GLOBAL GUARD MEETING
April 13, 1999
3085 ENG II
1:00-2:00 p.m.
In attendance:
Karl Levitt (KL), Jeff Rowe (JR), David O’Brien (DOB), David Klotz
(DK), Jason Schatz (JS) and Steven Templeton (ST)
TOPICS:
CYC Trip
CYC Inference Engine
CYC Demos
Use CYC for Correlation
How to Proceed
-
CYC Trip
-
KL: Doug Lenat heads CYC. CYC has 70 people plus contractors. We worked
with John DeSanto, who is a philosopher for CYC.
-
KL: We wrote down one-word descriptors for intrusion detection - came up
with about 10 pages.
-
CYC Inference Engine
-
Based on core knowledge base (BaseKB)
-
Microtheories
-
Can write microtheories, based on terms, facts, axioms
-
31 predicates for "in"
-
Based on natural language
-
Stylized natural language interface - might need translation
-
Very few technical theories were mentioned, but they have physics microtheories
and academic microtheories
-
High Performance Knowledge Base (HPKB)
-
30-40 people working on it, strategic information for country
-
DK: Impressive HPKB inferencing (Ex. Possible for Israel to be attacked
by Libyan planes)
-
Heuristics around shallow reasoning
-
ST: Generate new facts to add to knowledge base, how to add more facts
to resolve issues
-
KL: Strictly predicate logic - no longer frames based
-
Very efficient
-
Queries answered in seconds
-
DK: We're supposed to do inference engine for intrusion detection.
-
KL: Are we under attack? How severe is the attack? Are we threatened?
-
Not many rules. You can make functions from facts
-
Work with Laura and Him for knowledge base.
-
Intrusion detection sensor - Demo for September 5th
-
CYC runes on Linux, PII, Solaris and has an HTML or Telnet interface
-
CYC Demos
-
1 Willybot-like query (Ex. Show me all movies with Woody Alan directing
and Mia Farrow starring)
-
1 Hot-Bot query (Ex. You type in bat - it asks you whether you want the
animal the sport equipment, or the action
-
ST: Cannot find "good" actresses in Woody Alan movies
-
Use CYC for correlations
-
Build upon existing
-
Networks/Graph theory
-
Add own Microtheories
-
Organize - iterate with them for theories, vocabulary, scenarios
-
Ex. Put in Smurf attack
-
Should include Denial of Service attacks, but not focus on them exclusively
-
Epistomology vs. Heuristics
-
How to Proceed
-
Go over viewgraph at the next GG meeting (David, Marcus, and Karl)
-
Purchase books
-
Doug Lenat, Guha (1990). Knowledge - 2 copies
-
John Adams (1998). The Next World War, Simon & Schuster
-
Dorothy Denning's book is very light
-
John DeSanto should come here for a week.
-
People working on GG
-
Karl, David O, Marcus, David Klotz, Steven Templeton (limited)