Ant-Based Cyber Defense

Abstract

ABCD is a four-level hierarchy with human supervisors at the top, a top-level agent called a Sergeant controlling each enclave, Sentinel agents located at each monitored host, and mobile Sensor agents that swarm through the enclaves to detect cyber malice and misconfigurations. The code comprises four parts: (1) the core agent framework, (2) the user interface and visualization, (3) test-range software to create a network of virtual machines including a simulated Internet and user and host activity emulation scripts, and (4) a test harness to allow the safe running of adversarial code within the framework of monitored virtual machines.
Developers:
Fink, Glenn [1]
  1. Pacific Northwest National Laboratory (PNNL), Richland, WA (United States)
Release Date:
2015-09-29
Project Type:
Closed Source
Software Type:
Scientific
Programming Languages:
Python 2.6 or later
Licenses:
Other (Commercial or Open-Source): https://www.pnnl.gov/available-technologies
Sponsoring Org.:
Code ID:
76601
Site Accession Number:
16585
Research Org.:
Pacific Northwest National Laboratory (PNNL), Richland, WA (United States)
Country of Origin:
United States

Citation Formats

Fink, Glenn. Ant-Based Cyber Defense. Computer Software. USDOE. 29 Sep. 2015. Web. doi:10.11578/dc.20220718.75.
Fink, Glenn. (2015, September 29). Ant-Based Cyber Defense. [Computer software]. https://doi.org/10.11578/dc.20220718.75.
Fink, Glenn. "Ant-Based Cyber Defense." Computer software. September 29, 2015. https://doi.org/10.11578/dc.20220718.75.
@misc{ doecode_76601,
title = {Ant-Based Cyber Defense},
author = {Fink, Glenn},
abstractNote = {ABCD is a four-level hierarchy with human supervisors at the top, a top-level agent called a Sergeant controlling each enclave, Sentinel agents located at each monitored host, and mobile Sensor agents that swarm through the enclaves to detect cyber malice and misconfigurations. The code comprises four parts: (1) the core agent framework, (2) the user interface and visualization, (3) test-range software to create a network of virtual machines including a simulated Internet and user and host activity emulation scripts, and (4) a test harness to allow the safe running of adversarial code within the framework of monitored virtual machines.},
doi = {10.11578/dc.20220718.75},
url = {https://doi.org/10.11578/dc.20220718.75},
howpublished = {[Computer Software] \url{https://doi.org/10.11578/dc.20220718.75}},
year = {2015},
month = {sep}
}