Old Charlock
Abthorpe Road
Silverstone
Towcester NN12 8TW

+44 (0)77689 54766

j.nettlefold@battle-technology.com

BATTLESPACE Technologies

An international defence electronics news service providing our readers with up to date developments in the defence electronics industry.

Recent News

  • Babcock Gives Business Update and Announces Large Write Off

    April 13, 2021
    Read more
  • Biden requests $715bn for Pentagon

    April 9, 2021
    Read more
  • South Korea unveils KF-X prototype

    April 9, 2021
    Read more

Copyright BATTLESPACE Publications © 2002–2021.

This website uses cookies to improve your experience. If you continue to use the website, we'll assume you're ok with this.   Read More  Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.

SAVE & ACCEPT