scholarly journals Ransomware Evolution, Growth and Recommendation for Detection

2020 ◽  
Vol 14 (3) ◽  
pp. 68 ◽  
Author(s):  
Adel Hamdan Mohammad

Ransomware is a malicious program that can affect any person or organization. Ransomware is a complicated malicious attack that aims at lock or encrypt user files. Up to this date, there is no individual method, tool, which guarantee to protect against ransomware. Most tools available can detect some types of ransomware but it fails to detect other types of ransomware. In this research author talks about several methods, tools, procedures which can be taken to reduce the possibility of ransomware occurrences. Up to this moment, the main methods used by attacker to infect your machine are malicious emails and malicious links. After analyzing several reports written by some anti-viruses’ company such as Kaspersky ,McAfee, and several researches which talks about ransomware, author conclude two points: first point, educating users, following up a strict security policy, procedures and backup strategies are the best methods which can be taken to minimize the possibility of ransomware. second point, future methods to detect ransomware mainly will be based on artificial intelligence.

2022 ◽  
pp. 83-112
Author(s):  
Myo Zarny ◽  
Meng Xu ◽  
Yi Sun

Network security policy automation enables enterprise security teams to keep pace with increasingly dynamic changes in on-premises and public/hybrid cloud environments. This chapter discusses the most common use cases for policy automation in the enterprise, and new automation methodologies to address them by taking the reader step-by-step through sample use cases. It also looks into how emerging automation solutions are using big data, artificial intelligence, and machine learning technologies to further accelerate network security policy automation and improve application and network security in the process.


2020 ◽  
Author(s):  
Ben Buchanan

One sentence summarizes the complexities of modern artificial intelligence: Machine learning systems use computing power to execute algorithms that learn from data. This AI triad of computing power, algorithms, and data offers a framework for decision-making in national security policy.


Author(s):  
Dimitar Stevo Bogatinov ◽  
Mitko Bogdanoski ◽  
Slavko Angelevski

The growing network attacks and intrusions have put the government organizations at a great risk. In cyberspace, humans have great limitations in data analyze and cyber defense because of the amount of data they have to process and the limited response time. Considering these parameters one of the best solutions is when the cyber defense mechanisms are AI (Artificial intelligence)-based because they can easily determine and respond to the attacks that are underway. The responses can be easily managed using man in the loop or fully atomized techniques. This chapter gives brief review of the usage of artificial intelligence in support of cyber defense, explains some useful applications that already exist, emphasizing the neural nets, expert systems and intelligent agents in cyber defense. Furthermore the chapter will propose a technical AI-based cyber defense model which can support the governmental and non-governmental efforts against cyber threats and can improve the success against malicious attack in the cyberspace.


2021 ◽  
Vol 93 ◽  
pp. 03015
Author(s):  
Rizvan Turluev ◽  
Laura Hadjieva

The presence of a direct causal relationship between management decisions and the analytical and research role of information allows us to prove the strategic importance of information resources. Typically, the need for data is considered at the management level of a company or organization. This position indicates the unambiguity of the confirmation regarding the results of the analyzed data and the possibility of their monetization. Information data is a kind of fundamental basis, demanded by the key structural links of any company. Information serves as an effective identifier of the company's potential opportunities and probable losses in an unstable business environment, as well as quality support from strategically significant initiatives. Of no small importance today is attached to the possibilities of joint application of relevant information on the part of all divisions of the company in order to react as quickly as possible to the transformation of the economic space. It should be noted that information is a kind of asset, the level of efficiency of which is especially important for successful activity. The article discusses artificial intelligence in corporate governance systems.


Author(s):  
Myo Zarny ◽  
Meng Xu ◽  
Yi Sun

Network security policy automation enables enterprise security teams to keep pace with increasingly dynamic changes in on-premises and public/hybrid cloud environments. This chapter discusses the most common use cases for policy automation in the enterprise, and new automation methodologies to address them by taking the reader step-by-step through sample use cases. It also looks into how emerging automation solutions are using big data, artificial intelligence, and machine learning technologies to further accelerate network security policy automation and improve application and network security in the process.


Author(s):  
Kanak Saxena ◽  
Umesh Banodha

Any social or organization system will fetch the properties from economics, sociology, and social psychology. In the digital world everyone is trying to cope with the new technologies for the survival. The dynamics of such a system are very multifarious due to the complexity in the convergence of the digital, physical, and biological realms. The dynamics of the society and organization are rapidly changing due to the imparting of the new technologies, such as artificial intelligence, internet of things, virtual reality, etc. The resultant is revolutionizing of opportunities and expectations due to the changes in the values, norms, identities, and future potential. The collective behavior (CB) plays an important role in predicting the various dynamics which are not only coherent but also paying attention. Blockchain will not only help in detecting but also help in finding the major causes and challenges for current scenario dynamics. The chapter describes the agent-based modeling and ant colony optimization components of the CB.


2020 ◽  
Vol 1 (1) ◽  
pp. 43-48
Author(s):  
Csaba Krasznay

Összefoglalás. Az elektronikusan tárolt információ biztonsága, általánosabban véve a kiberbiztonság, az egyik legnagyobb kihívás a 21. században. Folyamatosan jelennek meg újabb és újabb fenyegetések, melyekre innovatív és újszerű megoldásokat kell adni. Ezek az innovatív megoldások mindenképpen magukkal hozzák az olyan új típusú technológiák használatát az információbiztonságban, mint például a Nagy Adatokból (Big Data) való építkezés és az erre épülő mesterséges intelligencia. Ennek támogatása érdekében az Európai Unió a 2021 és 2027 közötti időszakban kiemelt fontosságúnak tartja a kiberbiztonsági innovációkat. A tanulmány bemutatja a kiberbiztonsági kompetenciahálózatok tervezetét, illetve ismerteti, hogy milyen kutatás-fejlesztés-innovációs lehetőségek lesznek a következő évtizedben Európában. Summary. Security of stored digital information and more generally, cybersecurity is one of the biggest challenges of the 21st century. Besides the negative effects of cybercrime, cyberespionage, or other state sponsored activities, like cyberwarfare, our society and economy should face the exposure of infocommunication systems all around us. At the dawn of 4th industrial revolution when the whole world is going to be digitalized and will be surrounded by networked digital devices in homes, cities and industry, new threats are constantly emerging that need to be responded with new innovative solutions. These innovative solutions should include the usage of big data and artificial intelligence built onto it. They should also give a response for the inherited risks of legacy systems that can be found in many critical information infrastructures. Meanwhile, they should protect the digital privacy of citizens by not giving out unnecessary user data which is contradictory with the need of big data and AI mentioned before. Due to the emerging cybersecurity threats and the virtually non-existence of European cybersecurity market, European Union gives high importance for cybersecurity innovation and will support it between 2021 and 2027. In the proposed budget for this period, approximately 3 billion of euros is expected to be spent to cybersecurity related research. On the one hand, that fund may help European research institutes, enterprises, and startups to appear on the global market, on the other hand this is the only possible way to regain Europe’s digital independence from the United States and China. In alignment with the European security policy, these innovative solutions may also lead to reducing the amount of cybercrime, ensure the resilience of continental critical information infrastructure and can help to establish strong European cyberwarfare capabilities. As Ursula von der Leyden, president of the European Commission said in her op-ed in February 2020, “The point is that Europe’s digital transition must protect and empower citizens, businesses and society as a whole. It has to deliver for people so that they feel the benefits of technology in their lives. To make this happen, Europe needs to have its own digital capacities – be it quantum computing, 5G, cybersecurity or artificial intelligence (AI). These are some of the technologies we have identified as areas for strategic investment, for which EU funding can draw in national and private sector funds.” The study presents the draft of cybersecurity competence networks and describes what R&D&I possibilities will be in Europe in the next decade.


MENDEL ◽  
2019 ◽  
Vol 25 (2) ◽  
pp. 27-34 ◽  
Author(s):  
Cong Truong Thanh ◽  
Ivan Zelinka

Recent developments in Artificial intelligence (AI) have a vast transformative potential for both cybersecurity defenders and cybercriminals. Anti-malware solutions adopt intelligent techniques to detect and prevent threats to the digital space. In contrast, cybercriminals are aware of the new prospects too and will probably try to use it in their activities. This survey aims at providing an overview on the way artificial intelligence can be used to power a malicious program that is: intelligent evasion techniques, autonomous malware, AI against itself, and applying bio-inspired computation and swarm intelligence.


2016 ◽  
pp. 1471-1489
Author(s):  
Dimitar Stevo Bogatinov ◽  
Mitko Bogdanoski ◽  
Slavko Angelevski

The growing network attacks and intrusions have put the government organizations at a great risk. In cyberspace, humans have great limitations in data analyze and cyber defense because of the amount of data they have to process and the limited response time. Considering these parameters one of the best solutions is when the cyber defense mechanisms are AI (Artificial intelligence)-based because they can easily determine and respond to the attacks that are underway. The responses can be easily managed using man in the loop or fully atomized techniques. This chapter gives brief review of the usage of artificial intelligence in support of cyber defense, explains some useful applications that already exist, emphasizing the neural nets, expert systems and intelligent agents in cyber defense. Furthermore the chapter will propose a technical AI-based cyber defense model which can support the governmental and non-governmental efforts against cyber threats and can improve the success against malicious attack in the cyberspace.


Sign in / Sign up

Export Citation Format

Share Document