SIGNIFICANT ROLE OF AI & ML TECHNIQUES USED IN IMPROVEMENT OF CYBER SECURITY

2021 ◽  
Vol 12 (1) ◽  
pp. 80-89
Author(s):  
Muskan Kumari ◽  

Cyber Security has become an arising challenge for business information system in current era. AI (Artificial Intelligence) is broadly utilized in various field, however it is still generally new in cyber security. Nonetheless, the applications in network protection are significant for everybody`s day by day life. In this paper, we present the current status of AI in cyber security field, and afterward portray a few contextual investigations and uses of AI to help the community including engineering managers, teachers, educators, business people, and understudies to more readily comprehend this field, for example, the difficulties and uncertain issues of AI in online protection. According to the new challenges, the expert community has two main approaches: to adopt the philosophy and methods of Military Intelligence, and to use Artificial Intelligence methods for counteraction of Cyber Attacks. Cyber security is a vital danger for any business as the quantity of attacks is expanding. Developing of attacks on cyber security is undermining our reality. AI (Artificial Intelligence) and ML (Machine Leaning) can help identify dangers and give proposals to cyber Analyst. Advancement of appropriation of AI/ML applied to cyber security requires banding together of industry, the scholarly community, and government on a worldwide scale. We also discuss future research opportunities associated with the development of AI techniques in the cyber security ?eld across a scope of utilization areas.

Author(s):  
Kirti Raj Bhatele ◽  
Harsh Shrivastava ◽  
Neha Kumari

Cyber security has become a major concern in the digital era. Data breaches, ID theft, cracking the captcha, and other such stories abound, affecting millions of individuals as well as organizations. The challenges have always been endless in inventing right controls and procedures and implementing them with acute perfection for tackling with cyber attacks and crimes. The ever-increasing risk of cyber attacks and crimes grew exponentially with recent advancements in artificial intelligence. It has been applied in almost every field of sciences and engineering. From healthcare to robotics, AI has created a revolution. This ball of fire couldn't be kept away from cyber criminals, and thus, the “usual” cyber attacks have now become “intelligent” cyber attacks. In this chapter, the authors discuss specific techniques in artificial intelligence that are promising. They cover the applications of those techniques in cyber security. They end the discussion talking about the future scope of artificial intelligence and cyber security.


Author(s):  
S.V Manikanthan ◽  
T Padmapriya ◽  
Azham Hussain ◽  
E Thamizharasi

<p>Nowadays, Artificial Intelligence is being integrated into the modern innovations, including mobile, Electronic gadgets and as well as our daily lives. The smartphones are becoming a crucial and indistinguishable part of modern life. Whether that be in terms of speech, prototype, efficiency, features, quality and so forth, together all system requirements are provided in one machine. Researchers and innovations analysts are making advances in mobile computing with the excellent technologies. While Artificial Intelligence as a commercial product has been directly accessible. In this, both corporations and violent offenders take benefit of emerging technologies and advances. Cyber-security specialists and authorities have predicted there have been high possibilities of cyber-attacks. There's really, besides that, a need to improve quite advanced and powerful data security processes and software to protect all fraudulent activities and threats. The objective of this study is to introduce latest developments of implementing Methodologies to mobile computing, to prove how such techniques could become an efficient resource for data security and protocols, and to provide scope for future research.</p>


Author(s):  
Kirti Raj Bhatele ◽  
Harsh Shrivastava ◽  
Neha Kumari

Cyber security has become a major concern in the digital era. Data breaches, ID theft, cracking the captcha, and other such stories abound, affecting millions of individuals as well as organizations. The challenges have always been endless in inventing right controls and procedures and implementing them with acute perfection for tackling with cyber attacks and crimes. The ever-increasing risk of cyber attacks and crimes grew exponentially with recent advancements in artificial intelligence. It has been applied in almost every field of sciences and engineering. From healthcare to robotics, AI has created a revolution. This ball of fire couldn't be kept away from cyber criminals, and thus, the “usual” cyber attacks have now become “intelligent” cyber attacks. In this chapter, the authors discuss specific techniques in artificial intelligence that are promising. They cover the applications of those techniques in cyber security. They end the discussion talking about the future scope of artificial intelligence and cyber security.


2020 ◽  
Vol 19 ◽  

According to the opinion of the leading experts in the field of Cyber Security over the last few years there has been a transition from the stage of Cyber Criminality to the stage of Cyber War. In order to respond adequately to the new challenges, the expert community has two main approaches: to adopt the philosophy and methods of Military Intelligence, and to use Artificial Intelligence methods for counteraction of Cyber Attacks. The present paper describes some of the results obtained in the Faculty of Computer Systems and Technology at Technical University of Sofia in the implementation of project related to the application of intelligent methods for increasing the security in computer networks. These results are shown separately in the sphere of Cyber Threats Intelligence and Security Incident Handling.


Author(s):  
Petar Radanliev ◽  
David De Roure ◽  
Kevin Page ◽  
Max Van Kleek ◽  
Omar Santos ◽  
...  

AbstractMultiple governmental agencies and private organisations have made commitments for the colonisation of Mars. Such colonisation requires complex systems and infrastructure that could be very costly to repair or replace in cases of cyber-attacks. This paper surveys deep learning algorithms, IoT cyber security and risk models, and established mathematical formulas to identify the best approach for developing a dynamic and self-adapting system for predictive cyber risk analytics supported with Artificial Intelligence and Machine Learning and real-time intelligence in edge computing. The paper presents a new mathematical approach for integrating concepts for cognition engine design, edge computing and Artificial Intelligence and Machine Learning to automate anomaly detection. This engine instigates a step change by applying Artificial Intelligence and Machine Learning embedded at the edge of IoT networks, to deliver safe and functional real-time intelligence for predictive cyber risk analytics. This will enhance capacities for risk analytics and assists in the creation of a comprehensive and systematic understanding of the opportunities and threats that arise when edge computing nodes are deployed, and when Artificial Intelligence and Machine Learning technologies are migrated to the periphery of the internet and into local IoT networks.


Author(s):  
Merve Yildirim

Due to its nature, cyber security is one of the fields that can benefit most from the techniques of artificial intelligence (AI). Under normal circumstances, it is difficult to write software to defend against cyber-attacks that are constantly developing and strengthening in network systems. By applying artificial intelligence techniques, software that can detect attacks and take precautions can be developed. In cases where traditional security systems are inadequate and slow, security applications developed with artificial intelligence techniques can provide better security against many complex cyber threats. Apart from being a good solution for cyber security problems, it also brings usage problems, legal risks, and concerns. This study focuses on how AI can help solve cyber security issues while discussing artificial intelligence threats and risks. This study also aims to present several AI-based techniques and to explain what these techniques can provide to solve problems in the field of cyber security.


2020 ◽  
Vol 6 (2) ◽  
pp. 205630512092477 ◽  
Author(s):  
Clelia Malighetti ◽  
Simona Sciara ◽  
Alice Chirico ◽  
Giuseppe Riva

Our aim was to explore emotions in Instagram images marked with hashtags referring to body image–related components using an artificial intelligence–based discrete emotional analysis. A total of 500 Instagram photos marked by specific hashtags related to body image components were analyzed and specific discrete emotions expressed in each picture were detected using the Emotion application program interface API from Microsoft Azure Cognitive Service. Results showed that happiness and neutrality were the most intense and recognizable emotions expressed in all images. Happiness intensity was significantly higher in images with #bodyimage and #bodyconfidence and higher levels of neutral emotion were found in images tagged with #body, #bodyfitness, and #thininspirational. This study integrated a discrete emotional model with the conventional dimensional one, and offered a higher degree of granularity in the analysis of emotions–body link on Instagram through an artificial intelligence technology. Future research should deepen the use of discrete emotions on Instagram and the role of neutrality in body image representation.


2015 ◽  
Vol 2015 ◽  
pp. 1-13 ◽  
Author(s):  
Ellen M. Tedaldi ◽  
Nancy L. Minniti ◽  
Tracy Fischer

The prevalence of HIV (human immunodeficiency virus) associated neurocognitive disorders (HAND) will undoubtedly increase with the improved longevity of HIV-infected persons. HIV infection, itself, as well as multiple physiologic and psychosocial factors can contribute to cognitive impairment and neurologic complications. These comorbidities confound the diagnosis, assessment, and interventions for neurocognitive disorders. In this review, we discuss the role of several key comorbid factors that may contribute significantly to the development and progression of HIV-related neurocognitive impairment, as well as the current status of diagnostic strategies aimed at identifying HIV-infected individuals with impaired cognition and future research priorities and challenges.


2021 ◽  
Vol 10 (4) ◽  
pp. 210
Author(s):  
Ahu Ergen ◽  
Ahmet Naci Ünal ◽  
Mehmet Sıtkı Saygili

The increase in cyber attacks cause individuals and businesses to face financial loss and reputation damage. Most cyber security studies ignore human factor and focus only on technological measures although the cyber security behaviors of employees are vital for the organisations. This paper aims to explore and discuss the role of employees in cyber security. In-depth interviews with eight cyber security experts were conducted through semi-structured, open-ended interviews. This study gives perspectives regarding the cyber security behaviors of employees, the barriers and promoters of secure behaviors in cyberspace. The findings mainly stem reasons of unsecure behaviors and solutions for them, and provide implications to companies for effective training and recommendations to adopt secure behaviors in the companies.   Received: 4 March 2021 / Accepted: 6 May 2021 / Published: 8 July 2021


Sign in / Sign up

Export Citation Format

Share Document