Scroll Top

US Army puts out requests for autonomous cyber defense systems

WHY THIS MATTERS IN BRIEF

As the variety and volume of cyber attacks grows there is no way humans will be able to keep pace, so cyber needs to go semi and or fully autonomous.

 

Love the Exponential Future? Join our XPotential Community, future proof yourself with courses from XPotential University, read about exponential tech and trendsconnect, watch a keynote, or browse my blog.

US Army researchers are surveying the defense industry to find companies able to develop autonomous cyber defenses for tactical networks and communications that capitalize on Artificial Intelligence (AI) and machine learning.

 

RELATED
This latest airport concept gets you through security in 30 seconds

 

Officials of the Army Contracting Command at Aberdeen Proving Ground, Md., issued a request for information (W56KGU-19-R-AUTOCYBER) on Monday for the Autonomous Cyber project.

Researchers are looking for cyber technology to secure automated network decisions and defend against adaptive autonomous cyber attackers at machine speed.

The Army Contracting Command is conducting this industry survey on behalf of the Army Communications-Electronics Research, Development and Engineering Center Space and Terrestrial Communications Directorate (S&TCD).

 

RELATED
Microsoft experiments with underwater datacenters

 

Overall, S&TCD envisions a combination of AI products that deliver autonomous cyber defense capabilities. Specifically, researchers are looking for cyber and trusted computing enabling technologies for: Autonomous detection and mitigation of known cyber vulnerabilities; ways to autonomously identify and correct misconfigurations in networks and hosts; ways to autonomously detect known and previously unknown malware samples; tools and methodologies for red team autonomous decision making engines; ways to improve robustness of autonomous decision engines to manipulate attackers; machine learning-based cyber AI agents tailored to specific tactical networks, data flows, and message sets that can detect and deduce the intent of an attack; an interface that capitalizes on human in the loop feedback to autonomous decision engines to improve the performance and efficiency of human-machine teams; and new ways to correlate cyber response recommendations and generate a course of action based on available cyber tools and cyber events.

Source: FBODaily

Related Posts

Leave a comment

EXPLORE MORE!

1000's of articles about the exponential future, 1000's of pages of insights, 1000's of videos, and 100's of exponential technologies: Get The Email from 311, your no-nonsense briefing on all the biggest stories in exponential technology and science.

You have Successfully Subscribed!

Pin It on Pinterest

Share This