Abstract
ABCD is a four-level hierarchy with human supervisors at the top, a top-level agent called a Sergeant controlling each enclave, Sentinel agents located at each monitored host, and mobile Sensor agents that swarm through the enclaves to detect cyber malice and misconfigurations. The code comprises four parts: (1) the core agent framework, (2) the user interface and visualization, (3) test-range software to create a network of virtual machines including a simulated Internet and user and host activity emulation scripts, and (4) a test harness to allow the safe running of adversarial code within the framework of monitored virtual machines.
- Developers:
-
Fink, Glenn [1]
- Pacific Northwest National Laboratory (PNNL), Richland, WA (United States)
- Release Date:
- 2015-09-29
- Project Type:
- Closed Source
- Software Type:
- Scientific
- Programming Languages:
-
Python 2.6 or later
- Licenses:
-
Other (Commercial or Open-Source): https://www.pnnl.gov/available-technologies
- Sponsoring Org.:
-
USDOEPrimary Award/Contract Number:AC05-76RL01830
- Code ID:
- 76601
- Site Accession Number:
- 16585
- Research Org.:
- Pacific Northwest National Laboratory (PNNL), Richland, WA (United States)
- Country of Origin:
- United States
Citation Formats
Fink, Glenn.
Ant-Based Cyber Defense.
Computer Software.
USDOE.
29 Sep. 2015.
Web.
doi:10.11578/dc.20220718.75.
Fink, Glenn.
(2015, September 29).
Ant-Based Cyber Defense.
[Computer software].
https://doi.org/10.11578/dc.20220718.75.
Fink, Glenn.
"Ant-Based Cyber Defense." Computer software.
September 29, 2015.
https://doi.org/10.11578/dc.20220718.75.
@misc{
doecode_76601,
title = {Ant-Based Cyber Defense},
author = {Fink, Glenn},
abstractNote = {ABCD is a four-level hierarchy with human supervisors at the top, a top-level agent called a Sergeant controlling each enclave, Sentinel agents located at each monitored host, and mobile Sensor agents that swarm through the enclaves to detect cyber malice and misconfigurations. The code comprises four parts: (1) the core agent framework, (2) the user interface and visualization, (3) test-range software to create a network of virtual machines including a simulated Internet and user and host activity emulation scripts, and (4) a test harness to allow the safe running of adversarial code within the framework of monitored virtual machines.},
doi = {10.11578/dc.20220718.75},
url = {https://doi.org/10.11578/dc.20220718.75},
howpublished = {[Computer Software] \url{https://doi.org/10.11578/dc.20220718.75}},
year = {2015},
month = {sep}
}