Academia.eduAcademia.edu

Outline

CYBERSECURITY INFRASTRUCTURE AND SECURITY AUTOMATION

2019, Advanced Computing: An International Journal (ACIJ), Vol.10, No.6

https://doi.org/10.5121/ACIJ.2019.10601

Abstract

AI-based security systems utilize big data and powerful machine learning algorithms to automate the security management task. The case study methodology is used to examine the effectiveness of AI-enabled security solutions. The result shows that compared with the signature-based system, AI-supported security applications are efficient, accurate, and reliable. This is because the systems are capable of reviewing and correlating large volumes of data to facilitate the detection and response to threats.

References (11)

  1. AV-Comparatives, Advanced Endpoint Protection Test, AV-Comparatives, 23 March 2018, https://www.av-comparatives.org/tests/advanced-endpoint-protection-test/
  2. IBM. "Artificial intelligence for a smarter kind of cybersecurity." IBM, 16 August 2018, https://www.ibm.com/security/artificial-intelligence
  3. Joshi, Naveen, "Can AI Become Our New Cybersecurity Sheriff?" Forbes, Feb. 4 2019, https://www.forbes.com/sites/cognitiveworld/2019/02/04/can-ai-become-our-new-cybersecurity- sheriff/#6d981a6f36a8
  4. Mandt, Ej. "Integrating Cyber-Intelligence Analysis and Active Cyber-Defence Operations", Journal of Information Warfare, vol. 16, no. 1, pp. 31-48. 2017.
  5. Mitkovskiy Alexey, Ponomarev Andrey and Proletarskiy Andrey. "SIEM-Platform for Research and Educational Tasks on Processing of Security Information Events." The International Scientific Conference eLearning and Software for Education Bucharest. Vol. 3, pp 48-56. 2019.
  6. Powell, Matt. "Artificial Intelligence: A Cybersecurity Solution or the Greatest Risk of All?" CPO Magazine, April 15, 2019, https://www.cpomagazine.com/cyber-security/artificial-intelligence-a- cybersecurity-solution-or-the-greatest-risk-of-all/
  7. Panimalar Arockia, Pai Giri and Khan Salman, Artificial intelligence techniques for cyber security. International Research Journal of Engineering and Technology, Vol. 5, no. 3. pp. 122-124. 2018.
  8. Siddiqui Zeeshan, Yadav Sonali and Husain Mohd. Application of Articicial Intelligence in fight against cyber crimes: A review. International Journal of Advanced Research in Computer Science, Vol. 9, no. 2, pp. 118-121. 2018.
  9. Starman, Adrijana. "The case study as a type of qualitative research." Journal of contemporary educational studies vol. 1. pp.28-43. 2013.
  10. Veeramachaneni, Kalyan and Arnaldo, Ignacio. "AI2: Training a big data machine to defend." MIT, [10] July 2016, https://people.csail.mit.edu/kalyan/AI2_Paper.pdf
  11. Vahakainu, Petri and Lehto, Martti. Artificial Intelligence in the Cyber Security Environment, Academic Conferences International Limited, Reading. 2019.