Who Is in Control: An Introduction to Automatic Cyber Defense

Published: March 11, 2026
Views:       Downloads:
Abstract

This talk provides an overview of the design of automated cyber-defense solutions powered by artificial intelligence. Modern cyber threats are increasingly complex, often exploiting human weaknesses, heterogeneous infrastructures, and unexpected attack vectors. This complexity underscores the need for intelligent, adaptive defense mechanisms that sup-port—rather than replace—human decision-makers in increasingly adversarial, complex environments. The first section of the talk centers on threat intelligence, discussing both reactive and proactive approaches to detecting and anticipating malicious behaviors. Traditional defenses, such as manually configured firewalls and intrusion detection systems, strug-gle with encrypted traffic, large-scale networks, and evolving attack strategies. To address these limitations, machine-learning-based detection techniques and graph-based models designed for reasoning about multi-stage attacks can pave the way for significantly safer IT infrastructures. The second part of the talk revolves around autonomous networks, motivated by the fact that modern infrastructures are too dynamic and complex to be managed manually. In this con-text, intent-based networking can help create self-configuring, self-healing, and secure architectures. By harnessing log-ic-based reasoning and explainable AI, intent-based networks can become game changers in the design of highly secure, mathematically guaranteed distributed environments that also comply with a set of best practices. Finally, the talk will conclude with a discussion of a variety of software protection-related projects, such as decision-support systems for op-timizing the placement of software protections, as well as AI-based techniques leveraging LSTMs and transformers to analyze binaries and identify vulnerabilities.

Published in Abstract Book of the CNR IMATI Workshop
Page(s) 2-2
Creative Commons

This is an Open Access abstract, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2026. Published by Science Publishing Group

Keywords

Cybersecurity, Artificial Intelligence, Threat Intelligence, Intent-based Networking, Software Security