scholarly journals Artificial Intelligence Techniques for Cyber Security Applications

Author(s):  
Shanqi Pang ◽  
Yongmei Li

Considering the enhancement in technology, criminals have been using cyberspace in order to commit many crimes. Therefore, it should be noted that cybercrimes are exposed to a number of threats and intrusions if not safeguarded well. Human and physical intervention tend not to be very adequate for the protection and tracking of such infrastructure, that is why there should be the establishment of multifaceted cyber defense networks, which are flexible, robust, and adjustable in order sense a massive collection of invasion and creation of real-time choices. Nevertheless, significant number of bio-related computing techniques of AI (artificial intelligence) tend to be increasing hence a significant role is played in detecting and preventing cybercrime. The main aim of this paper is outlining the actual advancement that have been made possible due to the application of AI methods for the fight against cybercrimes, in order to reveal how the methods are efficient in sensing and preventing cyber invasions, also providing a brief overview of the future works.

Author(s):  
Merve Yildirim

Due to its nature, cyber security is one of the fields that can benefit most from the techniques of artificial intelligence (AI). Under normal circumstances, it is difficult to write software to defend against cyber-attacks that are constantly developing and strengthening in network systems. By applying artificial intelligence techniques, software that can detect attacks and take precautions can be developed. In cases where traditional security systems are inadequate and slow, security applications developed with artificial intelligence techniques can provide better security against many complex cyber threats. Apart from being a good solution for cyber security problems, it also brings usage problems, legal risks, and concerns. This study focuses on how AI can help solve cyber security issues while discussing artificial intelligence threats and risks. This study also aims to present several AI-based techniques and to explain what these techniques can provide to solve problems in the field of cyber security.


Author(s):  
Juveriya Afreen

Abstract-- With increase in complexity of data, security, it is difficult for the individuals to prevent the offence. Thus, by using any automation or software it’s not possible by only using huge fixed algorithms to overcome this. Thus, we need to look for something which is robust and feasible enough. Hence AI plays an epitome role to defense such violations. In this paper we basically look how human reasoning along with AI can be applied to uplift cyber security.


Author(s):  
Petar Radanliev ◽  
David De Roure ◽  
Kevin Page ◽  
Max Van Kleek ◽  
Omar Santos ◽  
...  

AbstractMultiple governmental agencies and private organisations have made commitments for the colonisation of Mars. Such colonisation requires complex systems and infrastructure that could be very costly to repair or replace in cases of cyber-attacks. This paper surveys deep learning algorithms, IoT cyber security and risk models, and established mathematical formulas to identify the best approach for developing a dynamic and self-adapting system for predictive cyber risk analytics supported with Artificial Intelligence and Machine Learning and real-time intelligence in edge computing. The paper presents a new mathematical approach for integrating concepts for cognition engine design, edge computing and Artificial Intelligence and Machine Learning to automate anomaly detection. This engine instigates a step change by applying Artificial Intelligence and Machine Learning embedded at the edge of IoT networks, to deliver safe and functional real-time intelligence for predictive cyber risk analytics. This will enhance capacities for risk analytics and assists in the creation of a comprehensive and systematic understanding of the opportunities and threats that arise when edge computing nodes are deployed, and when Artificial Intelligence and Machine Learning technologies are migrated to the periphery of the internet and into local IoT networks.


Author(s):  
Kirti Raj Bhatele ◽  
Harsh Shrivastava ◽  
Neha Kumari

Cyber security has become a major concern in the digital era. Data breaches, ID theft, cracking the captcha, and other such stories abound, affecting millions of individuals as well as organizations. The challenges have always been endless in inventing right controls and procedures and implementing them with acute perfection for tackling with cyber attacks and crimes. The ever-increasing risk of cyber attacks and crimes grew exponentially with recent advancements in artificial intelligence. It has been applied in almost every field of sciences and engineering. From healthcare to robotics, AI has created a revolution. This ball of fire couldn't be kept away from cyber criminals, and thus, the “usual” cyber attacks have now become “intelligent” cyber attacks. In this chapter, the authors discuss specific techniques in artificial intelligence that are promising. They cover the applications of those techniques in cyber security. They end the discussion talking about the future scope of artificial intelligence and cyber security.


Author(s):  
Dhanalakshmi Senthilkumar

Blockchain and artificial intelligence are two disruptive technologies in the today's world; Blockchain can connect data storage and data users from multiple domains, and different kinds of analytics applications run on top of the data in artificial intelligence techniques. So that Blockchain technology provide the excellent backbone for the development of artificial intelligence algorithms, it is useful to secure the data input from multiple data storage locations and to have whatever applications running on top of the data in a Blockchain visible to everyone. The concept of Blockchain technology and artificial intelligence techniques together develop interesting uses cases and nice applications. When paired with Blockchains, AI is better understood by humans, operates more efficiently, and the blockchains in general more efficiently. AI and Blockchain together support B2B environment and getting better outcomes.


Author(s):  
Shanthi Makka ◽  
Gagandeep Arora ◽  
B. B. Sagar

Blockchain technology makes use of a centralized, peer-to-peer (P2P) network of databases, also called nodes, to validate and record digital transactions between individual users located anywhere across the globe. These transactions often take place through the exchange of cryptocurrencies such as bitcoins, Ethereum, and Ripple, etc. The security and transparency that is inherently present in digital transactions place blockchain technology in high demand across various industrial applications. Each node updates its database in real-time as and when transactions occur. The transaction gets authorized only when a majority of the nodes in the network validate the transaction. Once the verification is complete, a block, consisting of hash and keys, is generated for each new transaction and is linked to previous transactions in every database. Every node updates its database with the new block. A hacker would have to break down every node in the system to commit fraud. Blockchain could play a major role in maintaining the cyber security of digital transactions in the future.


Sign in / Sign up

Export Citation Format

Share Document