0% found this document useful (0 votes)
175 views4 pages

Ieee Cyber Security Using Ai

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
175 views4 pages

Ieee Cyber Security Using Ai

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Proceedings of the Third International Conference on Computing Methodologies and Communication (ICCMC 2019)

IEEE Xplore Part Number: CFP19K25-ART; ISBN: 978-1-5386-7808-4

Providing Cyber Security using Artificial


Intelligence – A survey
Sagar B.S Niranjan S
Department of Computer Science and Engineering Department of Computer Science and Engineering
Vidyavardhaka College of Engineering Vidyavardhaka College of Engineering
Mysore, India Mysore, India
[email protected] m [email protected] m

Nithin Kashyap Sachin D.N


Department of Computer Science and Engineering Department of Computer Science and Engineering
Vidyavardhaka College of Engineering Vidyavardhaka College of Engineering
Mysore, India Mysore, India
[email protected] [email protected]

Abstract – Artificial intelligence is really a kind of computerized at deviations that could mean that there has been a hack or
version of human intelligence. The way artificial intelligence intrusion. And then there is a third one which uses a technique
works is like learning iteratively again and again, just like called probabilistic programming. This is a set of computer
humans. In this generation, the threat of landscape is languages that do not write a computer program with
unquestionably evolving. The cyber attackers are entirely focused
on financial rewards. But the department has found a new way to deterministic rules but can distribute probabilities and there is
prevent attacks before they occur, as the old traditional way can some very interesting research in analytics to actually do a
no longer be relied upon. This paper introduces the need for the whole genealogy of malware so that we can track the history
development of cybersecurity skills and how artificial intelligence of these infectious viruses to inform future responses.
can be implied to improve skills through the use of artificial
neural networks and machine learning algorithms. Neural networks and deep learning algorithms can process a
lot of data quickly and discern features of all s orts of things,
Keywords – Artificial Intelligence, Cybercrime, Cyber-attacks, whether the images or texts on the internet and use these
Cyber Security.
features to decide whether or not the data is malicious. Using
I. INT RODUCT ION past data, they can learn and never make mistakes again. It is
complex and difficult for humans to interpret neural networks.
Artificial Intelligence (AI) is now at the center of the The output is not concrete. Therefore, the traditional security
cybersecurity industry. AI is a term that is relatively over these solution is declining. The use of AI in cybersecurity increases
days, but it actually refers to a few techniques that can be very speed and scalability [2].
valuable for security. It consists of machine learning
algorithms that can identify and respond to threats as they
occur. They can predict whether incoming data are potentially II. RELAT ED W ORK
malicious or safe. Many attacks that happen in these days are
not new. In fact, these attacks have happened to some other Harini and Dharani [3] have proposed a system using the
people in some other places before. Thus, if we establish a
techniques Neural Nets, Expert Systems, and Intelligent
database that collects all the information that has ever
occurred and feeds it to machine algorithms, attacks can be Agents. Expert systems mainly work on 2 parts based on the
prevented before they occur [1]. knowledge and engine that uses inference. Neural Nets works
similar to neurons in the brain, this technique identifies
In classification one, we can look at the features of the data to malicious codes that could cause malware installation in the
decide whether or not it is malicious. Other techniques involve user's system, Intelligent Agents uses sensors and actuators
detecting anomalies in the processing of data quickly in real that prevent DDOS attack.
time, so that incoming data is treated as a stream that collects
every single point and then uses an algorithm that can track Swapnil Ramesh Kumbar [4] has proposed a system that uses
what standard of behavior that appears to be normal and looks fuzzy system techniques, pattern recognition, image

978-1-5386-7808-4/19/$31.00 ©2019 IEEE 717


Proceedings of the Third International Conference on Computing Methodologies and Communication (ICCMC 2019)
IEEE Xplore Part Number: CFP19K25-ART; ISBN: 978-1-5386-7808-4

processing, and data mining techniques. Phishing and fake system addresses ubiquitous cyber threats and the role of
auctioning can be prevented with Data Mining. Pattern hackers and users.
matching uses fingerprinting, facial recognition, voice
recognition as security, image processing is mainly used in Enn Tygu [9] has proposed a system that uses applications
defense and military, fuzzy logic is mainly used when based on neural networks and techniques used in cyber
malware invasion takes place. defense. In this system, the constraint solving technique is
used to find solutions to the constraints of the given problem
Mohana K.V et al. [5] have proposed a system that uses data solution. The neural network is not suitable for all areas.
security, the Chaotic Neural Network and the use of genetic Therefore, an application can be used as a defense method
algorithms for data security. Random numbers are generated where the neural network is not efficient.
using a Generic Algorithm and passed as a parameter used in
the processing of the neural network. After processing the L.N Wijesinghe et al. [10] have proposed a system that uses
neural network, a key is produced that is used for encryption. technologies to detect disruption and intelligence agents. IDS
If we reverse the above process decryption takes place. It is technology is the best technology used to detect cybercrimes.
not easy to decrypt the data. Instruction Prevention systems detect cyber-attacks and alert
users.
Selma Dilek et al. [6] have proposed a system that uses
artificial immune systems, ontology, general intelligence. The Arockia Panimalar.S et al. [11] have proposed a system that
air-based email system is used for spam encounter. The uses technologies such as Export Systems and technologies
ontology represents knowledge and general intelligence uses that deliver optimal performance. These technologies provide
strong AIs. the best mobility feature and quickly detect DDOS attacks.

Alberto Perez Veiga [7] has proposed a system that uses Anna L. Buczak [12] has proposed a system that uses cyber
analytics technology and cybersecurity algorithms. It provides
machine learning technology. Although AI is not used as
a review of the DM and ML methods used for cyber.
expected in the field of cybersecurity, machine learning is
However, there are unique problems that make DM and ML
successfully used to solve small parts of the complex difficult to use.
problems.

Ranjeev Mittu et al. [8] have proposed a system that uses


technologies to detect advanced persistence threats. The

III. COMPARISON OF DIFFERENT CYBERSECURIT Y IN AI


Table. 1 Comparison of different techniques used in cybersecurity for AI
Ref.
SL.NO Approach Methods Result Advantages
No
Survey and analyzing
different methods for Expert Systems, Neural Improving security with Increase accuracy and
1. improving Networks, Intelligent the use of Artificial efficiency of Intrusion #3
cybersecurity with the Agents Intelligence Detection
use of AI
Artificial neural networks,
Overview of different Increasing the Can adapt to different
Image processing, data
techniques in AI that performance of security situations, help with
2. mining, fuzzy system, #4
can be implemented in systems using different decision making,
expert system, pattern
cybersecurity AI techniques accurate and quick
recognition
Encryption and
An artificial neural Ensures optimal security
Using a genetic Decryption of original
network, Chaotic neural when compared to open
3 algorithm for data by using chaotic #5
networks, encryption, channels
optimization problems neural networks and
decryption, security.
genetic algorithms
Study and demonstrate The artificial immune Techniques used in Non- linearity, mobility,
4 different AI methods system, Intelligent Agents, applications to combat dynamic structure, #6
for combating cyber Fuzzy sets, Genetic cybercrime resilience, versatility

978-1-5386-7808-4/19/$31.00 ©2019 IEEE 718


Proceedings of the Third International Conference on Computing Methodologies and Communication (ICCMC 2019)
IEEE Xplore Part Number: CFP19K25-ART; ISBN: 978-1-5386-7808-4

attacks algorithms
Provides usage of AI in
Usage of ML in
network security and Real-time effective
Artificial Intelligence with cybersecurity provides
5 informs about the protection again #7
Machine learning reactive real-time
evolution of cybercrime
security
cybersecurity
Advance persistence AI application are
Engineering approaches
threats are difficult to present which can detect
6. to mitigate cyber threats Artificial Intelligence #8
detect so using of AI and continue future
using AI
becomes necessary threats
Provides a survey of Development in AI
Application based on
Artificial Intelligence Neural nets, Expert applications will help
7. neural networks are used #9
methods used in cyber system, Intelligent agents decrease cyber threats in
in cyber defense
defense the world
Introducing in an Tracing the attacker and
Intrusion detection and Provides information
advance cybercrime responding to the source
prevention system, about the cybercrimes
8. defense system can be done in the most #10
Artificial agents, and advances made using
involving Artificial efficient way using
Intelligence agent AI with a security system
Intelligence agents Artificial Intelligence
Artificial intelligence
systems with human
Usage of Artificial
assistance in the form of Better decision support,
Intelligence Expert systems, Neural
9. training to provide better DOS detection, #11
implemented in nets, Intelligent agents
optimal performance in and good mobility
cybersecurity
detecting and controlling
cyber attacks
Provides a brief survey of
Algorithms for
Machine learning in usage of machine
Cyber analytics, machine improving performance,
10. data mining methods learning and data mining #12
learning, data mining complexity, and
for better security techniques in
accuracy is provided.
cybersecurity.

IV. DISCUSSION VI. FUTURE SCOPE


AI is a field of study designed to model and simulate human Social engineering is making use of humans to get access to
intelligence and behavior. We use several technologies such a system by manipulating human behavior. Therefore, in a
as expert systems, intelligent agents, etc. to secure our security environment, the human mind is the weakest link
networks more efficiently and accurately. The advantages of which an attacker can exploit easily. So to avoid this we
using these technologies are better decision support, good make use of artificial intelligence to make our systems more
mobility and better accuracy, which in turn lead to improved secure and efficient. We can make use of expert systems,
performance. neural networks etc. to increase security in the systems. A
good AI system can make use of the existing attack logs and
V. CONCLUSION hence predict the nature of future attacks and therefore will
be able to prevent it. In the future it is possible to reach the
Safeguarding data is the main objective of data security. level of security which will be very hard for hackers to
Attackers who use AI for cyber-attacks are now a threat to intrude.
society. AI alerts people before hackers attack their private
data and some AI technologies try to safeguard user data
ACKNOWLEDGM ENT
using certain algorithms. Although AI plays an important
role in data security, it has some disadvantages. It is The authors express gratitude towards the assistance
necessary to update the technologies according to the latest provided by Accendere knowledge management services
requirements. Since AI is still developing, it could become a
Pvt. ltd. in preparing the manuscripts. we also thank our
boon or a curse in the field of cybersecurity. This paper uses
mentors and faculty members who guided us throughout the
expert systems, neural networks and intelligent agents as
techniques. Since AI uses machine learning, deep learning research and helped us in achieving desired results.
etc. it needs continuous human interactions and training.

978-1-5386-7808-4/19/$31.00 ©2019 IEEE 719


Proceedings of the Third International Conference on Computing Methodologies and Communication (ICCMC 2019)
IEEE Xplore Part Number: CFP19K25-ART; ISBN: 978-1-5386-7808-4

REFERENCES

1. AI and security -
https://www.youtube.com/watch?v=ojTz7bOjT6o&t=87s
2. How M L and AI will increase cyber security (a webinar)-
https://www.youtube.com/watch?v=lO2Cf5BmjvI
3. Harini M Rajan, Dharani S “Artificial Intelligence in Cyber
Security-An Investigation” Int. Res. J. Comput. Sci. Issue,
vol. 09, no. 4, pp. 28–30, 2017.
4. Swapnil Ramesh Kumbar “An Overview on Use of Artificial
Intelligence Techniques in Effective Security M anagement,”
Int. J. Innov. Res. Comput. Commun. Eng. (An ISO, vol. 2, no.
9, pp. 5893–5898, 2014.
5. M ohana,K.V.K. Venugopal, Sathwik H.N. “Data Security
using Genetic Algorithm and Artificial Neural Network,” Int.
J. Sci. Eng. Res., vol. 5, no. 2, pp. 543–548, 2014.
6. Selma Dilek, Huseyin Cakir and M ustafa Aydin
“Applications of Artificial Intelligence Techniques to
Combating Cyber Crimes: A Review,” Int. J. Artif. Intell.
Appl., vol. 6, no. 1, pp. 21–39, 2015.
7. Alberto Perez Veiga “Application of Artificial Intelligence
(AI) to Network Security” ITEC 625 – Information Systems
Infrastructure, 2018.
8. Ranjeev M ittu & Willliam F. Lawless, “Human Factors in
Cybersecurity and the Role for AI,” in Foundations of
Autonomy and Its (Cyber) Threats: From Individuals to
Interdependence: Papers from the 2015 AAAI Spring
Symposium, 2015, pp. 39–43.
9. Enn Tyugu “Artificial Intelligence in Cyber Defense”2011 3 rd
International Conference on Cyber Conflict.
10. L.S.Wijesinghe,L.N.B De Silva, G.T.A.Abhayaratne,
P.Krithika, S.M .D.R. Priyaashan, Dhishan Dhammeratchi
“Combating Cyber Crime Using Artificial Agent Systems,”
Int. J. Sci. Res. Publ., vol. 6, no. 4, pp. 265–271, 2016.
11. Arockia Panimalar.S, Giri Pai.U, Salman Khan.K, “Artificial
Intelligence Techniques for Cyber Security ,” Int. Res. J. Eng.
Technol., vol. 5, no. 3, pp. 122–124, 2018.
12. Anna L. Buczk, Erhen Guven, “A Survey of Data M ining and
M achine Learning M ethods for Cyber Security Intrusion
Detection,” IEEE Commun. Surv. Tutorials, vol. 18, no. 2, pp.
1153–1176, 2016.

978-1-5386-7808-4/19/$31.00 ©2019 IEEE 720

You might also like