Advertisement

Can Intelligent Agent Improve Human-Machine Team Performance Under Cyberattacks?

  • Wen Ding
  • Sonwoo Kim
  • Daniel Xu
  • Inki Kim
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 903)

Abstract

This paper presents a preliminary work of a simulation study for the evaluation of human-machine team (HMT) performance with assistance of a sentinel system under cyberattacks. Sentinel system is an intelligent agent of cyberattack-detection kit, whose user interface (UI) was designed and implemented as a proof-of-concept in the simulation. The goal for this sentinel system is to improve the pilots’ Situation Awareness (SA) of the system vulnerability and resiliency, such that the HMT performance can be improved against disruptive events. Based on the literature of cyberattacks on unmanned aerial vehicle (UAV) control systems, realistic mission operation and cyberattack scenarios were identified and implemented on a simulated UAV ground control station (GCS). In the follow-up experiment, up to twenty-four Air Force pilots will be instructed to supervise the UAVs under specific mission scenarios, and to respond for system recovery solutions generated on Sentinel UI after detection of cyberattacks. Understanding the interactive behaviors of the pilot and Sentinel under mission contexts and cyberattacks is expected to help improve HMT performance.

Keywords

Sentinel system Human machine team Cyberattacks simulation system Performance modeling 

References

  1. 1.
  2. 2.
    Virus infects program that controls U.S. drones, https://www.cnn.com/2011/10/10/us/drone-program-virus/index.html
  3. 3.
    Kim, A., Wampler, B., Goppert, J., Hwang, I., Aldridge, H.: Cyber attack vulnerabilities analysis for unmanned aerial vehicles. In Infotech@aerosp 2012, pp. 1–30 (2012)Google Scholar
  4. 4.
    Statistique, L. De., Sabatier, U.P.: Rare event simulation. Probab. Eng. Informational Sci. 20, 45–66 (2006)Google Scholar
  5. 5.
    Jajodia, S., Liu, P., Swarup, V., Wang, C.: Cyber situational awareness. Springer, US (2009)Google Scholar
  6. 6.
    Dutt, V., Ahn, Y., Gonzalez, C.: Cyber situation awareness?.: Modeling the security analyst in a cyber-attack scenario through instance-based learning. IFIP Annu. Conf. Data Appl. Secur. Priv. 6818, 280–292 (2011)Google Scholar
  7. 7.
    Krishna, C.G.L., Murphy, R.R.: A review on cybersecurity vulnerabilities for unmanned aerial vehicles. 2017 IEEE Int. Symp. Safety, Secur. Rescue Robot. 194–199 (2017)Google Scholar
  8. 8.
    Yag, E.: A study on cyber-security of autonomous and unmanned vehicles. J. Def. Model. Simul. 12, 369–381 (2015)Google Scholar
  9. 9.
    Rivera, E., Baykov, R., Gu, G.: A study on unmanned vehicles and cyber security. Texas. pp. 1–3 (2014)Google Scholar
  10. 10.
    Onken, R.: Cognitive cooperation for the sake of the human-machine team effectiveness. In: UNIVERSITAET DER BUNDESWEHR MUENCHEN NEUBIBERG (GERMANY FR). pp. 7–9 (2003)Google Scholar
  11. 11.
    Millot, P.: A common work space for a mutual enrichment of human-machine cooperation and team-situation awareness. In: IFAC HMS. pp. 387–394 (2013)CrossRefGoogle Scholar
  12. 12.
    Carver, B.Y.L.I.Z., Turoff, M.: The human and computer as a team in emergency management information systems, ACM. 50, 33–38Google Scholar
  13. 13.
    Salmon, M., Salmon, P.M., Stanton, N.A., Walker, G.H., Baber, C., Daniel, P., Mcmaster, R., Young, M.S., Salmon, P.M., Stanton, N.A., Walker, G.H., Baber, C., Daniel, P.: What really is going on?? Review of situation awareness models for individuals and teams. Theor. Issues Ergon. Sci. 297–323 (2008)CrossRefGoogle Scholar
  14. 14.
  15. 15.

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.School of Engineering and Applied Science, Engineering Systems and EnvironmentUniversity of VirginiaCharlottesvilleUSA
  2. 2.Computer Science, School of Engineering and Applied ScienceUniversity of VirginiaCharlottesvilleUSA

Personalised recommendations