RSS feed LinkedIn Watch us on Youtube

Activity title

Deep Machine Learning For Cyber Defense

Activity Reference

IST-183 (IWA)

Panel

Information Systems Technology

Security Classification

NATO UNCLASSIFIED

Status

Proposed

Activity type

RWS

Start date

2020

End date

2021

Keywords

Artificial Intelligence, Autonomous and Selfadaptive Agents, Cybersecurity, Deep Learning, Feedbackbased Learning, Intrusion Detection, Knowledgebased Learning, Machine Learning, Mission Assurance, Ruledbased Learning

Background

Cyber threats are more advanced and strategic and can manifest from anywhere in the World. Terrorism in cyberspace is at an all-time high and NATO countries have to enhance their strategic landscape by using 21st century technology to mitigate cyber threats to military systems, platforms and mission. Deep machine learning (ML) is a state of the art technology that the military can implement to enhance its strategic cyber position and create a defense that not only addresses threats of today, but threats 10 and 20 years into the future.

Objectives

The main goal of the RWS is to consolidate the NATO-wide knowledge in the field of deep ML and cyber defense, and identify the gaps between civilian solutions and military needs. The RWS will contribute in particular to the improved understanding of how to apply Deep Learning (machine learning) to cyber defense including vehicular security.

Topics

• Improving, tailoring or optimizing existing Deep ML techniques for cyber defense applications: o Architectural design to enable Machine Learning in simulations; o Critical factors and potential barriers for application of Machine Leaning. • Data collections for AI and ML: o Deep ML Joint experimentation with varying levels of deep machine learning on militarily relevant missions; o Collection of data from many varied platforms for use in developing improved AI and ML algorithms; o Experimentation in varied environments. • Resilient and adaptive behaviors • Anomaly-based intrusion detection methods • Trustworthiness of sensor data • Advanced data analytics and real time processing • Autonomous and self- adaptive agents for security • Security aspects of artificial and computational intelligence for autonomy

Contact Panel Office