Trust in ICT 2017

Total Page:16

File Type:pdf, Size:1020Kb

Trust in ICT 2017 ITU-T Trust in ICT 2017 Foreword Trust is highly dynamic. Decision-making behaviour is affected by past experience and associated predictions for the future. The degree of trust in ICT is the accumulated value of the degree of trust present in the vast web of relationships that forms the modern ICT ecosystem. We are connecting everything, our vehicles, homes, offices, factories and the rest of the machinery that makes up our modern lives. A ‘sword-and-shield’ approach to cyber threats will be incapable of ensuring security and privacy in this hyperconnected environment. It is clear that, beyond conventional protections to security and privacy, the time has come to integrate trust into the ICT ecosystem. ITU standardization is prioritizing its support for 5G systems, the Internet of Things (IoT) and trust. These three fields are highly interdependent. It is my firm belief that achieving the great potential of 5G and IoT will depend to a large degree on our success in building trust into the ICT ecosystem. ITU is pioneering international efforts to establish the technical foundations of a trusted ICT environment. Part of the challenge is defining and raising awareness of the concept of trust in ICT. We are both shaping the conversation around the meaning of trust in ICT and developing technical mechanisms to move from theory to implementation. Chaesub Lee This publication offers a compendium of the first Director of the ITU Telecommunication outputs of ITU’s study of trust in ICTs. The Standardization Bureau publication aims to build greater understanding of the concepts, driving forces and key features of trust in the ICT context. It details technical approaches with potential to improve trust in ICT and proposes future directions in related ITU standardization work. iii First new ITU standards on trust Based on the significant efforts made to build converged Information and Communications Technology (ICT) services and a reliable information infrastructure while taking into account social and economic considerations, ITU members have focused on trust standardization. For this, ITU newly defined that ‘trust’ is the measureable belief and/or confidence which represents accumulated value from history and the expecting value for future. ITU also recognized that, in ICT environments, trust affects the preference of an entity to consume a particular service offered by another entity and it affects the decision making of an entity to transact with another entity. Furthermore, trust is a broader concept that can cover security and privacy as trust revolves confidence that people, data and devices will function or behave in expected ways as well as it can be used to build new value-chain for future ICT infrastructure and services. Figure 1 shows trust keywords and various trustworthiness attributes that are categorized into three major factors: ability, integrity and benevolence. Many attributes can represent trustworthiness, which can be applied to ICT infrastructures and services. Figure 1 – Trust keywords and trustworthiness attributes In this regard, ITU members have firstly approved new standards on trust for ICT infrastructures and services, as follows. – Recommendation ITU-T Y.3051 “The basic principles of trusted environment in ICT infrastructure” is devoted to the issue of creating trusted environment in ICT infrastructure providing information and communication services. It provides the definition, common requirements and the basic principles of creating trusted environment. – Recommendation ITU-T Y.3052 “Overview of trust provisioning for information and communication technology infrastructures and services” provides an overview of trust provisioning in ICT infrastructures and services. From the general concept of trust, the key characteristics of trust are described. In addition, the trust relationship model and trust evaluation based on the conceptual model of trust provisioning are introduced. The work on trust was based on the preliminary studies convened by the individual experts and the correspondence group on trust. You will find corresponding technical reports in this flipbook. v With the progress of trust standardization work and successful completion of the above two standards, ITU-T members are continuously contributing to develop companion standards on trust. There are several on-going work on Y.trustworthy-media (Trustworthy smart media services), Y.trustnet-fw (Trustworthy networking), etc. From the perspectives of standardization, trust should be quantitatively and/or qualitatively calculated and measured, which is used to evaluate the values of physical components, value-chains among multiple stakeholders, and human behaviors including decision making. Accordingly, a new work on trust index to evaluate and quantify trustworthiness has been started. With the help of trust standardization, future ICT infrastructures will require more reliable techniques to cope with the risks of knowledge sharing towards a knowledge society. Building and validating trusted relationships will be contingent on trust-related information and its processing for supporting trustworthy services and applications. Ideas from members are welcome to stimulate trust standardization activities in the future, taking into account key technical, policy and governance issues through global collaboration with related standardization bodies. Dr Gyu Myoung Lee, Co-chairman of the ITU-T Study Group 13 Working Party 3/13 “Network Evolution and Trust” vi Table of contents Page Foreword iii 1. ITU-T Technical Report “Standardization of Trust Provisioning Study” (2015) 1 2. ITU-T Technical Paper “Future social media and knowledge society” (2015) 95 3. ITU-T Technical Report “Trust Provisioning for future ICT infrastructures and services” (2016) 165 4. Recommendation Y.3051 (2017), The basic principles of trusted environment in ICT infrastructure 225 5. Recommendation Y.3052 (2017), Overview of trust provisioning for information and communication technology infrastructures and services 237 6. Presentation slides: ITU Workshop on "Future Trust and Knowledge Infrastructure", Phase 1 (Geneva, Switzerland, 24 April 2015) 273 7. Presentation slides: ITU Workshop on "Future Trust and Knowledge Infrastructure", Phase 2 (Geneva, Switzerland, 1 July 2016) 277 vii 1. Standardization of Trust Provisioning Study Trust in ICT 1 ITU-T Technical Report “Standardization of Trust Provisioning Study” (2015) Foreword This Technical Paper was developed by Mr. Gyu Myoung Lee. Summary Moving towards an interconnected knowledge society from an information society requires a trusted Information and Communication Technology (ICT) infrastructure for sharing information and creating knowledge. To advance the efforts to build converged ICT services and reliable information infrastructures, ITU-T has recently started a work item on future trusted ICT infrastructures. This technical report introduces basic concepts of trust and present various use cases for trust provisioning. And then it provides a strategy for trust provisioning in the ICT infrastructure, services and applications based on trust taxonomy in different domains, and architectural framework for trusted social cyber physical infrastructures and for trust decision making for trustworthy ICT eco-system along with technical details for trust provisioning. Finally this report identifies roadmap and working priority for future standardization in ITU-T based on related standardization activities. 3 1 Trust in ICT Table of contents 1 Scope 2 Abbreviations and acronyms 3 Introduction 4 Understanding of Trust 4.1 Definition of Trust 4.2 General Aspects of Trust 4.3 Key features of Trust 4.4 Trust in ICT Environment 5 Use cases and explanation of trust provisioning 5.1 Trust Use Cases in Networking Aspects 5.2 Use Case of Services and Applications in IoT 5.3 Summary of User Cases 6 A strategy for trust provisioning of ICT infrastructure, services and applications 6.1 Understanding of Trust Taxonomy 6.2 Trust Provisioning Processes 6.3 Trust Provisioning in Networking Domain 6.4 Trust Provisioning in Architecture Domain 6.5 Trust Provisioning in System Domain 6.6 Trust Provisioning for Services and Applications 7 Architecture framework for trusted social cyber physical infrastructure 7.1 Social-Cyber-Physical Infrastructure 7.2 Social-Cyber-Physical Trust Relationships 7.3 Trust Components and Platform Architecture 7.4 Develop a framework for decision making in the trust analysis system of trustworthy ICT Eco-system 7.5 Specify key functionalities and standard interfaces for autonomic decision making 8 Trust modeling and policy/rule-based decision making 8.1 Information context of a trust model 8.2 Trust modeling based on key features of trust 8.3 Development of a static policy/rule-based trust-level decision making mechanism 8.4 A reputation and knowledge based trust model and decision making mechanism 8.5 Autonomic trust management 8.6 Using Blockchain as Tool 9 Roadmap and working priority for standardization 9.1 Related standardization activities in ITU-T 9.2 Related standardization activities in other SDOs 9.3 Important work items for trust provisioning in ICT infrastructure 9.4 Next step for future standardization 10 Conclusions and future work 11 References 4 Trust in ICT 1 1 Scope Moving towards an interconnected knowledge society from an information society requires a trusted Information and Communication Technology (ICT) infrastructure for sharing information and creating knowledge. To advance the efforts to build
Recommended publications
  • Why Machines Don't
    KI - Künstliche Intelligenz https://doi.org/10.1007/s13218-019-00599-w SURVEY Why Machines Don’t (yet) Reason Like People Sangeet Khemlani1 · P. N. Johnson‑Laird2,3 Received: 15 February 2019 / Accepted: 19 June 2019 © This is a U.S. government work and not under copyright protection in the U.S.; foreign copyright protection may apply 2019 Abstract AI has never come to grips with how human beings reason in daily life. Many automated theorem-proving technologies exist, but they cannot serve as a foundation for automated reasoning systems. In this paper, we trace their limitations back to two historical developments in AI: the motivation to establish automated theorem-provers for systems of mathematical logic, and the formulation of nonmonotonic systems of reasoning. We then describe why human reasoning cannot be simulated by current machine reasoning or deep learning methodologies. People can generate inferences on their own instead of just evaluating them. They use strategies and fallible shortcuts when they reason. The discovery of an inconsistency does not result in an explosion of inferences—instead, it often prompts reasoners to abandon a premise. And the connectives they use in natural language have diferent meanings than those in classical logic. Only recently have cognitive scientists begun to implement automated reasoning systems that refect these human patterns of reasoning. A key constraint of these recent implementations is that they compute, not proofs or truth values, but possibilities. Keywords Reasoning · Mental models · Cognitive models 1 Introduction problems for mathematicians). Their other uses include the verifcation of computer programs and the design of com- The great commercial success of deep learning has pushed puter chips.
    [Show full text]
  • Wikipedia Knowledge Graph with Deepdive
    The Workshops of the Tenth International AAAI Conference on Web and Social Media Wiki: Technical Report WS-16-17 Wikipedia Knowledge Graph with DeepDive Thomas Palomares Youssef Ahres [email protected] [email protected] Juhana Kangaspunta Christopher Re´ [email protected] [email protected] Abstract This paper is organized as follows: first, we review the related work and give a general overview of DeepDive. Sec- Despite the tremendous amount of information on Wikipedia, ond, starting from the data preprocessing, we detail the gen- only a very small amount is structured. Most of the informa- eral methodology used. Then, we detail two applications tion is embedded in unstructured text and extracting it is a non trivial challenge. In this paper, we propose a full pipeline that follow this pipeline along with their specific challenges built on top of DeepDive to successfully extract meaningful and solutions. Finally, we report the results of these applica- relations from the Wikipedia text corpus. We evaluated the tions and discuss the next steps to continue populating Wiki- system by extracting company-founders and family relations data and improve the current system to extract more relations from the text. As a result, we extracted more than 140,000 with a high precision. distinct relations with an average precision above 90%. Background & Related Work Introduction Until recently, populating the large knowledge bases relied on direct contributions from human volunteers as well With the perpetual growth of web usage, the amount as integration of existing repositories such as Wikipedia of unstructured data grows exponentially. Extract- info boxes. These methods are limited by the available ing facts and assertions to store them in a struc- structured data and by human power.
    [Show full text]
  • An Overview of Automated Reasoning
    An overview of automated reasoning John Harrison Intel Corporation 3rd February 2014 (10:30{11:30) Talk overview I What is automated reasoning? I Early history and taxonomy I Automation, its scope and limits I Interactive theorem proving I Hobbes (1651): \Reason . is nothing but reckoning (that is, adding and subtracting) of the consequences of general names agreed upon, for the marking and signifying of our thoughts." I Leibniz (1685) \When there are disputes among persons, we can simply say: Let us calculate [calculemus], without further ado, to see who is right." Nowadays, by `automatic and algorithmic' we mean `using a computer program'. What is automated reasoning? Attempting to perform logical reasoning in an automatic and algorithmic way. An old dream! I Leibniz (1685) \When there are disputes among persons, we can simply say: Let us calculate [calculemus], without further ado, to see who is right." Nowadays, by `automatic and algorithmic' we mean `using a computer program'. What is automated reasoning? Attempting to perform logical reasoning in an automatic and algorithmic way. An old dream! I Hobbes (1651): \Reason . is nothing but reckoning (that is, adding and subtracting) of the consequences of general names agreed upon, for the marking and signifying of our thoughts." Nowadays, by `automatic and algorithmic' we mean `using a computer program'. What is automated reasoning? Attempting to perform logical reasoning in an automatic and algorithmic way. An old dream! I Hobbes (1651): \Reason . is nothing but reckoning (that is, adding and subtracting) of the consequences of general names agreed upon, for the marking and signifying of our thoughts." I Leibniz (1685) \When there are disputes among persons, we can simply say: Let us calculate [calculemus], without further ado, to see who is right." What is automated reasoning? Attempting to perform logical reasoning in an automatic and algorithmic way.
    [Show full text]
  • Expert Systems: an Introduction -46
    GENERAL I ARTICLE Expert Systems: An Introduction K S R Anjaneyulu Expert systems encode human expertise in limited domains by representing it using if-then rules. This article explains the development and applications of expert systems. Introduction Imagine a piece of software that runs on your PC which provides the same sort of interaction and advice as a career counsellor helping you decide what education field to go into K S R Anjaneyulu is a and perhaps what course to pursue .. Or a piece of software Research Scientist in the Knowledge Based which asks you questions about your defective TV and provides Computer Systems Group a diagnosis about what is wrong with it. Such software, called at NeST. He is one of the expert systems, actually exist. Expert systems are a part of the authors of a book on rule larger area of Artificial Intelligence. based expert systems. One of the goals of Artificial Intelligence is to develop systems which exhibit 'intelligent' human-like behaviour. Initial attempts in the field (in the 1960s) like the General Problem Solver created by Allen Newell and Herbert Simon from Carnegie Mellon University were to create general purpose intelligent systems which could handle tasks in a variety of domains. However, researchers soon realized that developing such general purpose systems was too difficult and it was better to focus on systems for limited domains. Edward Feigenbaum from Stanford University then proposed the notion of expert systems. Expert systems are systems which encode human expertise in limited domains. One way of representing this human knowledge is using If-then rules.
    [Show full text]
  • Racer - an Inference Engine for the Semantic Web
    Racer - An Inference Engine for the Semantic Web Volker Haarslev Concordia University Department of Computer Science and Software Enineering http://www.cse.concordia.ca/~haarslev/ Collaboration with: Ralf Möller, Hamburg University of Science and Technology Basic Web Technology (1) Uniform Resource Identifier (URI) foundation of the Web identify items on the Web uniform resource locator (URL): special form of URI Extensible Markup Language (XML) send documents across the Web allows anyone to design own document formats (syntax) can include markup to enhance meaning of document’s content machine readable Volker Haarslev Department of Computer Science and Software Engineering Concordia University, Montreal 1 Basic Web Technology (2) Resource Description Framework (RDF) make machine-processable statements triple of URIs: subject, predicate, object intended for information from databases Ontology Web Language (OWL) based on RDF description logics (as part of automated reasoning) syntax is XML knowledge representation in the web What is Knowledge Representation? How would one argue that a person is an uncle? Jil We might describe family has_parent has_child relationships by a relation has_parent and its inverse has_child Joe Sue Now can can define an uncle a person (Joe) is an uncle if has_child and only if he is male he has a parent (Jil) and this ? parent has a second child this child (Sue) is itself a parent Sue is called a sibling of Joe and vice versa Volker Haarslev Department of Computer Science and Software Engineering Concordia University,
    [Show full text]
  • Automated Reasoning for Explainable Artificial Intelligence∗
    EPiC Series in Computing Volume 51, 2017, Pages 24–28 ARCADE 2017. 1st International Workshop on Automated Reasoning: Challenges, Appli- cations, Directions, Exemplary Achievements Automated Reasoning for Explainable Artificial Intelligence∗ Maria Paola Bonacina1 Dipartimento di Informatica Universit`adegli Studi di Verona Strada Le Grazie 15 I-37134 Verona, Italy, EU [email protected] Abstract Reasoning and learning have been considered fundamental features of intelligence ever since the dawn of the field of artificial intelligence, leading to the development of the research areas of automated reasoning and machine learning. This paper discusses the relationship between automated reasoning and machine learning, and more generally be- tween automated reasoning and artificial intelligence. We suggest that the emergence of the new paradigm of XAI, that stands for eXplainable Artificial Intelligence, is an oppor- tunity for rethinking these relationships, and that XAI may offer a grand challenge for future research on automated reasoning. 1 Artificial Intelligence, Automated Reasoning, and Ma- chine Learning Ever since the beginning of artificial intelligence, scientists concurred that the capability to learn and the capability to reason about problems and solve them are fundamental pillars of intelligent behavior. Similar to many subfields of artificial intelligence, automated reasoning and machine learning have grown into highly specialized research areas. Both have experienced the dichotomy between the ideal of imitating human intelligence, whereby the threshold of success would be the indistinguishability of human and machine, as in the Turing’s test [12], and the ideal that machines can and should learn and reason in their own way. According to the latter ideal, the measure of success is independent of similarity to human behavior.
    [Show full text]
  • First-Orderized Researchcyc: Expressivity and Efficiency in A
    First-Orderized ResearchCyc : Expressivity and Efficiency in a Common-Sense Ontology Deepak Ramachandran1 Pace Reagan2 and Keith Goolsbey2 1Computer Science Department, University of Illinois at Urbana-Champaign, Urbana, IL 61801 [email protected] 2Cycorp Inc., 3721 Executive Center Drive, Suite 100, Austin, TX 78731 {pace,goolsbey}@cyc.com Abstract The second sentence is non-firstorderizable if we consider Cyc is the largest existing common-sense knowledge base. Its “anyone else” to mean anyone who was not in the group of ontology makes heavy use of higher-order logic constructs Fianchetto’s men who went into the warehouse. such as a context system, first class predicates, etc. Many Another reason for the use of these higher-order con- of these higher-order constructs are believed to be key to structs is the ability to represent knowledge succinctly and Cyc’s ability to represent common-sense knowledge and rea- in a form that can be taken advantage of by specialized rea- son with it efficiently. In this paper, we present a translation soning methods. The validation of this claim is one of the of a large part (around 90%) of the Cyc ontology into First- Order Logic. We discuss our methodology, and the trade- contributions of this paper. offs between expressivity and efficiency in representation and In this paper, we present a tool for translating a significant reasoning. We also present the results of experiments using percentage (around 90%) of the ResearchCyc KB into First- VAMPIRE, SPASS, and the E Theorem Prover on the first- Order Logic (a process we call FOLification).
    [Show full text]
  • Semantic Web & Relative Analysis of Inference Engines
    International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 2 Issue 10, October - 2013 Semantic Web & Relative Analysis of Inference Engines Ravi L Verma 1, Prof. Arjun Rajput 2 1Information Technology, Technocrats Institute of Technology 2Computer Engineering, Technocrats Institute of Technology, Excellence Bhopal, MP Abstract - Semantic web is an enhancement to the reasoners to make logical conclusion based on the current web that will provide an easier path to find, framework. Use of inference engine in semantic web combine, share & reuse the information. It brings an allows the applications to investigate why a particular idea of having data to be defined & linked in a way that solution has been reached, i.e. semantic applications can can be used for more efficient discovery, integration, provide proof of the derived conclusion. This paper is a automation & reuse across many applications.Today’s study work & survey, which demonstrates a comparison web is purely based on documents that are written in of different type of inference engines in context of HTML, used for coding a body of text with interactive semantic web. It will help to distinguish among different forms. Semantic web provides a common language for inference engines which may be helpful to judge the understanding how data related to the real world various proposed prototype systems with different views objects, allowing a person or machine to start with in on what an inference engine for the semantic web one database and then move through an unending set of should do. databases that are not connected by wires but by being about the same thing.
    [Show full text]
  • The Ratiolog Project: Rational Extensions of Logical Reasoning
    The RatioLog Project: Rational Extensions of Logical Reasoning Ulrich Furbach · Claudia Schon · Frieder Stolzenburg · Karl-Heinz Weis · Claus-Peter Wirth Abstract Higher-level cognition includes logical reasoning 1 Rational Reasoning and Question Answering and the ability of question answering with common sense. The RatioLog project addresses the problem of rational rea- The development of formal logic played a big role in the soning in deep question answering by methods from auto- field of automated reasoning, which led to the development mated deduction and cognitive computing. In a first phase, of the field of artificial intelligence (AI). Applications of au- we combine techniques from information retrieval and ma- tomated deduction in mathematics have been investigated chine learning to find appropriate answer candidates from from the early years on. Nowadays automated deduction the huge amount of text in the German version of the free techniques are successfully applied in hard- and software encyclopedia “Wikipedia”. In a second phase, an automated verification and many other areas (for an overview see [2]). theorem prover tries to verify the answer candidates on In contrast to formal logical reasoning, however, human the basis of their logical representations. In a third phase reasoning does not strictly follow the rules of classical logic. — because the knowledge may be incomplete and inconsis- Reasons may be incomplete knowledge, incorrect beliefs, tent —, we consider extensions of logical reasoning to im- and inconsistent norms. From the very beginning of AI re- prove the results. In this context, we work toward the appli- search, there has been a strong emphasis on incorporating cation of techniques from human reasoning: We employ de- mechanisms for rationality, such as abductive or defeasible feasible reasoning to compare the answers w.r.t.
    [Show full text]
  • Toward a Logic of Everyday Reasoning
    Toward a Logic of Everyday Reasoning Pei Wang Abstract: Logic should return its focus to valid reasoning in real-world situations. Since classical logic only covers valid reasoning in a highly idealized situation, there is a demand for a new logic for everyday reasoning that is based on more realistic assumptions, while still keeps the general, formal, and normative nature of logic. NAL (Non-Axiomatic Logic) is built for this purpose, which is based on the assumption that the reasoner has insufficient knowledge and resources with respect to the reasoning tasks to be carried out. In this situation, the notion of validity has to be re-established, and the grammar rules and inference rules of the logic need to be designed accordingly. Consequently, NAL has features very different from classical logic and other non-classical logics, and it provides a coherent solution to many problems in logic, artificial intelligence, and cognitive science. Keyword: non-classical logic, uncertainty, openness, relevance, validity 1 Logic and Everyday Reasoning 1.1 The historical changes of logic In a broad sense, the study of logic is concerned with the principles and forms of valid reasoning, inference, and argument in various situations. The first dominating paradigm in logic is Aristotle’s Syllogistic [Aristotle, 1882], now usually referred to as traditional logic. This study was carried by philosophers and logicians including Descartes, Locke, Leibniz, Kant, Boole, Peirce, Mill, and many others [Bochenski,´ 1970, Haack, 1978, Kneale and Kneale, 1962]. In this tra- dition, the focus of the study is to identify and to specify the forms of valid reasoning Pei Wang Department of Computer and Information Sciences, Temple University, Philadelphia, USA e-mail: [email protected] 1 2 Pei Wang in general, that is, the rules of logic should be applicable to all domains and situa- tions where reasoning happens, as “laws of thought”.
    [Show full text]
  • Automated Reasoning on the Web
    Automated Reasoning on the Web Slim Abdennadher1, Jos´eJ´ulioAlves Alferes2, Grigoris Antoniou3, Uwe Aßmann4, Rolf Backofen5, Cristina Baroglio6, Piero A. Bonatti7, Fran¸coisBry8, W lodzimierz Drabent9, Norbert Eisinger8, Norbert E. Fuchs10, Tim Geisler11, Nicola Henze12, Jan Ma luszy´nski4, Massimo Marchiori13, Alberto Martelli14, Sara Carro Mart´ınez15, Wolfgang May16, Hans J¨urgenOhlbach8, Sebastian Schaffert8, Michael Schr¨oder17, Klaus U. Schulz8, Uta Schwertel8, and Gerd Wagner18 1 German University in Cairo (Egypt), 2 New University of Lisbon (Portugal), 3 Institute of Computer Science, Foundation for Research and Technology – Hel- las (Greece), 4 University of Link¨oping (Sweden), 5 University of Jena (Germany), 6 University of Turin (Italy), 7 University of Naples (Italy), 8 University of Mu- nich (Germany), 9 Polish Academy of Sciences (Poland), 10 University of Zurich (Switzerland), 11 webXcerpt (Germany), 12 University of Hannover (Germany), 13 University of Venice (Italy), 14 University of Turin (Italy), 15 Telef´onica Investi- gaci´ony Desarollo (Spain), 16 University of G¨ottingen(Germany), 17 University of Dresden (Germany), 18 University of Eindhoven (The Netherlands) Abstract Automated reasoning is becoming an essential issue in many Web systems and applications, especially in emerging Semantic Web applications. This article first discusses reasons for this evolution. Then, it presents research issues currently investigated towards automated reasoning on the Web and it introduces into selected applications demonstrating the practical impact of the approach. Finally, it introduces a research endeavor called REWERSE (cf. http://rewerse.net) recently launched by the authors of this article which is concerned with developing automated reasoning methods and tools for the Web as well as demonstrator applications.
    [Show full text]
  • A Knowledge-Based Approach to Network Security: Applying Cyc in the Domain of Network Risk Assessment
    A Knowledge-Based Approach to Network Security: Applying Cyc in the Domain of Network Risk Assessment Blake Shepard, Cynthia Matuszek, C. Bruce Fraser, William Wechtenhiser, David Crabbe, Zelal Güngördü, John Jantos, Todd Hughes, Larry Lefkowitz, Michael Witbrock, Doug Lenat, Erik Larson Cycorp, Inc., 3721 Executive Center Drive, Suite 100, Austin, TX 78731 {blake, cynthia, dcrabbe, zelal, jantos, larry, witbrock, lenat}@cyc.com [email protected], [email protected], [email protected], [email protected] Abstract about what computers are on the network, what programs are installed or running on those computers, what privileges CycSecureTM is a network risk assessment and network monitoring the running programs have, what users are logged into the application that relies on knowledge-based artificial intelligence computers, how the parameters of critical operating system technologies to improve on traditional network vulnerability as- files are set, etc. The formal model is stored directly in the sessment. CycSecure integrates public reports of software faults KB, where it is accessible for inference and planning. This from online databases, data gathered automatically from computers on a network and hand-ontologized information about computers formal representation also allows users to interact directly and computer networks. This information is stored in the Cyc® with the model of the network using ontology editing tools, knowledge base (KB) and reasoned about by the Cyc inference allowing testing of proposed changes or corrections to the engine and planner to provide detailed analyses of the security (and network before implementation. vulnerability) of networks. CycSecure Server CycSecure Outputs Sentinels 1 Introduction Dynamic HTML User Interfaces Natural language (NL) descriptions of Network Model Network Attack Query network attack plans Statistics Plan In maintaining secure computer networks, system adminis- Editor Viewer Tool Tool Analyzer trators face an increasingly time-consuming task.
    [Show full text]