Ieee Cyber Security Using Ai
Ieee Cyber Security Using Ai
Abstract – Artificial intelligence is really a kind of computerized at deviations that could mean that there has been a hack or
version of human intelligence. The way artificial intelligence intrusion. And then there is a third one which uses a technique
works is like learning iteratively again and again, just like called probabilistic programming. This is a set of computer
humans. In this generation, the threat of landscape is languages that do not write a computer program with
unquestionably evolving. The cyber attackers are entirely focused
on financial rewards. But the department has found a new way to deterministic rules but can distribute probabilities and there is
prevent attacks before they occur, as the old traditional way can some very interesting research in analytics to actually do a
no longer be relied upon. This paper introduces the need for the whole genealogy of malware so that we can track the history
development of cybersecurity skills and how artificial intelligence of these infectious viruses to inform future responses.
can be implied to improve skills through the use of artificial
neural networks and machine learning algorithms. Neural networks and deep learning algorithms can process a
lot of data quickly and discern features of all s orts of things,
Keywords – Artificial Intelligence, Cybercrime, Cyber-attacks, whether the images or texts on the internet and use these
Cyber Security.
features to decide whether or not the data is malicious. Using
I. INT RODUCT ION past data, they can learn and never make mistakes again. It is
complex and difficult for humans to interpret neural networks.
Artificial Intelligence (AI) is now at the center of the The output is not concrete. Therefore, the traditional security
cybersecurity industry. AI is a term that is relatively over these solution is declining. The use of AI in cybersecurity increases
days, but it actually refers to a few techniques that can be very speed and scalability [2].
valuable for security. It consists of machine learning
algorithms that can identify and respond to threats as they
occur. They can predict whether incoming data are potentially II. RELAT ED W ORK
malicious or safe. Many attacks that happen in these days are
not new. In fact, these attacks have happened to some other Harini and Dharani [3] have proposed a system using the
people in some other places before. Thus, if we establish a
techniques Neural Nets, Expert Systems, and Intelligent
database that collects all the information that has ever
occurred and feeds it to machine algorithms, attacks can be Agents. Expert systems mainly work on 2 parts based on the
prevented before they occur [1]. knowledge and engine that uses inference. Neural Nets works
similar to neurons in the brain, this technique identifies
In classification one, we can look at the features of the data to malicious codes that could cause malware installation in the
decide whether or not it is malicious. Other techniques involve user's system, Intelligent Agents uses sensors and actuators
detecting anomalies in the processing of data quickly in real that prevent DDOS attack.
time, so that incoming data is treated as a stream that collects
every single point and then uses an algorithm that can track Swapnil Ramesh Kumbar [4] has proposed a system that uses
what standard of behavior that appears to be normal and looks fuzzy system techniques, pattern recognition, image
processing, and data mining techniques. Phishing and fake system addresses ubiquitous cyber threats and the role of
auctioning can be prevented with Data Mining. Pattern hackers and users.
matching uses fingerprinting, facial recognition, voice
recognition as security, image processing is mainly used in Enn Tygu [9] has proposed a system that uses applications
defense and military, fuzzy logic is mainly used when based on neural networks and techniques used in cyber
malware invasion takes place. defense. In this system, the constraint solving technique is
used to find solutions to the constraints of the given problem
Mohana K.V et al. [5] have proposed a system that uses data solution. The neural network is not suitable for all areas.
security, the Chaotic Neural Network and the use of genetic Therefore, an application can be used as a defense method
algorithms for data security. Random numbers are generated where the neural network is not efficient.
using a Generic Algorithm and passed as a parameter used in
the processing of the neural network. After processing the L.N Wijesinghe et al. [10] have proposed a system that uses
neural network, a key is produced that is used for encryption. technologies to detect disruption and intelligence agents. IDS
If we reverse the above process decryption takes place. It is technology is the best technology used to detect cybercrimes.
not easy to decrypt the data. Instruction Prevention systems detect cyber-attacks and alert
users.
Selma Dilek et al. [6] have proposed a system that uses
artificial immune systems, ontology, general intelligence. The Arockia Panimalar.S et al. [11] have proposed a system that
air-based email system is used for spam encounter. The uses technologies such as Export Systems and technologies
ontology represents knowledge and general intelligence uses that deliver optimal performance. These technologies provide
strong AIs. the best mobility feature and quickly detect DDOS attacks.
Alberto Perez Veiga [7] has proposed a system that uses Anna L. Buczak [12] has proposed a system that uses cyber
analytics technology and cybersecurity algorithms. It provides
machine learning technology. Although AI is not used as
a review of the DM and ML methods used for cyber.
expected in the field of cybersecurity, machine learning is
However, there are unique problems that make DM and ML
successfully used to solve small parts of the complex difficult to use.
problems.
attacks algorithms
Provides usage of AI in
Usage of ML in
network security and Real-time effective
Artificial Intelligence with cybersecurity provides
5 informs about the protection again #7
Machine learning reactive real-time
evolution of cybercrime
security
cybersecurity
Advance persistence AI application are
Engineering approaches
threats are difficult to present which can detect
6. to mitigate cyber threats Artificial Intelligence #8
detect so using of AI and continue future
using AI
becomes necessary threats
Provides a survey of Development in AI
Application based on
Artificial Intelligence Neural nets, Expert applications will help
7. neural networks are used #9
methods used in cyber system, Intelligent agents decrease cyber threats in
in cyber defense
defense the world
Introducing in an Tracing the attacker and
Intrusion detection and Provides information
advance cybercrime responding to the source
prevention system, about the cybercrimes
8. defense system can be done in the most #10
Artificial agents, and advances made using
involving Artificial efficient way using
Intelligence agent AI with a security system
Intelligence agents Artificial Intelligence
Artificial intelligence
systems with human
Usage of Artificial
assistance in the form of Better decision support,
Intelligence Expert systems, Neural
9. training to provide better DOS detection, #11
implemented in nets, Intelligent agents
optimal performance in and good mobility
cybersecurity
detecting and controlling
cyber attacks
Provides a brief survey of
Algorithms for
Machine learning in usage of machine
Cyber analytics, machine improving performance,
10. data mining methods learning and data mining #12
learning, data mining complexity, and
for better security techniques in
accuracy is provided.
cybersecurity.
REFERENCES
1. AI and security -
https://www.youtube.com/watch?v=ojTz7bOjT6o&t=87s
2. How M L and AI will increase cyber security (a webinar)-
https://www.youtube.com/watch?v=lO2Cf5BmjvI
3. Harini M Rajan, Dharani S “Artificial Intelligence in Cyber
Security-An Investigation” Int. Res. J. Comput. Sci. Issue,
vol. 09, no. 4, pp. 28–30, 2017.
4. Swapnil Ramesh Kumbar “An Overview on Use of Artificial
Intelligence Techniques in Effective Security M anagement,”
Int. J. Innov. Res. Comput. Commun. Eng. (An ISO, vol. 2, no.
9, pp. 5893–5898, 2014.
5. M ohana,K.V.K. Venugopal, Sathwik H.N. “Data Security
using Genetic Algorithm and Artificial Neural Network,” Int.
J. Sci. Eng. Res., vol. 5, no. 2, pp. 543–548, 2014.
6. Selma Dilek, Huseyin Cakir and M ustafa Aydin
“Applications of Artificial Intelligence Techniques to
Combating Cyber Crimes: A Review,” Int. J. Artif. Intell.
Appl., vol. 6, no. 1, pp. 21–39, 2015.
7. Alberto Perez Veiga “Application of Artificial Intelligence
(AI) to Network Security” ITEC 625 – Information Systems
Infrastructure, 2018.
8. Ranjeev M ittu & Willliam F. Lawless, “Human Factors in
Cybersecurity and the Role for AI,” in Foundations of
Autonomy and Its (Cyber) Threats: From Individuals to
Interdependence: Papers from the 2015 AAAI Spring
Symposium, 2015, pp. 39–43.
9. Enn Tyugu “Artificial Intelligence in Cyber Defense”2011 3 rd
International Conference on Cyber Conflict.
10. L.S.Wijesinghe,L.N.B De Silva, G.T.A.Abhayaratne,
P.Krithika, S.M .D.R. Priyaashan, Dhishan Dhammeratchi
“Combating Cyber Crime Using Artificial Agent Systems,”
Int. J. Sci. Res. Publ., vol. 6, no. 4, pp. 265–271, 2016.
11. Arockia Panimalar.S, Giri Pai.U, Salman Khan.K, “Artificial
Intelligence Techniques for Cyber Security ,” Int. Res. J. Eng.
Technol., vol. 5, no. 3, pp. 122–124, 2018.
12. Anna L. Buczk, Erhen Guven, “A Survey of Data M ining and
M achine Learning M ethods for Cyber Security Intrusion
Detection,” IEEE Commun. Surv. Tutorials, vol. 18, no. 2, pp.
1153–1176, 2016.