Academia.eduAcademia.edu

Outline

Review of Neural Networks Contribution in Network Security

Abstract

Nowadays,securing the transmitted data is the most important challenging areas of development and research in modern communication. Users are able to communicate over an insecure channel using cryptography,so an attacker cannot decrypt and understand the original message. Public key cryptography requires large computational power, huge time consumption and complexity. An Artificial Neural Network (ANN) is used in order to overcome these problems. The connection between cryptography and ANN provides a great help for the security concerns. This paper presents a review for the contribution of ANN in the field of network security

References (27)

  1. MahaMahmood andBelal Al-Khateeb, "Towards an Automatic Generation of Neural Networks", Journal of Theoretical and Applied Information Technology, Vol.95. Issue 23, 2017.
  2. Khaled M. G. Noaman and Hamid Abdullah Jalab, "Data Security Based On Neural Network", Task Quarterly 9 No 4, 409-414, 2005.
  3. P. Mohamed Shakeel; Tarek E. El. Tobely; Haytham Al-Feel; Gunasekaran Manogaran; S. Baskar., "Neural Network Based Brain Tumor Detection Using Wireless Infrared Imaging Sensor", IEEE Access, 2019, vol 7, issue 1, Page(s): 1
  4. InadyutiDutt, Soumya Paul and DipayanBandyopadyay ," Security in All-Optical Network using Artificial Neural Network", International Journal of Advanced Research in Computer Science, Vol. 3, No. 2, 2012.
  5. Halenar Igor, JuhasovaBohuslava, JuhasMartin andNesticky Martin,"Application of Neural Networks in Computer Security", DAAAM International Symposium on Intelligent Manufacturing and Automation, Vol. 69, 1209-1215, 2013.
  6. Navita Agarwal andPrachi Agarwal," Use of Artificial Neural Network in the Field of Security", MIT International Journal of Computer Science & Information Technology", Vol. 3, Issue 1, 42-44, 2013.
  7. Shujuan Jin," Research on Application of Neural Network in Computer Network Security Evaluations",The Open Electrical & Electronic Engineering Journal, 766-771, 2014.
  8. Shakeel PM. Neural Networks Based Prediction Of Wind Energy Using Pitch Angle Control. International Journal of Innovations in Scientific and Engineering Research (IJISER). 2014;1(1):33-7.
  9. S. Jegadeeswari, P. Dinadayalan and N. Gnanambigai," Enhanced Data Security Using Neural Network in Cloud Environment", International Journal of Applied Engineering Research, Vol 11, Issue 1, 278-285, 2016.
  10. J. RubinaParveen, "Neural Networks in Cyber Security", International Research Journal of Computer Science (IRJCS), Vol 4, Issue 9, 2017.
  11. Sufyan T. Al-Janabi, Belal Al-Khateeb and Ahmed J. Abd", Intelligent Techniques in Cryptanalysis: Review and Future Directions," Original Research Article Uhd Journal of Science and Technology. UHD Journal of Science and Technology, Vol 1, Issue 1, 2017.
  12. MuriloCoutinho, Robson de Oliveira Albuquerque, Fábio Borges, Luis Javier GarcíaVillalba and Tai- Hoon Kim," learing perfectly secure cryptography to protect communication with Adversarial neural cryptography", MDPI, sensors 2018,18,1306:doi:10.3390\s18051306,2018.
  13. Sridhar KP, Baskar S, Shakeel PM, Dhulipala VS., "Developing brain abnormality recognize system using multi-objective pattern producing neural network", Journal of Ambient Intelligence and Humanized Computing, 2018:1-9.https://doi.org/10.1007/s12652-018-1058-y
  14. Belal Al-Khateeb andMahaMahmood, "A Framework for an Automatic Generation of Neural Networks", IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 3, No 2, 1694-0784, 2013.
  15. Mohammed, M.A., Al-Khateeb, B., Rashid, A.N., Ibrahim, D.A., Ghani, M.K.A. and Mostafa, S.A., 2018. Neural network and multi-fractal dimension features for breast cancer classification from ultrasound images. Computers & Electrical Engineering.
  16. Obaid,O,I, M.A, Ghani, M.K.A., Mostafa, S.A., &FahadTaha AL-Dhief. "Evaluating the Performance of Machine Learning Techniques in the Classification of Wisconsin Breast Cancer." International Journal of Engineering & Technology [Online], 7.4.36 (2018): 160-166. Web. 19 Dec. 2018.
  17. Mostafa, S.A., Mustapha, A., Hazeem, A.A., Khaleefah, S.H. and Mohammed, M.A., 2018. An Agent- Based Inference Engine for Efficient and Reliable Automated Car Failure Diagnosis Assistance. IEEE Access, 6, pp.8322-8331.
  18. Mostafa, S.A., Ahmad, M.S., Mustapha, A. and Mohammed, M.A., 2017. Formulating layered adjustable autonomy for unmanned aerial vehicles. International Journal of Intelligent Computing and Cybernetics, 10(4), pp.430-450.ORSA Journal on Computing 6(2):154-160.
  19. G. Katz,C.Barrett,D.L.Dill,K.Julianand M.J.Kochenderfer. Reluplex: Anefficientsmt solver for verifying deep neural networks. In International Conference on Computer Aided Verification (CAV), 97-117. Springer, 2017.
  20. A. Meri et al., "Modelling the Utilization of Cloud Health Information Systems in the Iraqi Public Healthcare Sector," Telemat. Informatics, 2018.
  21. Shakeel, P.M., Tolba, A., Al-Makhadmeh, Zafer Al-Makhadmeh, Mustafa Musa Jaber, "Automatic detection of lung cancer from biomedical data set using discrete AdaBoost optimized ensemble learning generalized neural networks", Neural Computing and Applications,2019,pp1- 14.https://doi.org/10.1007/s00521-018-03972-2
  22. Shakeel PM, Baskar S, Dhulipala VS, Jaber MM., "Cloud based framework for diagnosis of diabetes mellitus using K-means clustering", Health information science and systems, 2018 Dec 1;6(1):16.https://doi.org/10.1007/s13755-018-0054-0
  23. Shakeel PM, Baskar S, Dhulipala VS, Mishra S, Jaber MM., "Maintaining security and privacy in health care system using learning based Deep-Q-Networks", Journal of medical systems, 2018 Oct 1;42(10):186.https://doi.org/10.1007/s10916-018-1045-z
  24. M. Jarrar, M. S. Minai, M. Al-Bsheish, A. Meri, and M. Jaber, "Hospital nurse shift length, patient- centered care, and the perceived quality and patient safety," International Journal of Health Planning and Management, 2018.
  25. Shiqi Wang, Kexin Pei, Justin Whitehouse, Junfeng Yang and Suman Jana, "Formal Security Analysis of Neural Networks using Symbolic Intervals", Columbia University, 2018.
  26. Khalil Shihab," A Backpropagation Neural Network for Computer Network Security", Journal of Computer Science 2 (9): 710-715, 2006.
  27. A.Manikandan, J.Sakthivel, "Recognizable Proof of Biometric System With Even Distorted And Rectification States", Journal of Advanced Research in Dynamical and Control Systems, ISSN:1943- 023X , pp 1393-1398, 2017.