scholarly journals Artificial Intelligence in Cyber Security - A Review

Author(s):  
Jenis Nilkanth Welukar ◽  
Gagan Prashant Bajoria

In this paper we are going to discuss how Artificial Intelligence (AI) can be used to address cyber security issues and cyber-threats. Cyber security is a vast growing field since the last decade. So the number of applications as well as the number of threats are rising continuously. This paper discuss the uses of Artificial Intelligence in cyber security and also shed some light on the disadvantages.

Author(s):  
Merve Yildirim

Due to its nature, cyber security is one of the fields that can benefit most from the techniques of artificial intelligence (AI). Under normal circumstances, it is difficult to write software to defend against cyber-attacks that are constantly developing and strengthening in network systems. By applying artificial intelligence techniques, software that can detect attacks and take precautions can be developed. In cases where traditional security systems are inadequate and slow, security applications developed with artificial intelligence techniques can provide better security against many complex cyber threats. Apart from being a good solution for cyber security problems, it also brings usage problems, legal risks, and concerns. This study focuses on how AI can help solve cyber security issues while discussing artificial intelligence threats and risks. This study also aims to present several AI-based techniques and to explain what these techniques can provide to solve problems in the field of cyber security.


2014 ◽  
Vol 4 (1) ◽  
pp. 16-22 ◽  
Author(s):  
Christopher Bronk

Cyber security is an issue of foremost interest for policy makers in the world’s governments, corporations, NGOs, academic institutions, and other associations, however remedy for the myriad cyber threats and vulnerabilities continues to elude technologists and policy makers alike. In this paper, we consider the concept of cyber risk intelligence, a general concept of understanding the varied phenomena that impact an organization’s capacity to secure its digital communications and resources from eavesdropping, theft or attack. We also consider the deeper economics of information held and transmitted in digital form and how those economics may alter thinking on modeling of risk. Finally, we offer guidance of how organizations and entire sectors of business activity may want to alter their thinking on cyber security issues beyond a technological framing to an informational one aligned with business activities.


2022 ◽  
pp. 146-187
Author(s):  
Mazoon Hashil Alrubaiei ◽  
Maiya Hamood Al-Saadi ◽  
Hothefa Shaker ◽  
Bara Sharef ◽  
Shahnawaz Khan

IoT represents a technologically bright future where heterogeneously connected devices will be connected to the internet and make intelligent collaborations with other objects to extend the borders of the world with physical entities and virtual components. Despite rapid evolution, this environment is still facing new challenges and security issues that need to be addressed. This chapter will give a comprehensive view of IoT technologies. It will discuss the IoT security scope in detail. Furthermore, a deep analysis of the most recent proposed mechanisms is classified. This study will be a guide for future studies, which direct to three primary leading technologies—machine learning (ML), blockchain, and artificial intelligence (AI)—as intelligent solutions and future directions for IoT security issues.


2021 ◽  
Vol 11 (10) ◽  
pp. 4580
Author(s):  
Amir Djenna ◽  
Saad Harous ◽  
Djamel Eddine Saidouni

As a new area of technology, the Internet of Things (IoT) is a flagship and promising paradigm for innovating society. However, IoT-based critical infrastructures are an appealing target for cybercriminals. Such distinctive infrastructures are increasingly sensitive to cyber vulnerabilities and subject to many cyberattacks. Thus, protecting these infrastructures is a significant issue for organizations and nations. In this context, raising the cybersecurity posture of critical cyber infrastructures is an extremely urgent international issue. In addition, with the rapid development of adversarial techniques, current cyber threats have become more sophisticated, complicated, advanced and persistent. Thus, given these factors, prior to implementing efficient and resilient cybersecurity countermeasures, identification and in-depth mapping of cyber threats is an important step that is generally overlooked. Therefore, to solve cybersecurity challenges, this study presents a critical analysis of the most recent cybersecurity issues for IoT-based critical infrastructures. We then discuss potential cyber threats and cyber vulnerabilities and the main exploitation strategies adopted by cybercriminals. Further, we provide a taxonomy of cyberattacks that may affect critical cyber infrastructures. Finally, we present security requirements and some realistic recommendations to enhance cybersecurity solutions.


Electronics ◽  
2021 ◽  
Vol 11 (1) ◽  
pp. 16
Author(s):  
Waqas Ahmad ◽  
Aamir Rasool ◽  
Abdul Rehman Javed ◽  
Thar Baker ◽  
Zunera Jalil

Cloud computing provides the flexible architecture where data and resources are dispersed at various locations and are accessible from various industrial environments. Cloud computing has changed the using, storing, and sharing of resources such as data, services, and applications for industrial applications. During the last decade, industries have rapidly switched to cloud computing for having more comprehensive access, reduced cost, and increased performance. In addition, significant improvement has been observed in the internet of things (IoT) with the integration of cloud computing. However, this rapid transition into the cloud raised various security issues and concerns. Traditional security solutions are not directly applicable and sometimes ineffective for cloud-based systems. Cloud platforms’ challenges and security concerns have been addressed during the last three years, despite the successive use and proliferation of multifaceted cyber weapons. The rapid evolution of deep learning (DL) in the artificial intelligence (AI) domain has brought many benefits that can be utilized to address industrial security issues in the cloud. The findings of the proposed research include the following: we present a comprehensive survey of enabling cloud-based IoT architecture, services, configurations, and security models; the classification of cloud security concerns in IoT into four major categories (data, network and service, applications, and people-related security issues), which are discussed in detail; we identify and inspect the latest advancements in cloud-based IoT attacks; we identify, discuss, and analyze significant security issues in each category and present the limitations from a general, artificial intelligence and deep learning perspective; we provide the technological challenges identified in the literature and then identify significant research gaps in the IoT-based cloud infrastructure to highlight future research directions to blend cybersecurity in cloud.


2020 ◽  
Vol 57 (1-2) ◽  
pp. 52-61
Author(s):  
M. Sneps-Sneppe ◽  
D. Namiot ◽  
R. Pauliks

AbstractThe article discusses the issue of training of telecommunications engineers. The architecture of telecommunications solutions is changing very quickly. Obviously, training programmes must also change. Cybersecurity issues are one of the main drivers of change in telecommunications solutions and, therefore, training programmes. They have become the main issues in all processes related to digital transformation. At the same time, it is clear that the development of education in telecommunications clearly lags behind modern requirements. Such issues come to the fore in relation to the development of digital economy programmes. Cyber security issues for military telecommunications solutions are discussed separately.


AI Magazine ◽  
2019 ◽  
Vol 40 (3) ◽  
pp. 67-78
Author(s):  
Guy Barash ◽  
Mauricio Castillo-Effen ◽  
Niyati Chhaya ◽  
Peter Clark ◽  
Huáscar Espinoza ◽  
...  

The workshop program of the Association for the Advancement of Artificial Intelligence’s 33rd Conference on Artificial Intelligence (AAAI-19) was held in Honolulu, Hawaii, on Sunday and Monday, January 27–28, 2019. There were fifteen workshops in the program: Affective Content Analysis: Modeling Affect-in-Action, Agile Robotics for Industrial Automation Competition, Artificial Intelligence for Cyber Security, Artificial Intelligence Safety, Dialog System Technology Challenge, Engineering Dependable and Secure Machine Learning Systems, Games and Simulations for Artificial Intelligence, Health Intelligence, Knowledge Extraction from Games, Network Interpretability for Deep Learning, Plan, Activity, and Intent Recognition, Reasoning and Learning for Human-Machine Dialogues, Reasoning for Complex Question Answering, Recommender Systems Meet Natural Language Processing, Reinforcement Learning in Games, and Reproducible AI. This report contains brief summaries of the all the workshops that were held.


Author(s):  
Juveriya Afreen

Abstract-- With increase in complexity of data, security, it is difficult for the individuals to prevent the offence. Thus, by using any automation or software it’s not possible by only using huge fixed algorithms to overcome this. Thus, we need to look for something which is robust and feasible enough. Hence AI plays an epitome role to defense such violations. In this paper we basically look how human reasoning along with AI can be applied to uplift cyber security.


Sign in / Sign up

Export Citation Format

Share Document