Final technical rept. May 2002-Apr 2003
HONEYWELL ASC LABS MINNEAPOLIS MN
Pagination or Media Count:
This report describes the technical components developed for hostile intent recognition, and documents specific experiments to evaluate a demonstration skeptical system in a cyber security domain. Current systems execute any command issued by an authenticated user so long as they fall within the privileges granted. By contrast, a skeptical system entertains doubts about the tasks that it is asked to perform. It questions the authenticity, integrity, and intent of the requester and acts with due consideration of its doubts. The report is broken down into three major sections. The first section discusses the system architecture overview and the technologies behind the demonstration system. The next section discusses a number of demonstration scenarios and the systems performance on them. The third section discusses scalability experiments done on the intent recognition algorithm one of the central components of the system. The report closes with general conclusions about the system and makes some suggestions for areas for future work.
- Computer Programming and Software
- Computer Hardware
- Military Operations, Strategy and Tactics