Welcome

The workshop will focus on the application of artificial intelligence to problems in cyber security. This year the AICS emphasis will be on Internet of Things (IoT) and mobile devices relative to cyber security. The workshop will address technologies and their applications, such as machine learning, game theory, natural language processing, knowledge representation, automated and assistive reasoning, and human machine interactions. The workshop will emphasize cyber systems and research on techniques to enable resilience in mobile systems involving human-machine interactions.

IoT and mobile devices provide powerful sensing and computing capabilities to users and systems. These same capabilities, however, offer new opportunities for adversarial compromise, resulting in the loss of data and control, and could lead to infection spread to other connected devices. Artificial intelligence capabilities have the potential to help protect these mobile platforms in several ways. Because IoT mobile devices, such as smart phones, are often used by one individual at a time, behavioral analysis techniques that model normal user usage patterns can be leveraged to recognize anomalous, or out-of-the-ordinary, behaviors that might be indicative of misuse. In addition, graph analysis of a device’s connectivity network, such as a user’s social network or links in a web page, can be leveraged to identify malicious sites that could seek to infect the devices. Finally, AI capabilities that collect, correlate and analyze multiple data sources at once can be leveraged to confirm the provenance and veracity of data from suspect IoT devices.

Addressing the cyber security challenges of IoT and mobile devices requires collaboration between several different research and development communities including the artificial intelligence, cyber-security, game theory, machine learning and formal reasoning communities.

The above applications of AI have the potential to impact cyber security in a positive way, bringing automated learning and game theory into the service of improved system resilience. Developing and applying these and other AI capabilities to cyber security problems requires collaboration between several different communities including the artificial intelligence, game theory, machine learning, and cyber-security communities, as well as the operational and commercial applications communities. This workshop is structured to encourage a lively exchange of ideas between researchers in these communities from the academic, public, and commercial sectors.