Perception of the Environment
Abstract
This chapter discusses the intricacies of cybersecurity agents' perception. It addresses the complexity of perception and illuminates how perception shapes and influences the decision-making process. It then explores the necessary considerations when crafting the world representation and discusses the power and bandwidth constraints of perception and the underlying issues of AICA's trust in perception. On these foundations, it provides the reader with a guide to developing perception models for AICA, discussing the trade-offs of each objective state approximation. The guide is written in the context of the CYST cybersecurity simulation engine, which aims to closely model cybersecurity interactions and can be used as a basis for developing AICA. Because CYST is freely available, the reader is welcome to try implementing and evaluating the proposed methods for themselves.
- Publication:
-
arXiv e-prints
- Pub Date:
- October 2022
- DOI:
- arXiv:
- arXiv:2210.13070
- Bibcode:
- 2022arXiv221013070D
- Keywords:
-
- Computer Science - Cryptography and Security
- E-Print:
- 3. chapter of the book "Autonomous Intelligent Agents for Cyber Defense" by Alexander Kott, to be published as a part of the book series "Advances in Information Security" by Springer