scope for the experiments and user study presented
here and would be an interesting avenue of future pur-
suit.
Since conducting this user study, we have en-
hanced BART’s workflow optimization capabilities to
leverage concurrent execution when possible, which
further increases speed. We plan to conduct more ex-
tensive experimentation to validate the optimizations.
The focus of our future work is to transition BART
into active use by cyber defenders (both military and
civilian).
ACKNOWLEDGMENTS
Many thanks to AIS, Inc. for their technical sup-
port and for providing the Metasponse and Powershell
tools used in the BART user study.
REFERENCES
AIS Inc (2019). Metasponse user’s guide.
Andrews, T., Curbera, F., Dholakia, H., Goland, Y., Klein,
J., Leymann, F., Liu, K., Roller, D., Smith, D., Thatte,
S., et al. (2003). Business process execution language
for web services.
ArcSight. Enterprise Security Manager.
Atighetchi, M., Pal, P., Webber, F., Schantz, R., Jones, C.,
and Loyall, J. (2004). Adaptive cyberdefense for sur-
vival and intrusion tolerance. IEEE Internet Comput-
ing, 8(6):25–33.
Atighetchi, M., Yaman, F., Simidchieva, B., and Carvalho,
M. (2016). An autonomous resiliency toolkit - needs,
challenges, and concepts for next generation cyber de-
fense platforms. In MILCOM 2016 - 2016 IEEE Mili-
tary Communications Conference, pages 1–6.
Benjamin, D. P., Pal, P., Webber, F., Rubel, P., and
Atigetchi, M. (2008). Using a cognitive architecture
to automate cyberdefense reasoning. In Bio-inspired
Learning and Intelligent Systems for Security, 2008.
BLISS’08. ECSIS Symposium on, pages 58–63. IEEE.
Burstein, M., Goldman, R. P., McDermott, D. V., McDon-
ald, D., Beal, J., and Maraist, J. (2009a). LTML—a
language for representing semantic web service work-
flow procedures. In Proceedings ISWC workshop on
Semantics for the Rest of Us.
Burstein, M. H., Yaman, F., Laddaga, R. M., and Bo-
brow, R. J. (2009b). POIROT: Acquiring workflows
by combining models learned from interpreted traces.
In Proceedings of the Fifth International Conference
on Knowledge Capture, K-CAP ’09, pages 129–136,
New York, NY, USA. ACM.
Carvalho, M., Eskridge, T. C., Ferguson-Walter, K., and
Paltzer, N. (2015). MIRA: a support infrastructure for
cyber command and control operations. In Resilience
Week (RWS), 2015, pages 1–6. IEEE.
Cass, A. G., Staudt Lerner, B., McCall, E. K., Osterweil,
L. J., Sutton Jr, S. M., and Wise, A. (2000). Little-
JIL/Juliette: A process definition language and inter-
preter. In ICSE ’00: Proc. 22nd Int. Conf. Softw. Eng.,
pages 754–757.
Cook, J. E. and Wolf, A. L. (1995). Automating process dis-
covery through event-data analysis. In Proc. of ICSE
’95, pages 73–82, New York, NY, USA.
D’Amico, A. and Whitley, K. (2008). The real work of
computer network defense analysts. In VizSEC 2007,
pages 19–37. Springer.
Decker, K. (1996). Taems: A framework for environment
centered analysis & design of coordination mecha-
nisms. Foundations of distributed artificial intelli-
gence, pages 429–448.
Fox, M. and Long, D. (2003). PDDL2.1: An exten-
sion to PDDL for expressing temporal planning do-
mains. Journal of Artificial Intelligence Research
(JAIR), 20:61–124.
Haigh, K. Z. and Yaman, F. (2011). RECYCLE: Learning
looping workflows from annotated traces. ACM Trans.
Intell. Syst. Technol., 2(4):42:1–42:32.
Herbst, J. (2000). A machine learning approach to workflow
management. In ECML, volume 1810, pages 183–
194. Springer.
Herbst, J. and Karagiannis, D. (1998). Integrating machine
learning and workflow management to support acqui-
sition and adaptation of workflow models. In Proc.
of DEXA 98, Washington, DC, USA. IEEE Computer
Society.
Kennedy, D., O’Gorman, J., Kearns, D., and Aharoni, M.
(2011). Metasploit: the penetration tester’s guide. No
Starch Press.
Martin, D., Burstein, M., Hobbs, J., Lassila, O., McDer-
mott, D., McIlraith, S., Narayanan, S., Paolucci, M.,
Parsia, B., Payne, T., Sirin, E., Srinivasan, N., and
Sycara, K. (2004). OWL-S: Semantic markup for web
services. W3C Member Submission.
Maynor, D. (2011). Metasploit Toolkit for Penetration
Testing, Exploit Development, and Vulnerability Re-
search. Elsevier.
Van der Aalst, W., Weijters, T., and Maruster, L. (2004).
Workflow mining: Discovering process models from
event logs. IEEE Transactions on Knowledge and
Data Engineering, 16(9):1128–1142.
van Harmelen, F. and McGuinness, D. L. (2004). OWL
web ontology language overview. W3C recommen-
dation, W3C. http://www.w3.org/TR/2004/REC-owl-
features-20040210/.
White, S. A. (2009). Business process modeling notation
(BPMN). Technical Report formal/2009-01-03, Busi-
ness Process Management Initiative (BPMI).
Yaman, F., Oates, T., and Burstein, M. (2009). A context
driven approach to workflow mining. In Proceedings
of IJCAI-09.
ICAART 2020 - 12th International Conference on Agents and Artificial Intelligence
248