Deployable Autonomous AI Agent
EDF Development Actions
Basic Information
- Identifier
- EDF-2023-DA-CYBER-DAAI
- Programme
- Call for EDF development actions implemented via actual cost grants
- Programme Period
- 2021 - 2027
- Status
- Closed (31094503)
- Opening Date
- June 21, 2023
- Deadline
- November 21, 2023
- Deadline Model
- single-stage
- Budget
- €714,500,000
- Min Grant Amount
- –
- Max Grant Amount
- –
- Expected Number of Grants
- –
- Keywords
- EDF-2023-DA-CYBER-DAAIEDF-2023-DA
Description
The outcome must contribute to:
- a stronger, more competitive and technologically independent European Defence Technological and Industrial Base (EDTIB) when it comes to solutions for next generation cyber defence capabilities;
- enhanced security for the EU, its Member States and EDF associated countries (Norway) by ensuring capable defence measures against AI-based cyber attacks;
- alleviating human resource availability problems;
- advanced preparedness to counter emerging threats for critical infrastructure providers and to enhance military mobility.
Artificial intelligence (AI) begins to transform cybersecurity. Recent advances in machine learning (ML) techniques could enable ground-breaking capabilities in the future, including defences that automatically interdict attackers and reshape networks to mitigate offensive operations. ML combined with AI could shape cyber operations in ways that drive more aggressive and destabilising engagements between state actors. Therefore, it is valuable to anticipate how adversaries might adapt their tactics and strategies, and to determine what challenges might emerge for defenders.
The field of AI is at a critical crossroad. Globalisation and industrialisation of AI is intensifying, while the ethical and regulatory issues of these technologies are multiplied. AI has moved from an emerging technology to a mature technology, which is no longer dealing with a speculative part of scientific research, but instead something that has real-world impact, both positive and negative. The importance of AI in cyber operations has been noticed by many nations. AI is a strategic technology that could prove incredibly consequential for the competitiveness of the EU, its Member States and EDF associated countries (Norway).
Specific objective
Today’s conversations on AI in military affairs concentrate on various variants of “narrow” artificial intelligence. Current discussions on AI often primarily concentrate on ML, which is the process of using algorithms to learn from data. Much of the most exciting progress in recent years has leveraged deep learning, a technique that involves the use of layers of artificial neural networks, which are inspired by the structure of the human brain.
At a basic level, AI involves software that leverages data for learning but also requires hardware to harness the power of significant computing capabilities to enable that process. It is inherently challenging to define what AI is or can achieve when the field is so dynamic and evolving so rapidly. For the time being, AI/ML techniques are often limited by the availability of data, although this may change with advances in the use of synthetic data, real-life cyber exercises, data lakes and techniques that leverage reinforcement learning, such as the capability to learn from self-play alone.
The main challenge of this topic is to establish an investigative approach on an area of autonomous deployable AI creation, with the intention to broaden artificial intelligence perspective in cyber defence in the EU.
Scope:The proposals must focus on the development of an autonomous and adaptive deployable AI agent. All proposed activities must ultimately support the creation of an AI agent that is able to conduct automated and semi-automated incident management on different cyber defence systems for the entire process of the incident management cycle. The solutions must support human operators, analysts and decision-makers at technical, tactical, operational, strategic and political level. In addition, solutions are expected to contribute to enhanced cyber situational awareness, increased military infrastructure resilience and improved protection against AI-based and other advanced cyber threats.
The work should identify gaps for achieving an autonomous AI agent for military systems. The final result should build on a general-purpose AI agent that can be deployed in different operating environments.
The work should also address the gap of learning data sets through the use of live-fire exercises, data lake concepts and self-learning algorithms. Access to the data sets should be planned in a decentralised way to allow the solution to be deployable. This implies, that new architectures and solutions should be considered in achieving decentralisation, utilising and enhancing for example AI-powered edge computing.
The assessment of the proposed solution must be evaluated during live-fire exercises with a method allowing comparison of the developed AI agent against actual defending teams. This means using learning data from different exercises, but also data feeds from the exercise itself, where the AI agent is competing.
Types of activities
The following table lists the types of activities which are eligible for this topic, and whether they are mandatory or optional (see Article 10(3) EDF Regulation):
| Types of activities (art 10(3) EDF Regulation) | Eligible? | |
| (a) | Activities that aim to create, underpin and improve knowledge, products and technologies, including disruptive technologies, which can achieve significant effects in the area of defence (generating knowledge) | No |
| (b) | Activities that aim to increase interoperability and resilience, including secured production and exchange of data, to master critical defence technologies, to strengthen the security of supply or to enable the effective exploitation of results for defence products and technologies (integrating knowledge) | Yes(optional) |
| (c) | Studies, such as feasibility studies to explore the feasibility of new or upgraded products, technologies, processes, services and solutions | Yes(mandatory) |
| (d) | Design of a defence product, tangible or intangible component or technology as well as the definition of the technical specifications on which such a design has been developed, including any partial test for risk reduction in an industrial or representative environment | Yes(mandatory) |
| (e) | System prototyping of a defence product, tangible or intangible component or technology | Yes(mandatory) |
| (f) | Testing of a defence product, tangible or intangible component or technology | Yes(mandatory) |
| (g) | Qualification of a defence product, tangible or intangible component or technology | Yes(optional) |
| (h) | Certification of a defence product, tangible or intangible component or technology | Yes(optional) |
| (i) | Development of technologies or assets increasing efficiency across the life cycle of defence products and technologies | Yes(optional) |
The proposals must cover at least the following tasks as part of the mandatory activities:
- Studies:
- the proposed activities must include feasibility studies drawing upon real-world scenarios and live-fire exercises in order to ensure that developed solution and techniques are fit-for-purpose.
- Design:
- the proposed solutions must include creation of AI-based techniques for detecting and understanding adversarial activity;
- the proposed solution must include creation of AI-based techniques for building knowledge about own protected ICT systems (e.g. a “cyber record” with current and historical information). This must include collecting, linking and fusing different kinds of information about the system hardware, software, and the relationship between them. Previously used analysis should enhance the more generalised AI solution.
- System prototyping:
- the proposed solutions must demonstrate the creation of AI-based information collection and storage systems that dynamically adapts its collection and storage strategy to the situation as continuously analysed and perceived by the system;
- the proposed solutions must be able to conduct automated and semi-automated incident management on different cyber defence systems for the entire process of the incident management cycle.
- Testing:
- the proposed solutions must be tested in a live fire-exercise against real defenders.
In addition, the proposals should cover the following tasks:
- Studies:
- the proposals should reuse previously created reference systems or develop new ones and appropriate test cases to generate training data and evaluate the efficacy of different solutions, both with and without human operators interacting with the system.
- Design:
- the proposed solutions should include creation of AI-based techniques for detecting and understanding adversarial activity tasks on:
- analysing and triaging alarms, conducting forensics, utilising external information with varying levels of trust (e.g. threat intelligence);
- leveraging behavioural analytics, performing kill-chain detection and analysis, assessing potential attacker intentions;
- monitoring applications and communication activities, analysing malware;
- the techniques should be intended for both real-time and non-real-time detection and analysis, involve multi-disciplinary approaches, use data from endpoints, networks and the cloud, and leverage distributed computing and data processing for real-time scalability;
- the creation of AI-based techniques for building knowledge about own protected ICT systems (e.g. a “cyber record” with current and historical information) should utilise previously used analysis to enhance the more generalised AI solution;
- AI agent architecture should consider decentralised data sets with new state-of-the-art hardware;
- the proposals should include functional modules for mapping threat actors based on common frameworks like MITRE and RICHDATA.
- the proposed solutions should include creation of AI-based techniques for detecting and understanding adversarial activity tasks on:
The proposals must also substantiate synergies and complementarity with activities described in the call topicsEDIDP-AI-2020, EDF-2021-CYBER-R-CDAI, and with other relevant EU ongoing activities.
The proposals must give due consideration to design principles and implement a specific ethics-focused approach during the development, deployment and/or use of AI-based solutions, e.g. by the Assessment List for Trustworthy AI (ALTAI), in order to develop procedures to detect and assess the level of potential ethical risks and address them.
Moreover:
- projects addressing activities referred to in point (d) above must be based on harmonised defence capability requirements jointly agreed by at least two Member States or EDF associated countries (or, if studies within the meaning of point (c) are still needed to define the requirements, at least on the joint intent to agree on them)
- projects addressing activities referred to in points (e) to (h) above, must be:
- supported by at least two Member States or EDF associated countries that intend to procure the final product or use the technology in a coordinated manner, including through joint procurement
and
-
- based on common technical specifications jointly agreed by the Member States or EDF associated countries that are to co-finance the action or that intend to jointly procure the final product or to jointly use the technology (or, if design within the meaning of point (d) is still needed to define the specifications, at least on the joint intent to agree on them).
Functional requirements
The proposals must be supported by a set of capability requirements as agreed by a group of Member States or EDF associated countries (Norway). The proposals must give evidence of coherence between the proposed activities and the requirements by the Member States and EDF associated countries (Norway).
In addition, the intended final outcome should at least:
- be able to work autonomously in the deployed environment, but also allow manual interruption and reasoning of the decision process;
- be able to create AI-based information;
- be able to collect and store needed information in dynamic big data and data lake concepts in a decentralised manner;
- be deployable and it should be possible to deploy the solution in different environments with all needed components;
- Use CTI (Cyber Threat Intelligence) and technical information exchange platforms (such as MISP, HIVE) in order to enrich data sets and information of ongoing cyber activities.
- include an architecture that is open, modular, scalable, resilient and highly available.
Eligibility & Conditions
Conditions
1. Admissibility conditions: described in section 5 of the call document
Proposal page limits and layout: described in Part B of the Application Form available in the Submission System
2. Eligible countries: described in section 6 of the call document
3. Other eligibility conditions: described in section 6 of the call document
4. Financial and operational capacity and exclusion: described in section 7 of the call document
Submission and evaluation processes: described section 8 of the call document and the Online Manual
Award criteria, scoring and thresholds: described in section 9 of the call document
Indicative timeline for evaluation and grant agreement: described in section 4 of the call document
6. Legal and financial set-up of the grants: described in section 10 of the call document
Call documents:
Templates for proposals should be downloaded from the Submission System (available at the opening of the call), the links below are examples only:
- EDF Standard application form
- Detailed budget table EDF DA
- Participant information (including previous projects, if any)
- List of infrastructure, facilities, assets and resources
- Cofinancing declarations (if the requested EU grant does not cover the total eligible costs of the project)
- Actual indirect cost methodology declarations (if actual indirect costs used)
- Harmonised capability declarations (if the project covers design activities)
- Declarations on procurement intent and common specifications (if the project covers system prototyping/testing/qualification/certification activities)
- Ownership control declarations
- PRS declaration (if the project requires access to Galileo PRS information)
Additional documents:
Generic Programme Security Instruction (PSI) concerning European Defence Fund
Rules for Legal Entity Validation, LEAR Appointment and Financial Capacity Assessment
EU Grants AGA — Annotated Model Grant Agreement
Funding & Tenders Portal Online Manual
Support & Resources
For help related to this call, please contact: [email protected] Please be aware that we may not be anymore able to answer questions sent to the functional mailbox before the deadline for submission of the proposals.
Funding & Tenders Portal FAQ – Submission of proposals.
IT Helpdesk – Contact the IT helpdesk for questions such as forgotten passwords, access rights and roles, technical aspects of submission of proposals, etc.
Online Manual – Step-by-step online guide through the Portal processes from proposal preparation and submission to reporting on your on-going project. Valid for all 2021-2027 programmes.
Latest Updates
This call closed at 17.00 on 22 November 2023. 30 proposals were submitted for evaluation.
Please be aware that we may not be anymore able to answer questions sent to the functional mailbox before the deadline for submission of the proposals. We encourage you to consult the latest FAQs published.
The presentations from the EDF 2023 infodays are available at the EDF page.
Opening of the calls has been postponed to 22 June 2023.
You will be able to start the submission process from that date.
European Defence Fund (EDF) Info Days 2023 will take place on 28-29 June 2023