ABSTRACT This report summarizes our preliminary eorts at applying the methodology and techniques ... more ABSTRACT This report summarizes our preliminary eorts at applying the methodology and techniques of agent-based systems engineering (ABSE) to the problem of designing and operating Intelligent Roads and Vehicles Systems (IRVS). First, we briey summarize the key elements of both agent-based systems engineering and IRVS. We then show how the taxonomy of ABSE applies to the IRVS concept and how some performance metrics can be introduced. The report concludes with plans for continued work in this direction.
Nonparametric versions of hidden Markov models, what we call weak models, are robust for process ... more Nonparametric versions of hidden Markov models, what we call weak models, are robust for process detection and easy to construct, as the assumption of knowing precise probabilities in HMMs is weakened to {0,1}-values of reachabilities. Weak models are shown to be equivalent to DFAs/ NFAs. The concept of minimal unifilar weak model (μ-WM) is introduced. The spectral radius of the transition matrix of μ-WM determines the growth rate of acceptable observation sequences. An absolute weak model distance is defined for model clustering purpose, while a relative distance is a measure of how fast the performance of detection gets improved as more observations arrive. Convergence of the distance measures is proved.
... of hosts is presented in [8], which reviews benefits and challenges in using passive and ... ... more ... of hosts is presented in [8], which reviews benefits and challenges in using passive and ... We have described several ideas, approaches and implementa-tions of network sensing for mobile agents. ... focus of his MS the-sis is on developing extensions for the Mobile IP protocol to ...
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 2019
Organizations increasingly rely on complex networked systems to maintain operational efficiency. ... more Organizations increasingly rely on complex networked systems to maintain operational efficiency. While the widespread adoption of network-based IT solutions brings significant benefits to both commercial and government organizations, it also exposes them to an array of novel threats. Specifically, malicious actors can use networks of compromised and remotely controlled hosts, known as botnets, to execute a number of different cyber-attacks and engage in criminal or otherwise unauthorized activities. Most notably, botnets can be used to exfiltrate highly sensitive data from target networks, including military intelligence from government agencies and proprietary data from enterprise networks. What makes the problem even more complex is the recent trend towards stealthier and more resilient botnet architectures, which depart from traditional centralized architectures and enable botnets to evade detection and persist in a system for extended periods of time. A promising approach to botnet detection and mitigation relies on Adaptive Cyber Defense (ACD), a novel and game-changing approach to cyber defense. We show that detecting and mitigating stealthy botnets is a multi-faceted problem that requires addressing multiple related research challenges, and show how an ACD approach can help us address these challenges effectively.
Gilbert Strang’s most recent textbook is remarkable on several fronts. Published in 2019, it cont... more Gilbert Strang’s most recent textbook is remarkable on several fronts. Published in 2019, it contains the key linear algebra and optimization techniques at the forefront of active data-science and machine learning practice today. This is an appropriate choice of content because while state-of-the-art machine learning applications can change each month (as in reinforcement learning, language translation, game playing, or image classification), the underlying mathematical concepts and algorithms do not. Some topics (such as numerical algorithms for various tensor problems) are so recent that they are only now being presented as textbook material. This book is an offspring of a current Massachusetts Institute of Technology (MIT) mathematics course, Matrix Methods in Data Analysis and Signal Processing, which, in turn, was greatly influenced by a current University of Michigan electrical engineering and computer science course, Matrix Methods for Signal Processing, Data Analysis, and Ma...
This talk will review several fundamental and general ideas surrounding decentralized algorithms ... more This talk will review several fundamental and general ideas surrounding decentralized algorithms and how they occur in a variety of computing and engineering fields. Of specific interest are convergence rates and limitations on asynchronicity which will be reviewed. Several applications of and implications for social systems simulation and modeling will be presented and conjectured. This talk will begin with tutorial material and lead to some recent research results and problems.
network conditions. With the growing demand for wireless, satellite, and other highly volatile co... more network conditions. With the growing demand for wireless, satellite, and other highly volatile computer communications networks, however, applica- tions that are robust in the presence of network volatility must be designed and built. Net- work-robust applications are of great interest in military situations today, and we expect that interest to grow in industrial and eventually consumer environments as well. Mobile agents are one way to realize such applications, especially when used in a wireless envi- ronment. This article discusses issues and results related to the problem of making com- puter applications network-aware and reactive to changing network conditions. It contains a short overview of our work on mobile agents as well as a tutorial on network sensing from the agent perspective. Some prototypes of network-sensing systems and network- .. aware mobile-agent applications are- presented.
ABSTRACT This report summarizes our preliminary eorts at applying the methodology and techniques ... more ABSTRACT This report summarizes our preliminary eorts at applying the methodology and techniques of agent-based systems engineering (ABSE) to the problem of designing and operating Intelligent Roads and Vehicles Systems (IRVS). First, we briey summarize the key elements of both agent-based systems engineering and IRVS. We then show how the taxonomy of ABSE applies to the IRVS concept and how some performance metrics can be introduced. The report concludes with plans for continued work in this direction.
Nonparametric versions of hidden Markov models, what we call weak models, are robust for process ... more Nonparametric versions of hidden Markov models, what we call weak models, are robust for process detection and easy to construct, as the assumption of knowing precise probabilities in HMMs is weakened to {0,1}-values of reachabilities. Weak models are shown to be equivalent to DFAs/ NFAs. The concept of minimal unifilar weak model (μ-WM) is introduced. The spectral radius of the transition matrix of μ-WM determines the growth rate of acceptable observation sequences. An absolute weak model distance is defined for model clustering purpose, while a relative distance is a measure of how fast the performance of detection gets improved as more observations arrive. Convergence of the distance measures is proved.
... of hosts is presented in [8], which reviews benefits and challenges in using passive and ... ... more ... of hosts is presented in [8], which reviews benefits and challenges in using passive and ... We have described several ideas, approaches and implementa-tions of network sensing for mobile agents. ... focus of his MS the-sis is on developing extensions for the Mobile IP protocol to ...
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 2019
Organizations increasingly rely on complex networked systems to maintain operational efficiency. ... more Organizations increasingly rely on complex networked systems to maintain operational efficiency. While the widespread adoption of network-based IT solutions brings significant benefits to both commercial and government organizations, it also exposes them to an array of novel threats. Specifically, malicious actors can use networks of compromised and remotely controlled hosts, known as botnets, to execute a number of different cyber-attacks and engage in criminal or otherwise unauthorized activities. Most notably, botnets can be used to exfiltrate highly sensitive data from target networks, including military intelligence from government agencies and proprietary data from enterprise networks. What makes the problem even more complex is the recent trend towards stealthier and more resilient botnet architectures, which depart from traditional centralized architectures and enable botnets to evade detection and persist in a system for extended periods of time. A promising approach to botnet detection and mitigation relies on Adaptive Cyber Defense (ACD), a novel and game-changing approach to cyber defense. We show that detecting and mitigating stealthy botnets is a multi-faceted problem that requires addressing multiple related research challenges, and show how an ACD approach can help us address these challenges effectively.
Gilbert Strang’s most recent textbook is remarkable on several fronts. Published in 2019, it cont... more Gilbert Strang’s most recent textbook is remarkable on several fronts. Published in 2019, it contains the key linear algebra and optimization techniques at the forefront of active data-science and machine learning practice today. This is an appropriate choice of content because while state-of-the-art machine learning applications can change each month (as in reinforcement learning, language translation, game playing, or image classification), the underlying mathematical concepts and algorithms do not. Some topics (such as numerical algorithms for various tensor problems) are so recent that they are only now being presented as textbook material. This book is an offspring of a current Massachusetts Institute of Technology (MIT) mathematics course, Matrix Methods in Data Analysis and Signal Processing, which, in turn, was greatly influenced by a current University of Michigan electrical engineering and computer science course, Matrix Methods for Signal Processing, Data Analysis, and Ma...
This talk will review several fundamental and general ideas surrounding decentralized algorithms ... more This talk will review several fundamental and general ideas surrounding decentralized algorithms and how they occur in a variety of computing and engineering fields. Of specific interest are convergence rates and limitations on asynchronicity which will be reviewed. Several applications of and implications for social systems simulation and modeling will be presented and conjectured. This talk will begin with tutorial material and lead to some recent research results and problems.
network conditions. With the growing demand for wireless, satellite, and other highly volatile co... more network conditions. With the growing demand for wireless, satellite, and other highly volatile computer communications networks, however, applica- tions that are robust in the presence of network volatility must be designed and built. Net- work-robust applications are of great interest in military situations today, and we expect that interest to grow in industrial and eventually consumer environments as well. Mobile agents are one way to realize such applications, especially when used in a wireless envi- ronment. This article discusses issues and results related to the problem of making com- puter applications network-aware and reactive to changing network conditions. It contains a short overview of our work on mobile agents as well as a tutorial on network sensing from the agent perspective. Some prototypes of network-sensing systems and network- .. aware mobile-agent applications are- presented.
Uploads
Papers by George Cybenko