Cyber Security Using AI
Cyber Security Using AI
Abstract:
Technology Growth brings up security challenges with lack of knowledge in latest
development to the experts of cyber security. To prevent security breaches and cyber-attacks,
experts needs a huge support, as connection between organisations leads to “Heavy traffic”,
“Breaches in Security”, “Increase in Security attack vectors”, whichbeing a challenging task
for humans to handle. Traditional Algorithm fails to us sometimes with developed systems.
Developing a software with auto updating logic with technology leads a tough task. Artificial
Intelligence is an area to neutralize the cyber security issues to some extent.“Cyber security
computing applications and analyses the views of improving the cyber security abilities by
suggesting AI applications and the already existing methods”. This paper involves in coping
up the cyber security with applications and techniques of Artificial Intelligence.
Keywords: Cyber Security, Artificial Intelligence, Expert Systems, Neural Nets, Intelligence
Agent.
I. Introduction:
Security involves in many ways such as “security of information”, “security of documents”
and “security of property”. Applications of modern techniques makes Security Stronger.
From Government Infrastructure to Internet banking our world is under networked
Technology. Thus Protection of Data is Essential.Globally Increasing Threads of Cyber
Security leads to an Implementation of Artificial Intelligence in Security systems. As the
world is running on digital data, AI and machine learning Applications are been used in every
field, which gives a security challenge to Experts. A solution from “Internet threats”,
“Identify types of malware”, “Ensure practical security standards”, and “Help create better
prevention and recovery strategies” is Artificial Intelligence.
AI and Machine Learning are interlinked with data science which brings down the curve of
managing data from peak gradually simultaneously security for this data is mandatory. This
Research comes up with contribution of AI Applications and Techniques in cybersecurity and
Involves Identifying Important areas of Artificial Intelligence that can be used in Cyber
Security and role played by Expert systems, Machine Learning, Deep learning, Data mining
in Improving Cyber security. An Analytical Approach based on the previous critical
Theoretical literature.
332
Turkish Journal of Computer and Mathematics Education Vol.12 No.14 (2021), 332 – 339
Research Article
Expert Systems applications in cyber security: Expert systems are tools or software packages
of Artificial Intelligence which help in providing knowledge required to a customer or
another software package. A knowledge which required with the surrounded knowledge by an
expert help are embedded in this system [3].
333
Turkish Journal of Computer and Mathematics Education Vol.12 No.14 (2021), 332 – 339
Research Article
334
Turkish Journal of Computer and Mathematics Education Vol.12 No.14 (2021), 332 – 339
Research Article
The explanation behind this is the existence of a large number of large with unbalanced data
sets, the lack of time needed to conduct manual categorization, and specific features in fields
such as semantic categorization which increase the distance between technological
competence and mathematical modelling [4].
Focus was put on the effectiveness and significant drawbacks of computer-based technologies
that prevent the direct implementation of cybersecurity of machine learning approaches.
Data Mining Applications in Cybersecurity: “Data mining is the search for significant
patterns and trends in large database”. The technique of data mining helps to collect useful
knowledge and identify hidden patterns from a large number of datasets that cannot be
discovered through computational approaches. It is a large research field that involves
“machine learning, databases, analytics, expert systems, visualisation, high-performance
computation, rough sets, neural networks, and representation of information”. A host that
335
Turkish Journal of Computer and Mathematics Education Vol.12 No.14 (2021), 332 – 339
Research Article
gathers data in different ways (e.g., “clustering, grouping, relation analysis, description,
regression models, and sequence analysis”)[6] supports data mining.
The Inference Engine is a framework for automated reasoning. It assesses the current state of
the knowledge base, applies the applicable rules to it, then claims new knowledge [7].
Neural Nets: Deep learning is known as Neural Nets. “It is an advanced AI branch. It is
inspired by the human brain's functions and work. There are many neurons in our brain,
which are mainly general purpose and domain independent. Any data form can be learned. In
1957, an artificial neuron (Perceptron) was developed by Frank Rosenblatt, paving the way
for neural networks. By combining with other nerves, i.e., perceptron, these perceptions will
learn and resolve absorbing problems. Perceptron learns to recognise the individual they are
focused on by learning and analysing high-level raw data on their own, as our brain uses the
signals of our sensory organ to learn on its own from the raw data”.
336
Turkish Journal of Computer and Mathematics Education Vol.12 No.14 (2021), 332 – 339
Research Article
When we extend this deep (trained) learning to computer protection, without human
intervention, the machine can identify whether a file is malicious or legitimate. Compared to
classical machine learning methods, this approach yields a good outcome in the identification
of malicious attacks [8].
Intelligent Agents:“The Intelligent Agent (IA) is an autonomous body that detects motion by
sensors and uses actuators (i.e. it is an agent) to track an environment and directs its operation
towards achieving goals”. Intelligent agents can also study or use a knowledge base to
achieve their goals. They may be incredibly simplistic or very complex. For example, “a
reflex mechanism, a thermostat, is an intelligent agent. It has behaviours like understanding
the language of agent interaction, pro-activity and reactivity. They can adapt to real time,
easily learn new information through contact with the world, and have standard retrieval and
recovery skills focused on memory”.
337
Turkish Journal of Computer and Mathematics Education Vol.12 No.14 (2021), 332 – 339
Research Article
In the showdown against Distributed Denial of Service (DDoS) attacks, intelligent agents are
developed. If there is some legal or business issue, creating a "Cyber Police" should be
manageable. The Cyber Police should have intelligent mobile officers [9].
V. Advantages of AI Techniques:
We may use AI for cyber defence in a number of ways. In the future, we will have the
cleverest systems than such processes. Indeed, attackerscan use Artificial Intelligence for
attacks as well. It is clear that the recent developments in knowledge comprehension outlines
and coping up with what is advanced in machine learning would enhance the digital security
capability of the systems that can be used. The description of the various approaches dealt in
this paper appears in the diagram below.
338
Turkish Journal of Computer and Mathematics Education Vol.12 No.14 (2021), 332 – 339
Research Article
Conclusion:
Current Scenario reveals increasing developments incyber-attacks and malware, an Intelligent
Protection Infrastructure is required.differently in comparison to current cyber protection
technologies, Artificial Intelligence approaches are resilient and agile, resulting in Improved
security implementation and stronger safety against a growing range of sophisticated
cyberthreats. Given the sharp shift that Artificial Intelligence has made to the field of cyber
security, similar devices are not completely equipped to respond to change in their situation.
While having several benefits, using AI procedures in cyber defence, Artificial Intelligence is
not only protection panacea. At a moment when human enemy with an unmistakable
circumvention target is targeting intelligent defence, the system would collapse. This does not
mean that we can-not use Artificial Intelligence techniques, but rather that we should
understand its limits and use them properly. Artificial Intelligence needs continuous training
and human collaboration. Aside the threat-analysts, this Artificial Intelligence approach to
cyber defence has proved to operate effectively.
Reference:
1. Kamtam, A., Kamar, A., & Patkar, U. C. (2016). Artificial Intelligence approaches in
Cyber Security. International Journal on Recent and Innovation Trends in Computing
and Communication, 4(4), 05-09.
2. Intelligence, S. (2019). IBM QRadar Security Intelligence. [online] Ibm.com.
Available at: https://www.ibm.com/security/security-intelligence/qradar [Accessed 6
Dec. 2019].
3. Pandey, M. (2018). Artificial Intelligence in Cyber Security. On Emerging Trends In
Information Technology (NCETIT’2018) with the theme-‘The Changing Landscape
Of Cyber Security: Challenges, 66
4. Anagnostopoulos, C. (2018). Weakly Supervised Learning: How to Engineer Labels
for Machine Learning in Cyber- Security. Data Science for Cyber-security, 3, 195.
5. Apruzzese, G., Colajanni, M., Ferretti, L., Guido, A., & Marchetti, M. (2018, May).
On the effectiveness of machine and deep learning for cybersecurity. In 2018 10th
International Conference on Cyber Conflict (CyCon) (pp. 371-390). IEEE.
6. Katoua, H. S. (2013). Exploiting the Data Mining Methodology for Cyber Security.
Egyptian Computer Science Journal, 37(6).
7. TF. Lunt, R. Jagannathan. A Prototype Real-Time Intrusion-Detection Expert
System.Proc.
8. B. Iftikhar, A. S. Alghamdi, “Application of artificial neural network within the
detection of dos attacks”, 2009.
9. P. Norvig, S. Russell. “Artificial Intelligence: fashionable Approach”, 2000.
339