<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-sharif-aeba-00" category="info" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="AEBA">Agent Event Behaviour Analysis (AEBA): A Framework for Behavioural Security Monitoring of Autonomous AI Agents</title>
    <seriesInfo name="Internet-Draft" value="draft-sharif-aeba-00"/>
    <author initials="R." surname="Sharif" fullname="Raza Sharif">
      <organization>CyberSecAI Ltd</organization>
      <address>
        <email>raza.sharif@outlook.com</email>
      </address>
    </author>
    <date year="2026" month="April" day="15"/>
    <area>Security</area>
    <workgroup>Independent Submission</workgroup>
    <keyword>agents</keyword>
    <keyword>behaviour analytics</keyword>
    <keyword>UEBA</keyword>
    <keyword>anomaly detection</keyword>
    <keyword>agent security</keyword>
    <keyword>AI security</keyword>
    <keyword>SIEM</keyword>
    <keyword>supply chain</keyword>
    <abstract>
      <?line 57?>

<t>This document specifies Agent Event Behaviour Analysis (AEBA), a
framework for collecting, signing, exchanging, and analysing
behavioural events produced by autonomous AI agents. AEBA is the
agent-domain equivalent of User and Entity Behaviour Analytics (UEBA)
as commonly deployed in enterprise Security Operations Centres. It
defines a canonical event schema, signature binding to agent identity,
baseline and peer-group exchange protocols, deviation signalling,
detection rule structure, revocation mechanisms, and
interoperability bindings for existing Security Information and Event
Management (SIEM) event formats (syslog, CEF, LEEF). The framework is
designed to compose with existing cryptographic primitives for agent
identity, payment, and transport security, and to support
cross-framework deployments in which agents produced by different
runtimes must share a common behavioural observability surface.</t>
    </abstract>
  </front>
  <middle>
    <?line 74?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Autonomous AI agents are being deployed into production in increasing
numbers across payments, customer service, software engineering,
healthcare, and industrial control. Enterprise Security Operations
Centres have mature frameworks for monitoring the behaviour of human
users through User and Entity Behaviour Analytics (UEBA) systems
<xref target="UEBA-Gartner"/>, but no equivalent standard exists for agent entities.
This gap is becoming acute: agents operate at one to three orders of
magnitude higher event rates than human users, carry cryptographic
rather than password-based identities, and are subject to novel attack
classes including prompt injection, delegation-chain abuse, and
model-output-driven drift that have no human analogue.</t>
      <t>This document defines a framework called Agent Event Behaviour Analysis
(AEBA). AEBA specifies:</t>
      <ul spacing="normal">
        <li>
          <t>A canonical, extensible event schema for agent behavioural
telemetry.</t>
        </li>
        <li>
          <t>Binding of each event to a verifiable agent identity using existing
cryptographic primitives.</t>
        </li>
        <li>
          <t>A baseline-exchange protocol enabling hosts and observers to share
per-agent normal-behaviour models.</t>
        </li>
        <li>
          <t>A deviation-signalling mechanism producing per-event and
per-sequence risk scores.</t>
        </li>
        <li>
          <t>A detection-rule structure aligned with kill-chain pattern matching
as practised in UEBA.</t>
        </li>
        <li>
          <t>A revocation protocol for publishing cryptographic signals that a
specific agent has been confirmed as misbehaving.</t>
        </li>
        <li>
          <t>Interoperability bindings to syslog <xref target="RFC5424"/>, CEF <xref target="CEF"/>, and
LEEF <xref target="LEEF"/>, enabling direct ingestion by existing SIEM products.</t>
        </li>
      </ul>
      <t>AEBA does not specify a complete SIEM or replace existing commercial
offerings. It defines the common contract above which multiple vendors,
open-source projects, and enterprise deployments can interoperate.</t>
      <section anchor="relation-to-other-drafts">
        <name>Relation to other drafts</name>
        <t>AEBA is designed to compose with, not replace, existing work on agent
security:</t>
        <ul spacing="normal">
          <li>
            <t>Agent identity and key binding are specified by
<xref target="I-D.sharif-agent-identity-framework"/>.</t>
          </li>
          <li>
            <t>Event signing uses the same canonical-signing-string construction as
<xref target="I-D.sharif-mcps-secure-mcp"/> and
<xref target="I-D.sharif-agent-payment-trust"/>.</t>
          </li>
          <li>
            <t>Per-message audit log format is specified by
<xref target="I-D.sharif-agent-audit-trail"/>; AEBA events are a specific subtype
suitable for behavioural analysis.</t>
          </li>
          <li>
            <t>Runtime attestation of agent state is specified by
<xref target="I-D.sharif-attp-agent-trust-transport"/> and provides supplementary
input to AEBA detection.</t>
          </li>
        </ul>
        <t>AEBA is complementary to, not dependent on, OWASP <xref target="OWASP-AST10"/> and
<xref target="OWASP-MCP10"/> risk taxonomies, and provides a machine-readable
observability layer on which those risk categories can be monitored in
production.</t>
      </section>
    </section>
    <section anchor="terminology-and-conventions">
      <name>Terminology and Conventions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all
capitals, as shown here.</t>
      <t>The following terms are used throughout this document:</t>
      <dl>
        <dt>Agent:</dt>
        <dd>
          <t>An autonomous or semi-autonomous software entity executing under a
runtime (for example, a Large Language Model with attached tools)
that performs actions on behalf of a user, organisation, or other
agent.</t>
        </dd>
        <dt>AEBA Event:</dt>
        <dd>
          <t>A structured, cryptographically signed record describing a single
observable action taken by or on behalf of an Agent. Defined in
<xref target="event-schema"/>.</t>
        </dd>
        <dt>Baseline:</dt>
        <dd>
          <t>A statistical model of the normal behaviour of an Agent or a
peer-group of Agents over a specified time window. Defined in
<xref target="baseline-and-peer-group-model"/>.</t>
        </dd>
        <dt>Deviation Signal:</dt>
        <dd>
          <t>A per-event or per-sequence risk score indicating the extent to
which observed behaviour deviates from the applicable Baseline.</t>
        </dd>
        <dt>Detection Rule:</dt>
        <dd>
          <t>A declarative specification matching one or more AEBA Events against
a known malicious pattern. Defined in
<xref target="detection-rules-and-kill-chain-patterns"/>.</t>
        </dd>
        <dt>Peer Group:</dt>
        <dd>
          <t>A set of Agents sharing a common purpose, deployment, framework, or
role, against which individual Agent behaviour is compared.</t>
        </dd>
        <dt>Host Runtime:</dt>
        <dd>
          <t>The environment in which an Agent executes and which is responsible
for emitting AEBA Events describing Agent actions.</t>
        </dd>
        <dt>Collector:</dt>
        <dd>
          <t>An AEBA role that receives AEBA Events from one or more Host
Runtimes, verifies signatures, deduplicates, and forwards to one or
more Analysers or SIEM systems.</t>
        </dd>
        <dt>Analyser:</dt>
        <dd>
          <t>An AEBA role that computes Baselines, applies Detection Rules, and
emits alerts.</t>
        </dd>
        <dt>Trust Registry:</dt>
        <dd>
          <t>An external authoritative endpoint that publishes and receives
revocation signals for Agent identities, as specified by a
referenced registry protocol.</t>
        </dd>
        <dt>Consumer:</dt>
        <dd>
          <t>A downstream recipient of AEBA alerts or raw events, typically a
Security Operations Centre, an incident-response workflow, or a
policy-enforcement engine.</t>
        </dd>
      </dl>
    </section>
    <section anchor="threat-model">
      <name>Threat Model</name>
      <t>This section enumerates the threats AEBA is designed to detect or
mitigate. Each threat is mapped to the AEBA mechanism addressing it.</t>
      <section anchor="in-scope-threats">
        <name>In-scope threats</name>
        <section anchor="t1-identity-compromise">
          <name>T1. Identity compromise</name>
          <t>An adversary obtains an Agent's signing key and emits actions
indistinguishable from the legitimate Agent.</t>
          <t>AEBA mitigation: Baseline deviation. A compromised identity performing
actions outside the legitimate Agent's behavioural envelope triggers
Deviation Signals. Revocation via the Trust Registry halts further
acceptance.</t>
        </section>
        <section anchor="T2">
          <name>T2. Insider-style Agent misbehaviour</name>
          <t>A legitimately deployed Agent, under the effect of prompt injection,
context poisoning, supply-chain-compromised dependency, or adversarial
orchestration, performs actions outside its intended scope.</t>
          <t>AEBA mitigation: Behavioural-layer signals (see
<xref target="deviation-signalling"/>) detect deviations from the Agent's own
baseline and from its peer-group baseline. Pattern-matching Detection
Rules map known attack chains to alert conditions.</t>
        </section>
        <section anchor="t3-supply-chain-compromise-causing-drift">
          <name>T3. Supply-chain compromise causing drift</name>
          <t>A legitimate Agent's dependencies, Skills, or underlying model are
replaced with malicious versions; Agent behaviour subsequently drifts.</t>
          <t>AEBA mitigation: Abrupt baseline shift not preceded by a signed
deployment event triggers Deviation Signal. Event schema requires
deployment-change events to be emitted and signed, enabling
distinction between legitimate change and unauthorised drift.</t>
        </section>
        <section anchor="t4-sybil-agents">
          <name>T4. Sybil agents</name>
          <t>An adversary creates multiple agent identities to evade per-identity
rate limits, spread malicious actions across identities, or forge
peer-group support.</t>
          <t>AEBA mitigation: Peer-Group membership requires cryptographic
attestation signed by an authority recognised by Consumers. Rapid
creation of many new Agent identities from a single keyholder triggers
Detection Rules.</t>
        </section>
        <section anchor="t5-event-forgery">
          <name>T5. Event forgery</name>
          <t>An adversary injects fake AEBA Events into a Collector in order to
mislead baseline computation or to pollute audit records.</t>
          <t>AEBA mitigation: All AEBA Events MUST be signed. Collectors MUST
verify signatures before forwarding. Unsigned or invalidly-signed
Events are rejected and themselves logged as a threat indicator.</t>
        </section>
        <section anchor="t6-event-suppression">
          <name>T6. Event suppression</name>
          <t>An adversary suppresses AEBA Events to hide malicious behaviour,
either at the Host Runtime, in transit, or at the Collector.</t>
          <t>AEBA mitigation: Sequential AEBA Events MUST include a monotonic
per-Agent sequence number and a hash reference to the previous signed
Event (the Agent Event Chain). Gaps, non-monotonic sequences, or
broken chain references trigger Detection Rules.</t>
        </section>
        <section anchor="t7-baseline-poisoning">
          <name>T7. Baseline poisoning</name>
          <t>An adversary gradually shifts an Agent's baseline through
low-deviation-per-event behaviour in order to render later malicious
behaviour indistinguishable from the new normal.</t>
          <t>AEBA mitigation: Baselines MUST retain a long-term reference distribution
distinct from the short-term rolling baseline. Significant divergence
between short-term and long-term baselines is itself a Detection Rule
signal. Peer-group comparison provides an independent reference
resistant to per-Agent poisoning.</t>
        </section>
        <section anchor="t8-peer-group-spoofing">
          <name>T8. Peer-group spoofing</name>
          <t>An Agent falsely claims membership in a trusted peer group to benefit
from the more permissive baseline of that group.</t>
          <t>AEBA mitigation: Peer-Group membership attestations MUST be signed by
a recognised authority, verified by Analysers, and revocable.</t>
        </section>
        <section anchor="t9-detection-evasion-via-context-window-manipulation">
          <name>T9. Detection evasion via context-window manipulation</name>
          <t>A compromised Agent observes or infers detection thresholds and crafts
behaviour to remain below them.</t>
          <t>AEBA mitigation: Detection Rules SHOULD incorporate randomised
sampling and non-deterministic threshold components to frustrate
modelling. Analysers MUST NOT publish detection thresholds to Agents.</t>
        </section>
        <section anchor="t10-cross-host-replay">
          <name>T10. Cross-host replay</name>
          <t>An adversary captures signed Events from Host Runtime A and replays
them into the Collector serving Host Runtime B.</t>
          <t>AEBA mitigation: AEBA Events MUST include Host Runtime identifier and
a nonce; Collectors MUST reject duplicates and mismatched host bindings.</t>
        </section>
        <section anchor="t11-time-skew-attacks">
          <name>T11. Time skew attacks</name>
          <t>An adversary manipulates timestamps to alter sequence interpretation
or to replay stale events.</t>
          <t>AEBA mitigation: Events MUST carry UTC timestamps; Analysers MUST
reject events outside a configurable freshness window (recommended:
+/-300 seconds) at ingestion, subject to explicit backfill procedure.</t>
        </section>
        <section anchor="t12-metadata-smuggling">
          <name>T12. Metadata smuggling</name>
          <t>An adversary uses Event metadata fields (labels, tags) to smuggle
encoded data (exfiltration channel).</t>
          <t>AEBA mitigation: Metadata fields MUST be subject to schema validation
and per-field length limits. Analysers SHOULD compute entropy
statistics over metadata fields and alert on outlier entropy.</t>
        </section>
        <section anchor="t13-delegation-chain-abuse">
          <name>T13. Delegation-chain abuse</name>
          <t>A parent Agent spawns a child Agent that performs actions the parent's
own policy would have denied.</t>
          <t>AEBA mitigation: Delegation events MUST be emitted and signed
(parent-signs-child). Child Agent capability scope MUST NOT exceed
parent Agent's scope; Analysers MUST enforce scope-inheritance limits
and alert on violations.</t>
        </section>
      </section>
      <section anchor="out-of-scope-threats">
        <name>Out-of-scope threats</name>
        <t>AEBA does not address:</t>
        <ul spacing="normal">
          <li>
            <t>Loss of confidentiality in Agent model internals (a model-protection
problem);</t>
          </li>
          <li>
            <t>Denial of service at the Host Runtime or Collector layer (handled by
conventional network and infrastructure controls);</t>
          </li>
          <li>
            <t>Physical-layer compromise of signing key storage (addressed by
hardware security module practice).</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="aeba-architecture">
      <name>AEBA Architecture</name>
      <t>The AEBA architecture comprises five roles.</t>
      <sourcecode type="artwork"><![CDATA[
       +---------+     +-----------+    +-----------+
       |  Agent  |---->| Host      |--->| Collector |
       +---------+     | Runtime   |    +-----------+
                       +-----------+          |
                                              v
                                       +-----------+
                                       | Analyser  |
                                       +-----------+
                                         |       |
                       +-----------------+       +-----------+
                       v                                     v
                 +----------------+              +-----------------+
                 | Trust Registry |              | SIEM / Consumer |
                 +----------------+              +-----------------+
]]></sourcecode>
      <t>Role descriptions:</t>
      <ol spacing="normal" type="1"><li>
          <t>The <strong>Agent</strong> performs actions. Its runtime-observable actions
produce AEBA Events.</t>
        </li>
        <li>
          <t>The <strong>Host Runtime</strong> observes Agent actions and emits signed AEBA
Events. It MAY perform this signing itself or it MAY forward
Agent-self-signed Events.</t>
        </li>
        <li>
          <t>The <strong>Collector</strong> receives Events from one or more Host Runtimes,
verifies signatures, deduplicates, and forwards.</t>
        </li>
        <li>
          <t>The <strong>Analyser</strong> computes Baselines, applies Detection Rules, and
emits alerts.</t>
        </li>
        <li>
          <t>The <strong>Trust Registry</strong> publishes revocation and peer-group
attestation signals; the Analyser consults the Registry when
evaluating identity binding.</t>
        </li>
      </ol>
      <t>Any AEBA implementation MAY combine these roles. The protocol defines
the contract between roles; it does not prescribe deployment topology.</t>
    </section>
    <section anchor="event-schema">
      <name>Event Schema</name>
      <t>An AEBA Event is a JSON object with the following mandatory fields and
an extensible set of optional type-specific fields.</t>
      <section anchor="mandatory-fields">
        <name>Mandatory fields</name>
        <ul spacing="normal">
          <li>
            <t><tt>aeba</tt>: (string) protocol version. Current value: <tt>"1.0"</tt>.</t>
          </li>
          <li>
            <t><tt>id</tt>: (string) UUID v4 uniquely identifying this Event.</t>
          </li>
          <li>
            <t><tt>agentId</tt>: (string) identifier of the Agent, matching the <tt>keyid</tt>
field in the signature envelope.</t>
          </li>
          <li>
            <t><tt>hostRuntimeId</tt>: (string) identifier of the Host Runtime from which
the Event originated.</t>
          </li>
          <li>
            <t><tt>ts</tt>: (integer) Event timestamp in seconds since Unix epoch (UTC).</t>
          </li>
          <li>
            <t><tt>seq</tt>: (integer) monotonically increasing per-Agent sequence number.</t>
          </li>
          <li>
            <t><tt>prevHash</tt>: (string) hex-encoded SHA-256 digest of the canonical
form of the previous Event emitted by this Agent, or 64 zeros for
the first Event.</t>
          </li>
          <li>
            <t><tt>type</tt>: (string) Event type, drawn from the registered AEBA Event
Type registry (see <xref target="iana-considerations"/>).</t>
          </li>
          <li>
            <t><tt>category</tt>: (string) one of <tt>"identity"</tt>, <tt>"tool"</tt>, <tt>"payment"</tt>,
<tt>"skill"</tt>, <tt>"delegation"</tt>, <tt>"deployment"</tt>, <tt>"compliance"</tt>,
<tt>"custom"</tt>.</t>
          </li>
          <li>
            <t><tt>payload</tt>: (object) type-specific fields.</t>
          </li>
        </ul>
      </section>
      <section anchor="envelope-fields">
        <name>Envelope fields</name>
        <t>The signed envelope wrapping the Event contains:</t>
        <ul spacing="normal">
          <li>
            <t><tt>alg</tt>: (string) signing algorithm identifier. Initial values:
<tt>"ES256"</tt> (mandatory-to-implement).</t>
          </li>
          <li>
            <t><tt>keyid</tt>: (string) identifier of the signing key.</t>
          </li>
          <li>
            <t><tt>sig</tt>: (string) base64-encoded signature over the canonical form
(see <xref target="signing-and-identity-binding"/>).</t>
          </li>
          <li>
            <t><tt>pubkeyHint</tt>: (string, optional) URL at which the verification key
may be retrieved.</t>
          </li>
        </ul>
      </section>
      <section anchor="example">
        <name>Example</name>
        <sourcecode type="json"><![CDATA[
{
  "aeba": "1.0",
  "id": "7c6e5b94-f8a1-4e9d-a3c2-b0d7f2e1c5a8",
  "agentId": "agent:acme-payments-01",
  "hostRuntimeId": "host:prod-us-east-cluster-7",
  "ts": 1744746000,
  "seq": 14823,
  "prevHash": "3f4a8b2c1d7e9f0a6b5c4d3e2f1a0b9c...",
  "type": "tool.call",
  "category": "tool",
  "payload": {
    "toolName": "agentpass_pay",
    "toolArgs": {
      "rail": "x402",
      "to": "merchant-hash:8a7f...",
      "amount": 2500,
      "currency": "USD"
    },
    "durationMs": 142,
    "outcome": "allowed"
  }
}
]]></sourcecode>
      </section>
      <section anchor="event-type-categories">
        <name>Event type categories</name>
        <t>Each AEBA Event MUST declare a category. Categories are:</t>
        <ul spacing="normal">
          <li>
            <t><tt>identity</tt> -- Agent identity events: keypair issuance, key rotation,
credential verification, delegation issuance.</t>
          </li>
          <li>
            <t><tt>tool</tt> -- Tool invocation events: tool call, tool response, tool
selection decision.</t>
          </li>
          <li>
            <t><tt>payment</tt> -- Payment-related events: payment initiated, payment
settled, sanctions check performed.</t>
          </li>
          <li>
            <t><tt>skill</tt> -- Skill events: skill loaded, skill verified, skill
rejected.</t>
          </li>
          <li>
            <t><tt>delegation</tt> -- Agent-to-agent events: child agent spawn, delegated
authority issued, delegated authority exercised.</t>
          </li>
          <li>
            <t><tt>deployment</tt> -- Runtime environment change events: code deployed,
dependency updated, model version change.</t>
          </li>
          <li>
            <t><tt>compliance</tt> -- External compliance signals: KYC completed, AML
check, regulatory report.</t>
          </li>
          <li>
            <t><tt>custom</tt> -- Implementation-specific events. Custom events MUST use
reverse-DNS-scoped type names to prevent collision.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="signing-and-identity-binding">
      <name>Signing and Identity Binding</name>
      <t>AEBA Events MUST be cryptographically signed. The signing scheme
reuses the canonical-signing-string construction of
<xref target="I-D.sharif-mcps-secure-mcp"/> and <xref target="I-D.sharif-agent-payment-trust"/>
to enable shared verification infrastructure.</t>
      <section anchor="canonical-form">
        <name>Canonical form</name>
        <t>The canonical form of an AEBA Event for signing is:</t>
        <artwork><![CDATA[
<ts> <seq> <agentId> <hostRuntimeId>
   <sha256-hex(canonical-json(event))>
]]></artwork>
        <t>Where <tt>canonical-json(event)</tt> is the JCS-canonicalised JSON form of
the Event object, and fields are joined by single space characters.</t>
      </section>
      <section anchor="signature-algorithms">
        <name>Signature algorithms</name>
        <t>The mandatory-to-implement algorithm is ECDSA P-256 with SHA-256
(JWA <tt>ES256</tt>) as defined in <xref target="RFC7518"/>. Implementations MAY support
additional algorithms consistent with existing agent-identity stacks
(for example, Ed25519).</t>
      </section>
      <section anchor="identity-binding">
        <name>Identity binding</name>
        <t>The <tt>keyid</tt> field in the signature envelope MUST equal the <tt>agentId</tt>
field in the Event body, or MUST be a designated signing key for that
Agent as registered with the applicable Trust Registry.</t>
        <t>Host Runtimes that sign Events on behalf of Agents (server-side
signing) MUST carry a <tt>signedBy</tt> field in the envelope distinguishing
the signing identity from the Agent identity, and MUST bind the Host
Runtime signing key to the Agent's declared Host Runtime via the
Trust Registry.</t>
      </section>
    </section>
    <section anchor="baseline-and-peer-group-model">
      <name>Baseline and Peer-Group Model</name>
      <section anchor="baselines">
        <name>Baselines</name>
        <t>A Baseline is a statistical model of normal behaviour for an Agent or
Peer Group over a given time window. AEBA defines two baseline classes:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Short-term baseline</strong>: rolling window (recommended: 24 hours).
Sensitive to recent behaviour; used for near-real-time anomaly
scoring.</t>
          </li>
          <li>
            <t><strong>Long-term baseline</strong>: reference window (recommended: 90 days).
Resistant to short-term drift; used for detecting baseline
poisoning (see <xref target="t7-baseline-poisoning"/>).</t>
          </li>
        </ul>
        <t>Implementations MUST maintain both classes and MUST compute deviation
against both.</t>
      </section>
      <section anchor="baseline-fields">
        <name>Baseline fields</name>
        <t>A minimal Baseline record comprises:</t>
        <ul spacing="normal">
          <li>
            <t><tt>eventRatePerMinute</tt>: distribution (mean, stddev, p50, p95, p99)</t>
          </li>
          <li>
            <t><tt>eventCategoryMix</tt>: distribution across categories</t>
          </li>
          <li>
            <t><tt>toolDiversity</tt>: distinct tools invoked per unit time</t>
          </li>
          <li>
            <t><tt>costPerTask</tt>: distribution of token / compute cost per logical task</t>
          </li>
          <li>
            <t><tt>paymentRecipientConcentration</tt>: Herfindahl index or equivalent</t>
          </li>
          <li>
            <t><tt>peerGroupMembership</tt>: attested group(s)</t>
          </li>
          <li>
            <t><tt>operationalSchedule</tt>: if applicable (distributions by
hour-of-day, day-of-week)</t>
          </li>
        </ul>
        <t>Implementations MAY extend this set; extensions MUST use reverse-DNS
scoping.</t>
      </section>
      <section anchor="peer-group-model">
        <name>Peer-group model</name>
        <t>A Peer Group is a named set of Agent identities plus an authority
attestation signed by a recognised Peer-Group authority. The
attestation MUST specify:</t>
        <ul spacing="normal">
          <li>
            <t><tt>peerGroupId</tt>: stable identifier</t>
          </li>
          <li>
            <t><tt>purpose</tt>: human-readable group purpose</t>
          </li>
          <li>
            <t><tt>members</tt>: list of <tt>agentId</tt> values in the group</t>
          </li>
          <li>
            <t><tt>issuedBy</tt>: identifier of attesting authority</t>
          </li>
          <li>
            <t><tt>validFrom</tt> / <tt>validUntil</tt>: validity window</t>
          </li>
          <li>
            <t><tt>attestation</tt>: signature by the authority</t>
          </li>
        </ul>
        <t>Peer-Group authorities are trust anchors; their identity and
authorisation MUST be established out of band (typically by the Trust
Registry operator).</t>
      </section>
      <section anchor="baseline-exchange">
        <name>Baseline exchange</name>
        <t>Baselines MAY be exchanged between Host Runtimes and Analysers so
that an Agent deployed in multiple environments carries its
behavioural history with it. Baseline-exchange messages MUST be
signed by the emitting party, MUST include a validity window, and MUST
reference the constituent Agent or Peer Group identifiers.</t>
      </section>
    </section>
    <section anchor="deviation-signalling">
      <name>Deviation Signalling</name>
      <t>For each incoming Event, the Analyser computes a deviation score
bounded in <tt>[0.0, 1.0]</tt> where 0.0 denotes behaviour identical to
baseline and 1.0 denotes maximal deviation observed during the
baseline window.</t>
      <section anchor="per-event-score">
        <name>Per-event score</name>
        <t>The per-event deviation score is a weighted composite over:</t>
        <ul spacing="normal">
          <li>
            <t>Event rate component (current rate vs baseline distribution)</t>
          </li>
          <li>
            <t>Category-mix component (divergence of current category from
expected)</t>
          </li>
          <li>
            <t>Tool-choice component (likelihood of tool selection under baseline)</t>
          </li>
          <li>
            <t>Peer-group component (agreement of Event with peer baseline)</t>
          </li>
        </ul>
        <t>The weighting is implementation-defined; implementations SHOULD
document the weighting and MUST publish it to Consumers for audit.</t>
      </section>
      <section anchor="sequence-score">
        <name>Sequence score</name>
        <t>Sequences of Events are scored collectively against Detection Rules
(see below). Sequence scores are not bounded to <tt>[0.0, 1.0]</tt>; they
are Rule-defined alert conditions.</t>
      </section>
      <section anchor="signalling-format">
        <name>Signalling format</name>
        <t>Deviation and alert signals are themselves AEBA Events with
category <tt>"custom"</tt> and reverse-DNS type names such as
<tt>com.example.aeba.alert</tt>. They are signed by the Analyser and
forwarded to Consumers.</t>
      </section>
    </section>
    <section anchor="detection-rules-and-kill-chain-patterns">
      <name>Detection Rules and Kill-Chain Patterns</name>
      <t>Detection Rules are declarative specifications of known malicious
patterns. A Detection Rule comprises:</t>
      <ul spacing="normal">
        <li>
          <t><tt>ruleId</tt>: stable identifier (reverse-DNS scoped)</t>
        </li>
        <li>
          <t><tt>description</tt>: human-readable description</t>
        </li>
        <li>
          <t><tt>scope</tt>: applicable Agent categories or peer groups</t>
        </li>
        <li>
          <t><tt>pattern</tt>: pattern specification (event sequence, rate, divergence)</t>
        </li>
        <li>
          <t><tt>severity</tt>: <tt>"low" | "medium" | "high" | "critical"</tt></t>
        </li>
        <li>
          <t><tt>action</tt>: recommended Consumer action on match</t>
        </li>
      </ul>
      <section anchor="mandatory-rule-categories">
        <name>Mandatory rule categories</name>
        <t>Implementations MUST support at least the following rule categories:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Identity-layer</strong>: signature failures, concurrent-keyid detection,
rotation-frequency anomalies.</t>
          </li>
          <li>
            <t><strong>Behavioural-layer</strong>: event-rate spike, tool-diversity spike,
category-mix shift.</t>
          </li>
          <li>
            <t><strong>Economic-layer</strong>: payment-velocity anomaly, rail-mix shift,
recipient-concentration spike, failed-payment rate.</t>
          </li>
          <li>
            <t><strong>Relational-layer</strong>: delegation-depth anomaly, sub-agent spawn
rate, cross-framework interaction.</t>
          </li>
          <li>
            <t><strong>Compliance-layer</strong>: sanctions-match rate, KYC-failure rate, trust
score degradation.</t>
          </li>
        </ul>
      </section>
      <section anchor="rule-interchange">
        <name>Rule interchange</name>
        <t>Detection Rules are exchanged between parties as signed JSON
documents. The interchange format is defined in
<xref target="rule-interchange-format"/>.</t>
      </section>
    </section>
    <section anchor="revocation-protocol">
      <name>Revocation Protocol</name>
      <t>When an Agent is confirmed as misbehaving, the applicable Trust
Registry MUST issue a revocation signal. AEBA revocation signals
MUST:</t>
      <ul spacing="normal">
        <li>
          <t>be signed by the Trust Registry authority;</t>
        </li>
        <li>
          <t>name the revoked Agent <tt>keyid</tt>;</t>
        </li>
        <li>
          <t>specify revocation scope: <tt>"all_events"</tt>, <tt>"future_events_only"</tt>,
or <tt>"specific_type:&lt;type&gt;"</tt>;</t>
        </li>
        <li>
          <t>specify effective time (<tt>revokedFrom</tt>);</t>
        </li>
        <li>
          <t>specify reason (<tt>"key_compromise"</tt>, <tt>"malicious_behaviour"</tt>,
<tt>"policy_violation"</tt>, <tt>"retired"</tt>).</t>
        </li>
      </ul>
      <t>Consumers MUST check revocation state for each Agent either at
Event-ingestion time (strict) or at alert-evaluation time (lazy).
Implementations SHOULD maintain a local cache with a maximum
freshness of 24 hours for high-criticality flows and 7 days
otherwise.</t>
      <t>Revocation cascades follow delegation chains: revocation of a parent
Agent <tt>keyid</tt> MUST cause implicit revocation of all descendants.</t>
    </section>
    <section anchor="federation-and-cross-host-exchange">
      <name>Federation and Cross-Host Exchange</name>
      <t>AEBA supports federated deployments in which Agents move between
Host Runtimes operated by different organisations (for example, a
Skill published centrally and invoked locally). Federation SHALL use:</t>
      <ul spacing="normal">
        <li>
          <t>cross-host baseline exchange as defined above;</t>
        </li>
        <li>
          <t>Trust Registry references resolvable via HTTPS;</t>
        </li>
        <li>
          <t>mutual attestation between federating Host Runtimes.</t>
        </li>
      </ul>
      <t>Federated Consumers SHOULD NOT rely on unsigned baseline imports.</t>
    </section>
    <section anchor="interoperability-bindings">
      <name>Interoperability Bindings</name>
      <section anchor="syslog-rfc-5424">
        <name>Syslog (RFC 5424)</name>
        <t>AEBA Events MAY be emitted as Syslog <xref target="RFC5424"/> messages. The
APP-NAME MUST be <tt>"aeba"</tt>. Structured data MUST include the
AEBA Event JSON as a single SD-ELEMENT:</t>
        <artwork><![CDATA[
<14>1 2026-04-15T08:00:00Z host.example aeba - AEBA
  [aeba@99999 event="<base64-canonical-json>"
   sig="<base64-signature>"] AEBA event
]]></artwork>
      </section>
      <section anchor="cef-common-event-format">
        <name>CEF (Common Event Format)</name>
        <t>AEBA Events MAY be emitted as CEF records with:</t>
        <ul spacing="normal">
          <li>
            <t><tt>Device Vendor</tt>: <tt>"AEBA"</tt></t>
          </li>
          <li>
            <t><tt>Device Product</tt>: implementation name</t>
          </li>
          <li>
            <t><tt>Device Version</tt>: protocol version (<tt>"1.0"</tt>)</t>
          </li>
          <li>
            <t><tt>Signature ID</tt>: AEBA Event <tt>type</tt></t>
          </li>
          <li>
            <t><tt>Name</tt>: human-readable Event description</t>
          </li>
          <li>
            <t><tt>Severity</tt>: mapped from deviation score (0-10)</t>
          </li>
        </ul>
        <t>Structured AEBA fields MUST be carried in CEF extension fields using
reverse-DNS naming.</t>
      </section>
      <section anchor="leef-log-event-extended-format">
        <name>LEEF (Log Event Extended Format)</name>
        <t>AEBA Events MAY be emitted as LEEF records following the same field
conventions as CEF.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>AEBA is itself a security-critical protocol. The following considerations
apply.</t>
      <section anchor="signing-is-mandatory">
        <name>Signing is mandatory</name>
        <t>All AEBA Events MUST be signed. Unsigned events compromise the entire
analytical model and MUST be rejected at ingestion.</t>
      </section>
      <section anchor="freshness-and-replay">
        <name>Freshness and replay</name>
        <t>Events MUST include a timestamp and sequence number. Analysers MUST
reject events outside a freshness window (recommended: +/-300 seconds)
and MUST reject replayed <tt>prevHash</tt> sequences.</t>
      </section>
      <section anchor="key-management">
        <name>Key management</name>
        <t>Agent signing keys MUST be stored in accordance with host platform
best practice (hardware security module, enclave, OS keystore).
Loss of a signing key MUST trigger revocation.</t>
      </section>
      <section anchor="baseline-integrity">
        <name>Baseline integrity</name>
        <t>Baselines are themselves security-critical artifacts. Exchange between
parties MUST be signed. Long-term baselines MUST be preserved through
key rotation and custodial transitions.</t>
      </section>
      <section anchor="detection-evasion">
        <name>Detection evasion</name>
        <t>Implementations MUST NOT publish detection thresholds or rule
weightings to unauthenticated parties. Detection Rule interchange
MUST be between trusted parties.</t>
      </section>
      <section anchor="supply-chain-threats">
        <name>Supply-chain threats</name>
        <t>AEBA cannot detect Agent behaviour that is permanently within
baseline but intrinsically malicious. AEBA is a complement to, not a
replacement for, pre-deployment supply-chain verification (Skill
signing, model attestation, dependency verification).</t>
      </section>
      <section anchor="abuse-of-aeba-data">
        <name>Abuse of AEBA data</name>
        <t>AEBA Events describing Agent actions may reveal sensitive information
about the Agent's operator, the Agent's users, or downstream systems.
Access to AEBA data MUST itself be access-controlled and auditable.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>AEBA Events can contain personally identifiable information (PII) and
confidential business data, including customer identities, payment
recipients, document contents, and authentication artifacts.
Implementations MUST:</t>
      <ul spacing="normal">
        <li>
          <t>minimise PII in Event payloads, preferring hashed or tokenised
identifiers where correlation is sufficient;</t>
        </li>
        <li>
          <t>apply encryption at rest to AEBA stores;</t>
        </li>
        <li>
          <t>implement retention policies consistent with applicable regulation
(for example, GDPR Article 5(1)(e), CCPA, UK Data Protection Act);</t>
        </li>
        <li>
          <t>support the right of erasure (where legally required) by
cryptographic redaction of AEBA stores, recognising that signed
chain integrity may be partially lost on erasure.</t>
        </li>
      </ul>
      <t>Baselines themselves are subject to privacy analysis. A Baseline may
reveal aggregate user behaviour patterns and SHOULD be treated as
confidential.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests IANA to establish two new registries.</t>
      <section anchor="aeba-event-type-registry">
        <name>AEBA Event Type Registry</name>
        <t>A registry named "AEBA Event Types" with the following columns:</t>
        <ul spacing="normal">
          <li>
            <t><tt>type</tt>: the event type string (e.g., <tt>"tool.call"</tt>, <tt>"payment.initiated"</tt>)</t>
          </li>
          <li>
            <t><tt>category</tt>: one of the defined categories</t>
          </li>
          <li>
            <t><tt>description</tt>: human-readable description</t>
          </li>
          <li>
            <t><tt>reference</tt>: defining document</t>
          </li>
        </ul>
        <t>Registration policy: Specification Required for the reserved
categories; First Come First Served for reverse-DNS-scoped custom
types.</t>
        <t>Initial entries corresponding to the categories defined in
<xref target="event-schema"/>.</t>
      </section>
      <section anchor="aeba-signing-algorithm-registry">
        <name>AEBA Signing Algorithm Registry</name>
        <t>A registry named "AEBA Signing Algorithms" listing acceptable <tt>alg</tt>
values. Initial entries:</t>
        <ul spacing="normal">
          <li>
            <t><tt>ES256</tt> -- ECDSA P-256 with SHA-256 (from <xref target="RFC7518"/>, mandatory)</t>
          </li>
          <li>
            <t><tt>EdDSA</tt> -- Edwards-curve Digital Signature Algorithm (optional)</t>
          </li>
        </ul>
      </section>
      <section anchor="rule-interchange-format">
        <name>Rule Interchange Format</name>
        <t>IANA is requested to register a media type
<tt>application/aeba-rule+json</tt> for the Detection Rule interchange
format defined in this document.</t>
      </section>
    </section>
    <section anchor="references">
      <name>References</name>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC5424" target="https://www.rfc-editor.org/info/rfc5424" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5424.xml">
          <front>
            <title>The Syslog Protocol</title>
            <author fullname="R. Gerhards" initials="R." surname="Gerhards"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document describes the syslog protocol, which is used to convey event notification messages. This protocol utilizes a layered architecture, which allows the use of any number of transport protocols for transmission of syslog messages. It also provides a message format that allows vendor-specific extensions to be provided in a structured way.</t>
              <t>This document has been written with the original design goals for traditional syslog in mind. The need for a new layered specification has arisen because standardization efforts for reliable and secure syslog extensions suffer from the lack of a Standards-Track and transport-independent RFC. Without this document, each other standard needs to define its own syslog packet format and transport mechanism, which over time will introduce subtle compatibility issues. This document tries to provide a foundation that syslog extensions can build on. This layered architecture approach also provides a solid basis that allows code to be written once for each syslog feature rather than once for each transport. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5424"/>
          <seriesInfo name="DOI" value="10.17487/RFC5424"/>
        </reference>
        <reference anchor="RFC7518" target="https://www.rfc-editor.org/info/rfc7518" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7518.xml">
          <front>
            <title>JSON Web Algorithms (JWA)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This specification registers cryptographic algorithms and identifiers to be used with the JSON Web Signature (JWS), JSON Web Encryption (JWE), and JSON Web Key (JWK) specifications. It defines several IANA registries for these identifiers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7518"/>
          <seriesInfo name="DOI" value="10.17487/RFC7518"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9421" target="https://www.rfc-editor.org/info/rfc9421" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9421.xml">
          <front>
            <title>HTTP Message Signatures</title>
            <author fullname="A. Backman" initials="A." role="editor" surname="Backman"/>
            <author fullname="J. Richer" initials="J." role="editor" surname="Richer"/>
            <author fullname="M. Sporny" initials="M." surname="Sporny"/>
            <date month="February" year="2024"/>
            <abstract>
              <t>This document describes a mechanism for creating, encoding, and verifying digital signatures or message authentication codes over components of an HTTP message. This mechanism supports use cases where the full HTTP message may not be known to the signer and where the message may be transformed (e.g., by intermediaries) before reaching the verifier. This document also describes a means for requesting that a signature be applied to a subsequent HTTP message in an ongoing HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9421"/>
          <seriesInfo name="DOI" value="10.17487/RFC9421"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="UEBA-Gartner">
          <front>
            <title>Market Guide for User and Entity Behavior Analytics</title>
            <author>
              <organization>Gartner</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="CEF">
          <front>
            <title>Common Event Format</title>
            <author>
              <organization>Micro Focus ArcSight</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="LEEF">
          <front>
            <title>Log Event Extended Format (LEEF)</title>
            <author>
              <organization>IBM QRadar</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="MITRE-ATTACK">
          <front>
            <title>MITRE ATT&amp;CK Framework</title>
            <author>
              <organization>MITRE Corporation</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="OWASP-AST10">
          <front>
            <title>OWASP Agentic Skills Top 10</title>
            <author>
              <organization>OWASP Foundation</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="OWASP-MCP10">
          <front>
            <title>OWASP MCP Top 10</title>
            <author>
              <organization>OWASP Foundation</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.sharif-mcps-secure-mcp" target="https://datatracker.ietf.org/doc/html/draft-sharif-mcps-secure-mcp-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.sharif-mcps-secure-mcp.xml">
          <front>
            <title>MCPS: Cryptographic Security Layer for the Model Context Protocol</title>
            <author fullname="Raza Sharif" initials="R." surname="Sharif">
              <organization>CyberSecAI Ltd</organization>
            </author>
            <date day="14" month="March" year="2026"/>
            <abstract>
              <t>This document specifies MCPS (MCP Secure), a cryptographic security layer for the Model Context Protocol (MCP). MCPS adds agent identity verification, per-message signing, tool definition integrity, and replay protection to MCP communications without modifying the core protocol. MCPS operates as an envelope around existing JSON-RPC messages. It introduces four primitives: (1) Agent Passports for cryptographic identity bound to a specific origin, (2) signed message envelopes for integrity and non-repudiation, (3) tool definition signatures covering the full tool object for detecting poisoning and tampering, and (4) nonce-plus-timestamp replay protection with transcript binding to prevent downgrade attacks. The design is fully backward-compatible. MCPS-unaware clients and servers continue to function normally. MCPS-aware endpoints progressively negotiate security capabilities through trust levels L0 (no verification) through L4 (full mutual authentication with revocation checking). All cryptographic operations use ECDSA P-256 (NIST FIPS 186-5). Signatures use IEEE P1363 fixed-length r||s encoding per RFC 7518 Section 3.4 with low-S normalization to prevent signature malleability. Canonical serialization uses JSON Canonicalization Scheme (JCS) per RFC 8785. The Trust Authority component is self-hostable with no external service dependency.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-sharif-mcps-secure-mcp-00"/>
        </reference>
        <reference anchor="I-D.sharif-agent-payment-trust" target="https://datatracker.ietf.org/doc/html/draft-sharif-agent-payment-trust-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.sharif-agent-payment-trust.xml">
          <front>
            <title>Trust Scoring and Identity Verification for Autonomous AI Agent Payment Transactions</title>
            <author fullname="Raza Sharif" initials="R." surname="Sharif">
              <organization>CyberSecAI Ltd</organization>
            </author>
            <date day="25" month="March" year="2026"/>
            <abstract>
              <t>This document specifies a protocol for trust scoring, identity verification, and spend limit enforcement for autonomous AI agents that initiate financial transactions. As AI agents gain the capability to make payments via protocols such as the Machine Payments Protocol (MPP), a standardised mechanism is needed to verify agent identity, assess trustworthiness, and enforce financial limits based on behavioural history. The protocol defines a five-dimension trust scoring model, per- agent cryptographic identity using ECDSA P-256 key pairs, challenge-response identity verification, spend limit tiers derived from trust scores, anomaly detection for financial behaviour, and a public trust query API for third-party platforms. This specification complements draft-sharif-mcps-secure-mcp, which provides message-level cryptographic security for the Model Context Protocol (MCP). Together, the two specifications address protocol security (MCPS) and financial trust (this document) for the AI agent economy.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-sharif-agent-payment-trust-00"/>
        </reference>
        <reference anchor="I-D.sharif-agent-audit-trail" target="https://datatracker.ietf.org/doc/html/draft-sharif-agent-audit-trail-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.sharif-agent-audit-trail.xml">
          <front>
            <title>Agent Audit Trail: A Standard Logging Format for Autonomous AI Systems</title>
            <author fullname="Raza Sharif" initials="R." surname="Sharif">
              <organization>CyberSecAI Ltd</organization>
            </author>
            <date day="29" month="March" year="2026"/>
            <abstract>
              <t>This document specifies a standard logging format for autonomous AI agent systems. The Agent Audit Trail (AAT) defines a JSON-based record structure with mandatory fields for agent identity, action classification, outcome tracking, and trust level reporting. Records are linked via tamper-evident hash chaining using SHA-256 per RFC 8785, with optional ECDSA signatures for non-repudiation. The format addresses requirements from the EU AI Act (Regulation 2024/1689), which mandates automatic recording of events for high-risk AI systems effective August 2026. It also maps to SOC 2 Trust Services Criteria, ISO/IEC 42001, and PCI DSS v4.0.1 logging requirements. The design is transport-agnostic and supports export to JSONL, Syslog (RFC 5424), and CSV while preserving chain integrity. Privacy is addressed through input/output hashing and tombstone- based deletion compatible with GDPR Article 17.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-sharif-agent-audit-trail-00"/>
        </reference>
        <reference anchor="I-D.sharif-agent-identity-framework" target="https://datatracker.ietf.org/doc/html/draft-sharif-agent-identity-framework-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.sharif-agent-identity-framework.xml">
          <front>
            <title>Agent Identity Framework: Trust and Identity for Autonomous AI Agents</title>
            <author fullname="Raza Sharif" initials="R." surname="Sharif">
              <organization>CyberSecAI Ltd</organization>
            </author>
            <date day="6" month="April" year="2026"/>
            <abstract>
              <t>Autonomous artificial intelligence (AI) agents are increasingly performing actions that were previously the exclusive domain of authenticated human users: initiating financial transactions, querying regulated data, invoking external tools, and coordinating with other agents. Internet protocols designed for human-operated clients lack primitives to answer three fundamental questions about any autonomous action: which agent performed it, whether the agent was authorized to perform it, and whether the resulting evidence is independently verifiable. This document defines a framework for agent identity and trust enforcement on the Internet. It enumerates the gaps between current Internet standards and the requirements of autonomous agent systems, introduces a five-layer model (identity, authorization, attestation, evidence, trust) that separates concerns that are currently conflated, and outlines mechanisms to close specific gaps. The framework is intended to guide future Standards Track work and to provide a common vocabulary for researchers, implementers, and regulators. This document is informational. It does not define a wire protocol. It references existing Internet-Drafts and specifications that instantiate individual mechanisms within the framework.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-sharif-agent-identity-framework-00"/>
        </reference>
        <reference anchor="I-D.sharif-attp-agent-trust-transport" target="https://datatracker.ietf.org/doc/html/draft-sharif-attp-agent-trust-transport-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.sharif-attp-agent-trust-transport.xml">
          <front>
            <title>ATTP: Agent Trust Transport Protocol for Secure Agent-to-Server Communication</title>
            <author fullname="Raza Sharif" initials="R." surname="Sharif">
              <organization>CyberSecAI Ltd</organization>
            </author>
            <date day="30" month="March" year="2026"/>
            <abstract>
              <t>This document specifies ATTP (Agent Trust Transport Protocol), a synchronous request-response protocol for communication between autonomous AI agents and web API servers. ATTP operates as an application-layer protocol over HTTP, adding mandatory cryptographic identity verification, per-message signing, trust-gated access control, and tamper-evident audit trail generation to every agent-server interaction. ATTP defines five protocol-layer headers for requests (X-Agent-Trust, X-Agent-Signature, X-Agent-Nonce, X-Agent-Timestamp, X-ATTP-Version) and three for responses (X-Server-Signature, X-Server-Nonce, X-Server-Timestamp) that carry an Agent Passport (JWT-based identity credential), ECDSA P-256 digital signatures, cryptographic nonces, and timestamps. Server middleware verifies all cryptographic properties before application code executes. ATTP has no insecure mode. Every request MUST carry a valid Agent Passport. Every request body MUST be signed. Every response body MUST be signed. Every interaction MUST be recorded in a hash-chained audit trail. The protocol defines a URL scheme (attp://) and is fully backward-compatible with existing HTTP infrastructure. ATTP is the synchronous counterpart to the Agent Transport Protocol (ATP). ATP handles asynchronous store-and-forward agent delivery; ATTP handles real-time request-response API communication. Both share the same identity model, trust framework, and cryptographic primitives.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-sharif-attp-agent-trust-transport-00"/>
        </reference>
      </references>
    </references>
    <?line 797?>

<section anchor="worked-example-detecting-prompt-injection-driven-drift">
      <name>Worked Example: Detecting Prompt-Injection-Driven Drift</name>
      <t>This appendix illustrates AEBA in action against an attack described
in <xref target="T2"/> (Insider-style Agent misbehaviour).</t>
      <t>Scenario: An e-commerce Agent's baseline shows it calls <tt>payment.pay</tt>
with <tt>rail=stripe</tt> 95% of the time, <tt>currency=USD</tt> 90% of the time,
with <tt>amount</tt> distributed log-normally around $40. Average event
rate: 8 per minute over business hours.</t>
      <t>Adversary injects a prompt that causes the Agent to attempt a
<tt>rail=x402</tt> payment to a newly-observed recipient, <tt>amount=$5000</tt>,
repeatedly over 30 seconds.</t>
      <t>AEBA detection:</t>
      <ol spacing="normal" type="1"><li>
          <t>Per-event deviation score: the <tt>rail</tt> choice is a 5% rail with
probability weight 0.05, producing high component score.</t>
        </li>
        <li>
          <t>Recipient concentration: recipient is new to the agent; Herfindahl
shift component adds further weight.</t>
        </li>
        <li>
          <t>Event rate: 15 events in 30 seconds (30/min) vs baseline 8/min
triggers rate rule.</t>
        </li>
        <li>
          <t>Category-mix: normal mix has <tt>payment</tt> = 40%; this burst is
<tt>payment</tt> = 100%; mix-shift rule triggers.</t>
        </li>
        <li>
          <t>Composite sequence score exceeds alerting threshold; Analyser
emits alert of severity <tt>"high"</tt> with recommended action
<tt>"suspend_agent"</tt>.</t>
        </li>
      </ol>
    </section>
    <section anchor="worked-example-detecting-payment-rail-shift-attack">
      <name>Worked Example: Detecting Payment Rail Shift Attack</name>
      <t>[Illustration omitted for brevity; pattern follows that of the
previous appendix but focused on Economic-layer detection.]</t>
    </section>
    <section anchor="baseline-aggregation-canonical-form">
      <name>Baseline Aggregation Canonical Form</name>
      <t>[Specification of the canonical form for Baseline records, ensuring
deterministic hashing and inter-party agreement. Omitted for the -00
draft.]</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
