How to Build Synthetic Persons in Cyberspace

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=el5MM7RO4kA



Category:
Guide
Duration: 49:37
3 views
0


One of the greatest challenges in developing capable cyberspace operators is building realistic environments for training events. While many organizations have developed technologies and techniques for replicating enterprise-scale networks, the problem is how to realistically populate those networks with synthetic persons. Whether we are training network defenders or penetration testers, we want to pit them against adaptive and intelligent adversaries who can continuously put their skills to the test. In either case, we also need rich ecosystems in which realistic user agents exchange messages, interact with the web and occasionally assist (or hinder) the efforts of the attackers and defenders.

This talk describes our research and development of a family of Cyberspace Cognitive (CyCog) agents that can behave like attackers, defenders or users in a network. The attacker agent (CyCog-A) was developed to train defenders while its defensive counterpart (CyCog-D) was intended to help develop penetration testers. The user agent (CyCog-U), on the other hand, is much more versatile in that it can support either type of training. Furthermore, since these synthetic users are models of actual users on a network, they can display behaviors that can either hinder or assist attackers and/or defenders.

Our experiences and successes point to current gaps as well as future threats and opportunities. From the need for scalable cyberspace mapping techniques to our work in modeling behaviors to the lessons learned in human-machine teaming, the CyCog family of agents is opening a new dimension in cyberspace operations research and development.


Presenters:
Alex Nickels - Associate Technical Director and Senior Software Engineer, Soar Technology
Alex Nickels is an associate technical director and senior software engineer at Soar Technology. He’s led the development of dozens of advanced research projects, most of which focus on the application of novel artificial intelligence techniques to cybersecurity and unmanned platforms. His recent work includes the development of a family of synthetic cognitive agents that emulate the behaviors of real attackers, defenders and general users in cyberspace.
Fernando Maymi - Lead Scientist, Soar Technology
Fernando Maymí, Ph.D., CISSP, is Lead Scientist in the Cyber and Secure Autonomy division of Soar Technology, Inc. (an artificial intelligence research and development company) and a retired U.S. Army officer. He was formerly the Deputy Director of the Army Cyber Institute at West Point, where he also taught cybersecurity courses for over 12 years. Today, he leads multiple advanced research projects developing autonomous cyberspace agents for the U.S. Department of Defense. Fernando has developed and conducted large-scale cybersecurity exercises for major cities in the United States and abroad and served as advisor for senior leaders around the world. His publications include the 7th and 8th editions of the CISSP All-in-One Exam Guide.
Black Hat - Europe - 2018
Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2021-12-21Malware Buried Deep Down the SPI Flash Sednit's First UEFI Rootkit Found in the Wild
2021-12-21Attacking and Defending Blockchains From Horror Stories to Secure Wallets
2021-12-21Straight Outta VMware Modern Exploitation of the SVGA Device for Guest to Host Escapes
2021-12-21Network Defender Archeology An NSM Case Study in Lateral Movement with DCOM
2021-12-21Attacking Hardware Systems Using Resonance and the Laws of Physics
2021-12-21The Last Line of Defense Understanding and Attacking Apple File System on iOS
2021-12-21Eternal War in XNU Kernel Objects Black Hat - Europe - 2018
2021-12-21Evolving Security Experts Among Teenagers Black Hat - Europe - 2018
2021-12-21No Free Charge Theorem 2 0 How to Steal Private Information from a Mobile Device Using a Powerbank
2021-12-21Off Path Attacks Against PKI Black Hat - Europe - 2018
2021-12-21How to Build Synthetic Persons in Cyberspace
2021-12-21Perception Deception Physical Adversarial Attack Challenges
2021-12-21BLEEDINGBIT Your APs Belong to Us Black Hat - Europe - 2018
2021-12-21Perfectly Deniable Steganographic Disk Encryption
2021-12-21DIFUZE Android Kernel Driver Fuzzing Black Hat - Europe - 2017
2021-12-21Becoming You A Glimpse Into Credential Abuse
2021-12-21How to Rob a Bank over the Phone Lessons Learned from an Actual Social Engineering Engagement
2021-12-21Wi Fi Direct To Hell Attacking Wi Fi Direct Protocol Implementations
2021-12-21Breaking Out HSTS and HPKP On Firefox, IE Edge and Possibly Chrome
2021-12-21Enraptured Minds Strategic Gaming of Cognitive Mindhacks
2021-12-21Zero Days, Thousands of Nights The Life & Times of Zero Day Vulns and Their Exploits



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering