A Survey on Artificial Intelligence Techniques to Prevent Cyber Crime

Author(s):  
Juveriya Afreen

Abstract-- With increase in complexity of data, security, it is difficult for the individuals to prevent the offence. Thus, by using any automation or software it’s not possible by only using huge fixed algorithms to overcome this. Thus, we need to look for something which is robust and feasible enough. Hence AI plays an epitome role to defense such violations. In this paper we basically look how human reasoning along with AI can be applied to uplift cyber security.

Author(s):  
Merve Yildirim

Due to its nature, cyber security is one of the fields that can benefit most from the techniques of artificial intelligence (AI). Under normal circumstances, it is difficult to write software to defend against cyber-attacks that are constantly developing and strengthening in network systems. By applying artificial intelligence techniques, software that can detect attacks and take precautions can be developed. In cases where traditional security systems are inadequate and slow, security applications developed with artificial intelligence techniques can provide better security against many complex cyber threats. Apart from being a good solution for cyber security problems, it also brings usage problems, legal risks, and concerns. This study focuses on how AI can help solve cyber security issues while discussing artificial intelligence threats and risks. This study also aims to present several AI-based techniques and to explain what these techniques can provide to solve problems in the field of cyber security.


Author(s):  
S.V Manikanthan ◽  
T Padmapriya ◽  
Azham Hussain ◽  
E Thamizharasi

<p>Nowadays, Artificial Intelligence is being integrated into the modern innovations, including mobile, Electronic gadgets and as well as our daily lives. The smartphones are becoming a crucial and indistinguishable part of modern life. Whether that be in terms of speech, prototype, efficiency, features, quality and so forth, together all system requirements are provided in one machine. Researchers and innovations analysts are making advances in mobile computing with the excellent technologies. While Artificial Intelligence as a commercial product has been directly accessible. In this, both corporations and violent offenders take benefit of emerging technologies and advances. Cyber-security specialists and authorities have predicted there have been high possibilities of cyber-attacks. There's really, besides that, a need to improve quite advanced and powerful data security processes and software to protect all fraudulent activities and threats. The objective of this study is to introduce latest developments of implementing Methodologies to mobile computing, to prove how such techniques could become an efficient resource for data security and protocols, and to provide scope for future research.</p>


Author(s):  
Shanqi Pang ◽  
Yongmei Li

Considering the enhancement in technology, criminals have been using cyberspace in order to commit many crimes. Therefore, it should be noted that cybercrimes are exposed to a number of threats and intrusions if not safeguarded well. Human and physical intervention tend not to be very adequate for the protection and tracking of such infrastructure, that is why there should be the establishment of multifaceted cyber defense networks, which are flexible, robust, and adjustable in order sense a massive collection of invasion and creation of real-time choices. Nevertheless, significant number of bio-related computing techniques of AI (artificial intelligence) tend to be increasing hence a significant role is played in detecting and preventing cybercrime. The main aim of this paper is outlining the actual advancement that have been made possible due to the application of AI methods for the fight against cybercrimes, in order to reveal how the methods are efficient in sensing and preventing cyber invasions, also providing a brief overview of the future works.


Aim: The aim of the researcher was to determine the effectiveness of artificial intelligence techniques against cyber security risks particularly in case of Saudi Arabia Method: Researcher has opted for quantitative method of research design along with primary data. The researcher collected the data from employees working in this I.T industry of Saudi Arabia. The sample size for this study was 468 and confirmatory factor analysis, discriminant validity, basic analysis of model and lastly, hypothesis assessment was carried out. Findings: The P-values of all variables were obtained as significant apart from expert system which had no significant relation with artificial intelligence and cyber security. Limitations: Geographical area, sample size, less variables and accessibility was the main issue.


AI Magazine ◽  
2019 ◽  
Vol 40 (3) ◽  
pp. 67-78
Author(s):  
Guy Barash ◽  
Mauricio Castillo-Effen ◽  
Niyati Chhaya ◽  
Peter Clark ◽  
Huáscar Espinoza ◽  
...  

The workshop program of the Association for the Advancement of Artificial Intelligence’s 33rd Conference on Artificial Intelligence (AAAI-19) was held in Honolulu, Hawaii, on Sunday and Monday, January 27–28, 2019. There were fifteen workshops in the program: Affective Content Analysis: Modeling Affect-in-Action, Agile Robotics for Industrial Automation Competition, Artificial Intelligence for Cyber Security, Artificial Intelligence Safety, Dialog System Technology Challenge, Engineering Dependable and Secure Machine Learning Systems, Games and Simulations for Artificial Intelligence, Health Intelligence, Knowledge Extraction from Games, Network Interpretability for Deep Learning, Plan, Activity, and Intent Recognition, Reasoning and Learning for Human-Machine Dialogues, Reasoning for Complex Question Answering, Recommender Systems Meet Natural Language Processing, Reinforcement Learning in Games, and Reproducible AI. This report contains brief summaries of the all the workshops that were held.


Author(s):  
Siti Nurhena ◽  
Nelly Astuti Hasibuan ◽  
Kurnia Ulfa

The diagnosis process is the first step to knowing a type of disease. This type of disease caused by mosquitoes is one of the major viruses (MAVY), dengue hemorrhagic fever (DHF) and malaria. Sometimes not everyone can find the virus that is carried by this mosquito, usually children who are susceptible to this virus because the immune system that has not been built perfectly is perfect. To know for sure which virus is infected by mosquitoes, it can diagnose by seeing symptoms perceived symptoms. Expert systems are one of the most used artificial intelligence techniques today because expert systems can act as consultations. In this case the authors make a system to start a diagnosis process with variable centered intelligent rule system (VCIRS) methods through perceived symptoms. With the facilities provided for users and administrators, allowing both users and administrators to use this system according to their individual needs. This expert system is made with the Microsoft Visual Basic 2008 programming language.Keywords: Expert System, Mayora Virus, Variable Centered Intelligent Rule System (VCIRS)The diagnosis process is the first step to knowing a type of disease. This type of disease caused by mosquitoes is one of the major viruses (MAVY), dengue hemorrhagic fever (DHF) and malaria. Sometimes not everyone can find the virus that is carried by this mosquito, usually children who are susceptible to this virus because the immune system that has not been built perfectly is perfect. To know for sure which virus is infected by mosquitoes, it can diagnose by seeing symptoms perceived symptoms.Expert systems are one of the most used artificial intelligence techniques today because expert systems can act as consultations. In this case the authors make a system to start a diagnosis process with variable centered intelligent rule system (VCIRS) methods through perceived symptoms.With the facilities provided for users and administrators, allowing both users and administrators to use this system according to their individual needs. This expert system is made with the Microsoft Visual Basic 2008 programming language.Keywords: Expert System, Mayora Virus, Variable Centered Intelligent Rule System (VCIRS)


2020 ◽  
Author(s):  
Efain Pantaleón-Matamoros ◽  
Isabelle Ribeiro Barbosa Mirabal ◽  
Orivaldo Vieira de Santana Júnior ◽  
Douglas de Souza Carvalho ◽  
Efrain Marcelo Pulgar Pantaleón ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document