Agent-based Knowledge-design Assistant (AKA) Technology for Computer Network Defense (CND)
Small Business Information
4900 University Square, Suite 8, Huntsville, AL, 35816
Chief Executive Officer
Chief Executive Officer
AbstractIn this proposal, Sentar presents its plan for applying its Agent-based Knowledge-design Assistant (AKA) technology to Computer Network Defense (CND). This work will leverage two Sentar Phase II SBIR projects: the AKA currently in development and theproposed Work Centered Interface (WCI) Phase II capability, which will focus on Computer Network Defense (CND) for the US Missile Defense 04 Test Bed. By leveraging these two efforts, the resulting AKA-CND will provide security managers with a powerfultool that will allow them to respond rapidly and flexibly to changing hostile network conditions. Security managers and their commanders will be able to adapt the system to maintain continuity of operations in the face of unforeseeable circumstances,perform post-attack forensics flexibly and creatively, and quickly implement policy revisions on short notice. To ensure success in this project, Sentar is teaming with SYColeman, whose experienced understanding of the problems of network security willprovide expertise, focus and depth to the project. In Phase I, the team will establish the feasibility of the AKA-CND by defining appropriate AKA knowledge representation technologies and designing the integrated CND user interface to include bothwork-centered and knowledge authoring capabilities. The AKA-CND will increase the military and commercial potential for the proposed Phase II WCI-CND by providing its users with greater autonomy in adapting the CND capability to new and evolvingrequirements in areas such as post attack forensics, security policy revisions, and continuity of operations. By enabling security managers to adapt and evolve the CND capability to new and unforeseen conditions, the AKA will enhance the ability ofmissile defense systems to withstand cyber-attack. Potential applications include CND, command and control (C2), anti-terrorism intelligence, and customer relationship management in a wide variety of industries, including Financial Services, Computers &Peripherals, Software & Internet Technologies, and Utilities.
* information listed above is at the time of submission.