Defense Advanced Research Projects AgencyTagged Content List

Supervised Autonomy

Automated capabilities with human supervision; "human in the loop"

Showing 4 results for Autonomy + Cyber RSS
DARPA's Defense Sciences Office (DSO) identifies and pursues high-risk, high-payoff research initiatives across a broad spectrum of science and engineering disciplines and transforms them into important, new game-changing technologies for U.S. national security. Current DSO themes include frontiers in math, computation and design, limits of sensing and sensors, complex social systems, and anticipating surprise. DSO relies on the greater scientific research community to help identify and explore ideas that could potentially revolutionize the state-of-the-art.
Building on recent breakthroughs in autonomous cyber systems and formal methods, DARPA today announced a new research program called Assured Autonomy that aims to advance the ways computing systems can learn and evolve to better manage variations in the environment and enhance the predictability of autonomous systems like driverless vehicles and unmanned aerial vehicles (UAVs).
Over the past 40 years, our world has become increasingly connected. These connections have enabled major advances in national security from pervasive real-time intelligence and communications to optimal logistics. With this connectivity has come the threat of cyber attacks on both military systems and critical infrastructure. While we focus the vast majority of our security efforts on protecting computers and networks, more than 80% of cyber attacks and over 70% of those from nation states are initiated by exploiting humans rather than computer or network security flaws. To build secure cyber systems, it is necessary to protect not only the computers and networks that make up these systems but their human users as well.
Malicious actors are currently able to compromise and use with impunity large numbers of devices owned and operated by third parties. Such collections of compromised and conscripted devices, commonly referred to as botnets, are used for criminal, espionage, and computer network attack purposes (often a combination of all three). Recent examples of botnets and similar malicious code include Mirai, Hidden Cobra, WannaCry, and Petya/NotPetya