Research Methodology in Computing & Technology: Artificial Intelligence To Detect and Secure Security Threats
Research Methodology in Computing & Technology: Artificial Intelligence To Detect and Secure Security Threats
Research Methodology in Computing & Technology: Artificial Intelligence To Detect and Secure Security Threats
TECHNOLOGY
CT098-3-2-RMCT
TP Number : TP053594
2. Research Background. 3
3. Problem Statement 4
5. Research Questions. 5
7. Methodology. 6
9. Conclusion. 6
10. References.11
11. Appendices. 11
Research background
Several goals are developed in order to The Research questions are as follows:
achieve the research goal.To evaluate -
current literature on the use of Artificial
Intelligence to overcome cybercrime. 1. What is the best way to overcome
such attacks with AI?
● To learn about the skills and
opportunities that Artificial 2. What strategies are available for
Intelligence offers. updating traditional algorithms and
● Because of its adaptability and implementing AI?
learning abilities, Artificial
Intelligence can be used to create 3. Can AI enhance security and reduce
an intelligent system. cyberattacks further?
● To understand how attackers use
Artificial Intelligence for The following objectives are set with the
malicious purposes. intention of answering the questions
● To investigate how threats such raised above.
as malware behave.
● Finally, support a system that can 1. To learn about the possibilities of
detect and prevent security Artificial Intelligence and how it can be
threats with a high detection rate, used.
as well as respond to attacks 2. To select cutting-edge Artificial
quickly and effectively based on Intelligence strategies that can examine
the severity of the attack. and respond quickly, as well as assist
people involved in cybercrime.
Research questions
Problem statement
Research questions are derived from
two research problems which are: A minimum of 1,000,000 computer
systems are affected each year as a
1. With the ever-growing utilization of IT result of [7] computer virus attacks.
and cyber infrastructure they're at risk of These attacks are estimated to be worth
attacks. billions of dollars each year. This could
be due to the use of traditional
programming algorithms in structures Artificial intelligence's power is
that have been described as ineffective increasing exponentially. As Artificial
in preventing cybercrime via [3]. Intelligence becomes more powerful, we
According to [8], with the ever-increasing will use it in the field of cyber-security to
use of the Internet, network, and cyber detect security threats such as malware,
infrastructure, they are vulnerable to etc. [1] compiles a number of definitions
attacks, so there is a need for intelligent of Artificial Intelligence from notable
systems to help defend against cyber- authors. According to one author, it is
attacks, and because everything these the science of automating intelligent
days is interconnected, viruses can behaviours. According to the other
spread rapidly. As a result, intelligent author, it is intelligent machines that can
systems are required to combat cyber- self-learn, reason, and communicate.
assaults, which could prevent or And, according to the third author
mitigate an attack quickly and efficiently mentioned by [1], it is far defined as
without the need for human demonstrated intelligence that can be
involvement. used to solve complex problems.
Based on the definitions above, we can
This is supported by [2], which states conclude that artificial intelligence
that due to the increase in cyber-crime refers to intelligent systems that can
activities, human intervention is no self-master and make real-time
longer sufficient. decisions.
Malware and viruses that have been
released recently have a mechanism
that allows them to self-regulate and Applications to protect a company's
change their signature in order to avoid cyber infrastructure can be developed
detection. As a result, it's far stated in using the most recent artificial
this research that it's far critical to intelligence technologies.Cyber
examine and study the execution of infrastructures, according to [2,] are
those malware, as well as classify them. extremely vulnerable to threats. As a
This can lead to a greater understanding result, the advancements made thus far
of how such threats operate with the in the use of artificial intelligence
assistance of Artificial Intelligence. techniques to combat cybercrime are
discussed. Such strategies are capable
of detecting and preventing cyber-
attacks. The article also discusses
various methods of computing
Literature Review
intelligence, such as machine learning,
data analysis, artificial neural networks,
As organisations and businesses grow
pattern processing, and so on. Because
in size, there are new ways to deal with
of the increase in cyber activity and the
security that are becoming popular.
large amount of data used, [2] claims by using [4], because the authors state
that human intervention or any physical that it is difficult to develop/create any
device is insufficient for analyzing and software programme with traditional
responding to an attack.This claim is algorithms to defend against attacks.
supported by similar research
conducted by others; [3] and [4] also As a result, there may be a need for
claim that physical devices and human revolutionary artificial intelligence
intervention are no longer effective in strategies that can examine and
protecting the Information Technology respond to cybercrime instantly.
infrastructure due to the increase in
cyber-crime interest. In addition, [3] investigates the
application of artificial intelligence
As a result, numerous studies are being possibilities such as artificial neural
conducted in order to implement networks, deep learning, computational
intelligent systems. [5] is a follow-up to intelligence, machine learning, pattern
ENISA's research (European Network recognition, and so on. Whereas [4]
and Information Security Agency). The proposes a novel approach, such as an
findings had been on fundamental artificial intelligence-powered system
characteristics; certainly considered one capable of learning and assisting
of those to combine artificial intelligence humans in cybercrime.
techniques and technology to neutralize Another study [10] proposes a
cyber-attacks. framework for implementing machine
The corporation explained two research learning algorithms that can
conclusions: one concluded the successfully differentiate between
combination of artificial intelligence with malware and secure files.
cyber threat intelligence, which also Traditional defense systems, according
includes attack pattern recognition and to [9], use signature-based techniques
knowledge discovery. The other study that are incapable of detecting malware.
concluded the development of security To address this limitation, the authors
models using cyber intelligence to propose a malware analysis technique
evaluate the efficiency and performance that can help in the analysis of
of security controls. The research data malicious code in malware as well as
can be used to combine the two trends the understanding of its risks and true
and create a system with an algorithm intentions.
that can detect attacks. This review discusses all of the current
issues in the information technology
Conventional programming algorithms, infrastructure, as well as proposed
as stated with the help of [3], are solutions. Several studies have
ineffective in combating cybercrime. demonstrated artificial intelligence's
This assertion can indeed be supported potential and capabilities in assisting us
in defending against cyber-attacks. of strategies or algorithms can be used
Artificial intelligence assists in to update traditional algorithms?
addressing these issues due to its This study will use a descriptive
intelligent nature and flexibility. approach to answer the questions
Simultaneously, in order to improve raised above.
prevention and mitigation efforts, we This technique is used because this
must understand the malicious use of research describes cutting-edge issues
artificial intelligence. in security as well as trends in artificial
intelligence. The goal is to familiarize
the subject and benefit from a higher
level of expertise in the subject. This
research would necessitate the
collection of primary and secondary
data in order to achieve the research
objectives. The primary statistics
METHODOLOGY gathered will be directly related to the
purpose of this research, whereas
For this research, quantitative survey secondary data is second-hand
study will be used to determine the information gathered from other
possible solutions needed for the two sources and is unrelated to the purpose
research questions Quantitative of this research. Questionnaires
research establishes good sized distributed to enterprise companies and
conclusions about a populace through subject-matter experts may be used to
reading the facts collected [11].By collect primary data.To collect primary
utilising this method, it will be possible data from questionnaires, a random
to collect statistics on what types of sampling method may be chosen. This
strategies can be used to combat such sampling method allows for the
attacks. There are existing systems for collection of records from a subset of
such attacks that use standard the population with a pattern length of
programming algorithms that are known 200 to 300. A questionnaire designed to
to be ineffective, which leads to the collect data can include both closed-
other research question of what ended and open-ended questions.
techniques can be used to replace Closed-ended questions have a limited
conventional programming algorithms. set of alternatives, whereas open-ended
This survey method will use a sample of questions must be answered
300 people to gather data in order to descriptively. Having only closed-ended
assist in studying the strategies that are questions may result in biases, so it is
currently available in the field of Artificial recommended that open-ended
Intelligence. Following that, what kinds questions be included as well. The
questionnaire will include questions
about Artificial Intelligence trends and prevent Security threats.Currently, many
how traditional algorithms can be detection systems rely on malware
improved.After at least 150 responses signatures that are stored in a database.
have been received, the data collected This has been proven ineffective
will be processed, analyzed and because malware is capable of self-
documented. modifying and changing their signature
in order to avoid detection. As a result,
this study proposes an intelligent
machine that does not rely on
Data Analysis signatures and employs Artificial
Intelligence strategies to detect and
Several tools are used to interpret and prevent all types of threats while
present the facts derived from the maintaining a high detection rate. This
collected data. The research responses system should be able to self-learn in
can be presented using Microsoft Excel order to comprehend how threats such
to provide an overview of the responses. as malware execute and behave. The
Microsoft Excel was chosen because it machine must be capable of making
could be used for statistical analysis. rational decisions in a timely and
Excel has a number of tools that can be effective manner in response to an
used to collect descriptive data, attack.In the event of an incident, the
including data analysis ToolPak and system can protect you from dangerous
Pivot Tables. Pivot tables can be used to threats and keep them from causing
prepare data collection and create data further harm. The proposed system can
summaries. Excel also includes protect networks while also increasing
graphical representations of data, such security and removing security threats.
as pie charts, which can be used to
show the percentage of responses. Conclusion
Following the analysis of the data, final As stated in the research, the
conclusions and statements can be development of Artificial Intelligence
made and documented in docx. opens the door to a plethora of
opportunities that can be combined to
detect and prevent threats. Furthermore,
the findings conclude that information
technology is growing and evolving,
which causes problems such as an
Overview of the proposed system
increase in cyber-crime activities. In
summary, the study discusses the use
This research specializes in developing
of Artificial Intelligence strategies, their
an intelligent system using Artificial
scope for destiny work, and how they
Intelligence to hit upon/detect and
can be used to avoid large losses.
[5] R. Trifonov, S. Manolov, R.
Yoshinov, G. Tsochev, and G.
Pavlova, "Artificial
Intelligence Methods for Cyber
Threats Intelligence," vol. 2,
2017, pp. 129–135.
Methodology Flowchart