CSEIT1722265 | Artificial Intelligence in Cyber Security
Sign up for access to the world's latest research
Abstract
Cyber-attackers unit investment automation technology to launch strikes, whereas many organisations unit still victimisation manual efforts to mixture internal security findings and contextualising them with external threat data. Victimisation these ancient ways that, it'll take weeks or months to sight intrusions, throughout that amount attackers can exploit vulnerabilities to compromise systems and extract info. To wear down these challenges, progressive organisations unit exploring the employment of AI (AI) in their regular cyber risk management operations. The speed of processes and conjointly the amount of data to be used in defensive the cyberspace can't be handled by humans whereas not sizeable automation. However, it's hard to develop code with customarily mounted algorithms (hard-wired logic on deciding level) for effectively defensive against the dynamically evolving attacks in networks. this instance is also handled by applying methods of computing that supply...
Related papers
International Research Journal of Innovations in Engineering and Technology (IRJIET), 2025
The integration of Artificial Intelligence (AI) into cybersecurity has revolutionized the detection and mitigation of cyber threats, addressing the growing complexity and sophistication of attacks. This study explores AI's effectiveness in identifying threats such as malware, phishing, and zero-day vulnerabilities while automating threat responses and enhancing proactive defense mechanisms. It highlights key challenges, including adversarial attacks, data quality issues, algorithmic biases, and integration complexities with legacy systems. Emerging technologies such as federated learning, blockchain, and edge computing offer promising solutions to overcome these barriers. Ethical and regulatory considerations are also addressed, emphasizing the need for responsible AI adoption in cybersecurity. The findings underscore AI's transformative potential in cybersecurity and provide actionable recommendations for its effective implementation. The study concludes that while AI presents significant advantages, addressing its limitations through interdisciplinary collaboration and continuous innovation is critical to maximizing its impact.
Artificial intelligence has become a crucial element of cyber security because of its capacity to assess security threats instantly and respond appropriately. Nowadays, AI plays a more significant role in identifying and thwarting attacks that keep companies innovative. The primary goals of artificial intelligence in cybersecurity are threat identification and mitigation. Artificial intelligence uses machine learning algorithms and sophisticated data analysis to identify patterns and abnormalities in user behavior and network traffic that can point to a possible cyberattack. Artificial Intelligence can help stop attacks by using predictive modeling. AI is also capable of anticipating dangers and preventing them by analyzing historical attacks and finding patterns. Automated incident response system creation is just another crucial cybersecurity use of artificial intelligence. These systems can assess data, spot possible threats, and then take action to lessen the impact of the attack by containing it or mitigating its effects. Artificial intelligence must be used by businesses in cybersecurity to safeguard their networks and sensitive data against ever-evolving online threats. Artificial intelligence (AI) is quickly emerging as a crucial tool for effective cybersecurity in today's digital environment due to its capacity to evaluate massive volumes of data in real-time and automate incident response. The importance of artificial intelligence (AI) in cybersecurity, particularly its applications in threat identification and defense.
Indonesian Journal of Interdisciplinary Research in Science and Technology (MARCOPOLO), 2025
This article aims to analyze the role of artificial intelligence (AI) in addressing increasingly complex cyber threats. The research process included gathering and analysing data from multiple sources of current literature on the use of AI in cybersecurity. The descriptive qualitative technique was used to investigate how artificial intelligence can increase the ability to detect and respond to cyber assaults. The study's findings show that the use of AI not only improves the effectiveness of security systems, but also helps to make faster and more accurate judgements. The results of this research highlight the significance of integrating AI into cybersecurity efforts to secure data and critical infrastructure..
2020
The work paper aims to underline the benefits of using Artificial Intelligence to improve the business productivity, and in the same time to address awareness in order to overcome fear in exploring new technology, because of cyber-attacks. How vulnerable are businesses to computerization? 100%. Internet is a virtual space available for everyone. Storing data on any device that can be connected to the internet can become vulnerable in any given second. This article comes to show how we can use cybersecurity to protect our business, presenting in the same time cases of risk management form Malta.
The increasing threats of increasingly complex and frequent attacks make awkward a strong defensive position. Recent serious data breaches, such as those of the US Government Human Resources (OPM) department, have made headlines and the demand for better security has increased. As a result, today's decision makers demand better protection. In the face of new daily cyber threats, IT experts fear violations and the destruction or manipulation of data. This leads to significantly increased expenditure. According to Gartner's research, the data security market will exceed $ 1, 000, 000, 000.00 by 2019. In this environment, a new technology based on artificial intelligence and machine training emerges that is redefining device protection - and thus, security. With the use of predictive and predictive techniques to detect attacks before they are executed and outside the system architecture, artificial intelligence is much more than just a technical innovation, it is a paradigm shift of philosophy and understanding. Artificial Intelligence (AI) as a subfield of computer science performs cognitive skills such as learning, planning, or problem-solving in computer systems.
The speed of processes and also the quantity of knowledge to be utilized in defensive the cyber area cannot be handled by humans while not sizeable automation. However, it is troublesome to develop software system with standard mounted algorithms (hard-wired logic on deciding level) for effectively defensive against the dynamically evolving attacks in networks. This example may be handled by applying strategies of computing that offer flexibility and learning capability to software system. This paper presents a quick survey of computing applications in cyber security, and analyzes the prospects of enhancing the cyber security capabilities by suggests that of accelerating the intelligence of the security systems. Once measuring the papers obtainable regarding AI applications in cyber security, we will conclude that helpful applications exist already. They belong; initial of all, to applications of artificial neural nets in perimeter security and a few alternative cyber security areas. From the opposite facet – it has become obvious that several cyber security issues may be resolved with success only strategies of AI are getting used. For instance, wide information usage is critical in deciding, and intelligent call support is one in all however unresolved issues in cyber security.
IRJET, 2021
If significant automation takes place, people cannot control the speed of the operations also because the amount of data to be utilized in cyber environments. Nevertheless, designing a software framework with standard installed algorithms (hard wired decision making level logic is problematic for effectively defensive against dynamically changing network attacks. this instance are often addressed by implementing programming techniques that provide versatility and software learning capabilities. This paper analyzes the prospects of improving computer security capabilities by suggesting speeding up security systems intelligence. Once we evaluate the papers obtainable in information security concerning AI applications, we'll conclude that valuable applications exist already. We belong, initial of all, to applications of perimeter security artificial neural networks and a couple of alternate cybersecurity areas. It's become clear that with progress, only AI approaches are getting used, many information security problems are often overcome. The extensive use of data for instance, is important to decision ¬making, and intelligent call support is one among all if unresolved cybersecurity issues.
IJIRT, 2025
The Artificial Intelligence innovations are being used as the best answer to the cyber-attacks. The experts in the field are using AI, including its subset machine learning, to effectively combat these attacks. At present, security analysts use this technology to detect abnormal activities, thereby redeemable phase and decreasing overall business expenses. In the current digital landscape, with the widespread use of IoT and interconnected devices, cyber security experts face numerous challenges. The prevention of attacks, protection of vulnerabilities, and quick response to threats require holistic instruments. Nevertheless, even though traditional security systems are not up to the challenge or sufficient for the task at hand, AI methodologies can enhance general security strategies considerably and furnish robust protection from the increasing instances of advanced cyber threats. This study, therefore, focuses on exploring the use of artificial intelligence in concert with human reasoning to enhance cyber security. The main aim of the current research is to elucidate the work done so far in applying artificial intelligence techniques for countering cyber threats.
ARIS2 - Advanced Research on Information Systems Security
The present study is based on the analysis of the concepts of Cybersecurity and Artificial Intelligence, focusing on how both relate to each other. The COVID-19 pandemic and the fact that the world was forced into confinement had a huge impact on the increase of cyber-attacks and the birth of new threats. Currently, Cybersecurity is becoming an extremely complicated task, as we can no longer think of blocking an attack only by resorting to humans. The advanced and automated ways in which attacks have been developing mean that the task of defence must also be automated. Artificial Intelligence, due to its particularities, meets this need. This technology has been playing an increasingly important role in Cybersecurity, even though we may still consider it to be at an early stage
International Journal of Innovative Science and Research Technology, 2023
Due to the expansion of the internet of things and connected devices, cyber security professionals in the modern digital world face a significant number of challenges. Experts require all available resources in order to both respond to attacks and prevent further security breaches. Due to factors such as heavy traffic, an increase in the number of security attack vectors, security vulnerabilities, and many others, the number of connected workplaces renders it impossible for humans to govern cyberspace without significant automation. However, designing software systems with conventionally mounted algorithms (decision-making logic that is hardwired) can be difficult. These algorithms are necessary to provide an effective defence against the growing number of network hazards. It is now common knowledge that adopting problem-solving strategies based on artificial intelligence is the key to effectively addressing the vast majority of cyber security issues currently being addressed. This article provides a concise analysis of cyber security applications for computers. In addition, it investigates the perspectives on how to enhance cyber security capabilities by providing applications that utilise artificial intelligence, in addition to the current methods
Artificial Intelligence in Cyber Security
Amit Rajbanshi, Shuvam Bhimrajka, C. K. Raina
Computer Science Department, AIT, Chandigarh, Kharar, Punjab, India
Abstract
Cyber-attackers unit investment automation technology to launch strikes, whereas many organisations unit still victimisation manual efforts to mixture internal security findings and contextualising them with external threat data. Victimisation these ancient ways that, it’ll take weeks or months to sight intrusions, throughout that amount attackers can exploit vulnerabilities to compromise systems and extract info. To wear down these challenges, progressive organisations unit exploring the employment of AI (AI) in their regular cyber risk management operations. The speed of processes and conjointly the amount of data to be used in defensive the cyberspace can’t be handled by humans whereas not sizeable automation. However, it’s hard to develop code with customarily mounted algorithms (hard-wired logic on deciding level) for effectively defensive against the dynamically evolving attacks in networks. this instance is also handled by applying methods of computing that supply flexibility and learning capability to code. it has become obvious that many cyber security problems is also resolved with success solely strategies of AI area unit obtaining used. for example, wide data usage is vital in deciding, and intelligent decision support is one altogether but unresolved problems in cyber security.
Keywords: Artificial Intelligence, Visual nets, Expert Systems, Challenges in Intelligent Cyber Security.
I. INTRODUCTION
Application of network central warfare makes cyber incidents notably dangerous, and changes in cyber security square measure urgently required. The new security ways that like the dynamic setup of secure perimeters, comprehensive state of affairs awareness, the very automated reaction on attacks in networks would need wide usage of AI ways that and knowledge- based mostly tools. Why has the role of intelligent code in cyber operations increased therefore rapidly? Wanting nearer at the cyber house, one can see the following answer. AI is needed, initial of all, for fast reaction to things in net. One ought to be ready to handle a slew of information in no time thus on make a case for and analyse events that happen in the cyber house and to create required decisions. The speed of processes and additionally the number of data to be used cannot be handled by humans whereas not substantial automation. However, it is hard to develop code with commonplace mounted algorithms (hardwired logic on deciding level) for effectively defensive
against the attacks in the cyber house, as results of new threats appear constantly.
II. METHODS AND MATERIAL
1. Artificial Intelligence
Artificial intelligence (AI) as a field of research (also referred to as machine intelligence at intervals the beginning) is sort of as previous as electronic computers area unit a break of building devices/software/systems extra intelligent than persons has been from the primary days of Al “on the horizon”. The matter is that the time horizon moves away once time passes. we’ve witnessed the determination of selection of showing intelligence exhausting problems by computers like enjoying smart chess, as AN example. Throughout the primary days of computing the chess enjoying was thought of a benchmark showing a real intelligence. Even in seventies of the last century, once the computer chess was on the master’s level, it appeared nearly not attainable to type a program which may beat the
planet champion. it’s typically accepted that AI can be thought of in two ways: as a science aimed toward creating AN try to get the essence of intelligence and developing usually intelligent machines, or as a science providing ways in which for determination sophisticated problems that cannot be resolved whereas not applying some intelligence like, as AN example, enjoying smart chess or making right selections supported large amounts of information. at intervals the gift paper we tend to are aiming to take the second approach, advocate for applying specific AI ways in which to cyber security problems. Artificial intelligence (AI) as a field of research (also referred to as machine intelligence at intervals the beginning) is sort of as previous as electronic computers area unit a break of building devices/software/systems extra intelligent than persons has been from the primary days of AI “on the horizon”. The matter is that the time horizon moves away once time passes. we’ve witnessed the determination of selection of showing intelligence exhausting problems by computers like enjoying smart chess, as AN example. Throughout the primary days of computing the chess enjoying was thought of a benchmark showing a real intelligence. Even in seventies of the last century, once the computer chess was on the master’s level, it appeared nearly not attainable to type a program which may beat the planet champion. it’s typically accepted that AI can be thought of in two ways: as a science aimed toward creating AN try to get the essence of intelligence and developing usually intelligent machines, or as a science providing ways in which for determination sophisticated problems that cannot be resolved whereas not applying some intelligence like, as AN example, enjoying smart chess or making right selections supported large amounts of information. at intervals the gift paper we tend to are aiming to take the second approach, advocate for applying specific AI ways in which to cyber security problems.
2. Identification of Threats
Organisations face Associate in nursing uphill battle once it involves cyber security since the attack surface they need to shield has dilated considerably and is predicted to balloon even any. Within the past, it had been comfortable to specialise in the network and end protection, however currently with applications, cloud
services, and mobile devices (e.g., tablets, mobile phones, Bluetooth devices, and good watches) organisations are battling a generally extended attack surface. This “wider and deeper” attack surface solely adds to the prevailing downside of the way to manage the amount, velocity, and quality of knowledge generated by the myriad of IT and security tools in a company. The feeds from these disconnected systems should be analysed, normalised, and remedy efforts prioritised. The additional tools, the harder the challenge. And therefore the broader the attack surface, the additional knowledge to research. Historically, this approach needed legions of employees to comb through the massive quantity of knowledge to attach the dots and realise latent threats. These efforts took months, throughout which era attackers exploited vulnerabilities and extracted knowledge. Breaking down existing silos and automating ancient security operations tasks with the assistance of technology has thus become a forcemultiplier for supplementing scarce cyber security operations talent. during this context, the utilisation of human-interactive machine learning engines will change the aggregation {of knowledge of information} across completely different knowledge types; map assessment data to compliance requirements; and normalise the knowledge to rule out false-positives, duplicates, and enrich knowledge attributes.
3. Risk Assessmen
Once internal counterintelligence is contextualised with external threat information (e.g., exploits, malware, threat actors, reputational intelligence), these findings should be correlated with business criticality to see the $64000 risk of the protection gaps and their final impact on the business. Ultimately, not knowing the impact a “coffee server” has on the business compared to AN “email server”, makes it nearly not possible to focus rectification efforts on what very matters. During this context, human-interactive machine learning and advanced algorithms play a giant role in driving the suitable response to individual risks.
4. Orchestration of remedy
Increasing collaboration between security groups that square measure chargeable for characteristic security gaps and IT operations groups that square measure centred on remediating them, continues to be a challenge for several organisations. Employing a risk-
based cybersecurity conception as a blueprint, it’s attainable to implement automatic processes for proactive security incident notification and humaninteractive loop intervention. By establishing thresholds and pre-defined rules, organisations also can orchestrate remedy actions to repair security gaps in an exceedingly timely fashion. Too often, unsupervised machine learning contributes to Associate in the nursing onslaught of false positives and alerts, leading to alert fatigue and a decrease in attention. For opponents of AI, this outcome provides ammunition they generally use to discredit machine learning generally. Whether or not we elect to admit it or not, we’ve reached a tipping purpose whereby the sheer volume of security knowledge will now not be handled by humans. This has junction rectifier to the emergence of questionable human-interactive machine learning, an idea propagated among others by MIT’s engineering science and computer science lab. Human-interactive machine learning systems analyse internal counterintelligence and correlate it with external threat knowledge to purpose human analysts to the needles within the stack. Humans then give feedback to the system by tagging the foremost relevant threats. Over time, the system adapts its observation and analysis supported human inputs, optimising the chance of finding real cyber threats and minimising false positives.
Enlisting machine learning to try and do the work in initial line security knowledge assessment permits analysts to concentrate on a lot of advanced investigations of threats instead of acting military science knowledge crunching. This meeting of the minds, whereby AI is applied employing a humaninteractive approach holds plenty of promise for fighting, detecting, and responding to cyber risks.
5. Visual nets
Visual nets have associate degree extended history that begins with the invention of perception by Frank Rosenblatt in 1958 - a synthetic nerve cell that has remained one among the foremost well-liked elements of neural nets. Already to a small degree type of perceptions combined on can learn and solve fascinating problems. But neural nets can embody the associate degree outsized type of artificial neurones. Therefore neural nets provide a utility of massively parallel learning and decision-making. Their most
distinguishing feature is that the speed of operation. They’re compatible for learning pattern recognition, for classification, for selection of responses to attacks etc. They can be enforced either in hardware before in software package system. Neural nets are well relevant in intrusion detection and intrusion bar. There are proposals to use them in DOS detection, laptop worm detection, spam detection, zombie detection, and malware classification and in rhetorical investigations. A reason for the popularity of neural nets in cyber security is their high speed if enforced in hardware or used in graphic processors. There are new developments among the neural nets technology: third generation neural nets prickling neural networks that imitate organic neurones plenty of realistically and provide plenty of application opportunities.
6. Expert systems
This square measure unquestionably the foremost wide used AI tools. The Associate competent system is software for locating answers to queries in some application domain conferred either by a user or by software. It’ll be directly used for ninety-eight decision support, e.g. in identification, in finances or in an electronic network. There’s an honest type of competent systems from very little technical diagnostic systems to really huge and hybrid systems for finding advanced problems. Conceptually, the associate competent system includes a mental object, where competent data a number of specific application domains square measure hold on. Besides the content, it includes associated logical thinking engine for account answers supported this data and, possibly, additional data a few state of affairs. Empty mental object and logical thinking engine square measure on referred to as competent system shell - it ought to be stuffed with data before it’ll be used. this method shell ought to be supported by software for adding data at intervals the mental object, and it can be extended with programs for user interactions, and with completely different programs that can be utilised in hybrid competent systems. Developing associate competent system suggests that, first, selection/adaptation of associate competent system shell and, second, exploits competent data and filling the content with the data. The second step is out and away a heap of troublesome and time overwhelming than the first. There square measure many tools for developing professional systems. In general, a tool includes associate
professional system shell and has jointly a utility for adding data to the knowledge repository. Professional systems can have additional utility for simulation, for making calculations etc. There square measure several numerous data illustration forms in professional systems; the foremost common could be a rule-based illustration. But the utility of associate professional system depends primarily on the quality of data at intervals the professional system’s knowledge base, and not most of the inner kind of the knowledge illustration. This leads one to the data acquisition disadvantage that is crucial in developing real applications. An example of a Cyber Security professional system is one for security planning. This professional system facilitates considerably selection of security measures and provides steering for best usage of restricted resources. There square measure early works on practice professional systems in intrusion detection.
7. Intelligent agents
Intelligent agents are package system parts that possess some choices of intelligent behavior that produces them special: pro-activeness, understanding of associate agent communication language, reactivity (ability to create some alternatives and to act). They’ll have a planning ability, quality and reflection ability. At intervals the software package engineering community, there’s an inspiration of software package agents where they’re thought of to be objects that are a minimum of proactive and have the pliability to use the agent communication language. comparison agents and objects, one can say that objects is additionally passive, which they are doing not got to understand any language victimization intelligent agents in security against DDoS has been diagrammatical, where simulation shows that cooperating agents can effectively defend against DDoS attacks. Once determination some legal and jointly industrial many problems, it ought to be come-at-able in premise to develop a “cyber police” subsisting of mobile intelligent agents. This could want implementation of infrastructure for supporting the cyber agents’ quality and communication, but ought to be inaccessible for adversaries. This could want cooperation with ISP-s. Multi-agent tools can offer a heap of complete operational image of the cyber house, as associate example, a hybrid multi-agent and neural networkbased intrusion detection methodology has been
projected. Agent-based distributed intrusion detection is diagrammatical.
8. Search
Search is also a universal technique of drawback finding which can be applied altogether cases once no alternative ways of drawback finding square measure applicable. People apply to search in their way of life constantly, whereas not paying attention to it. very little ought to be identified therefore on use some general search formula among the formal setting of the search problem: one ought to be ready to generate candidates for solutions, and a procedure ought to be out there for deciding whether or not or not a planned candidate satisfies the requirements for a solution. However, if additional info is also exploited to guide the search, then the efficiency of search might be drastically improved. Search is a gift in some sort nearly in every intelligent program, and its efficiency is normally very important to the performance of the total program. A superb type of search ways that square measure developed that take underneath though the precise info relating to specific search problems. Although many search ways that square measure developed in AI, which they’re wide utilized in many programs, it’s seldom thought about as a result of the usage of AI. for example, dynamic programming is really utilized to find optimum security problems, the search is hidden among the package Associate in Nursing it isn’t visible as an AI application. Search on and or trees, αβ-search, minimax search and random search so. Live wide utilised in games package, and that they square measure useful in decision-making for cyber security. The αβ-search formula, originally developed for computer chess, is Associate in the Nursing implementation of a generally useful preparation of “divide and conquer” in downside finding, and principally when deciding once a pair of adversaries square measure choosing their very best actions. It uses the estimates of minimally secured win and maximally achievable loss. this permits one generally to ignore a lot of selections and considerably to hurry up the search.
9. Learning
Learning is raising a knowledge system by extending or rearranging its cognition or by raising the logical thinking engine. usually, this can be] often one altogether the foremost fascinating problems with AI
that’s to a lower place intensive investigation. Machine learning includes procedure ways for obtaining new knowledge, new skills and new ways that that to prepare existing knowledge. Problems of learning vary greatly by their complexity from straightforward constant learning that suggests learning values of some parameters, to troublesome types of symbolic learning, for instance, learning about concepts, grammars, functions, even learning of behaviour. AI provides ways for every – supervised learning any as unattended learning. The latter is incredibly useful inside the case of presence of huge amount of information, and usually, this can be} often common in cyber security where large logs are going to be collected. Processing has originally adult out of unattended learning in AI. Unattended learning is going to be a utility of neural nets, especially, of self-organizing maps. A distinguished class of learning ways is established by parallel learning algorithms that area unit applicable for execution on parallel hardware. These learning ways area unit delineate by genetic algorithms and neural nets. Genetic algorithms and formal logic have been, as AN example, utilised in threat detection systems drawn.
10. Constraint Finding
Constraint finding or constraint satisfaction is also a technique developed in AI for locating solutions for problems that space unit is given by giving a cluster of constraints on the answer, e.g. logical statements, tables, equations, inequalities. AN answer of a drag might be an assortment of values that satisfy all constraints. Actually, there are a unit several numerous constraint determination techniques, indulgent on the character of constraints. On a very abstract level, nearly any drawback are given as a constraint satisfaction drawback. notably, many planning problems are given as constraint satisfaction problems. These problems are a unit difficult to resolve as a result of a great deal of search needed unremarkably. All constraint determination ways area unit aimed at limiting the search by taking into thought specific data relating to the actual class of problems. Constraint determination is employed in situation analysis and decision support alongside logic programming.
III. RESULTS AND DISCUSSION
V.
Challenges in Intelligent Cyber Security
When springing up with the long-standing time analysis, development and application of AI ways that in Cyber Security, one must distinguish between the immediate goals and long views. There square measure varied AI ways that directly applicable in Cyber Security, and gift square measure immediate Cyber Security problems that has to plenty of intelligent solutions than square measure implemented these days. As nevertheless we tend to have mentioned these existing immediate applications. inside the future, one can see promising views of the appliance of totally new principles of knowledge handling in state of affairs management and deciding. These principles embrace introduction of a customary and stratified knowledge style inside the deciding software. this type of style has been planned. A troublesome application house is that the information management for net central warfare. solely automatic knowledge management can guarantee quick state of affairs assessment that gives a alternative superiority to leaders and call makers on any C2 level. Knowledgeable systems square measure already obtaining employed in many applications, usually hidden inside associate degree application, like inside the safety measures springing up with software. However, knowledgeable systems can get wider application, if huge knowledge bases square measure going to be developed. this might want tidy investment in knowledge acquisition, and development of vast customary knowledge bases. Considering plenty of distant future – a minimum of some decades ahead, perhaps invariably we must always} always not command United States to the “narrow AI”. Some people square measure convinced that the grand goal of the AI development of artificial general intelligence can be reached inside the middle of the current century. the first conference on artificial general intelligence was management in 2008 at the University of Memphis. The Singularity Institute for AI, supported in 4000, warns researchers of a danger that exponentially faster development of intelligence in computers might occur. This development might end in Singularity, delineate in follows: "The Singularity is that the technological creation of smarter-than-human intelligence. There square measure several technologies that square measure sometimes mentioned as heading throughout this direction. The foremost sometimes mentioned is
probably AI; but there square measure others several altogether totally different technologies that, if they reached associate degree intensity of sophistication, would modification the creation of smarter-than-human intelligence. a chance that has smarter-than-human minds is truly altogether totally different in a terribly manner that goes on the so much aspect the customary visions of a future stuffed with advanced devices." A scientist has expected the event to return back up with Singularity. One needn’t to believe the Singularity threat; but the quick development of data technology can actually modification one to create considerably higher intelligence into computer code system in coming back years. Severally of whether or not or not the artificial general intelligence is gettable or Singularity comes, it’s crucial to possess the facility to use higher AI in cyber security than the offenders have it.
IV. CONCLUSION
In the gift situation of quickly growing intelligence of malware and category of cyber-attacks, it’s unavoidable to develop intelligent cyber security ways that. The experience in DDoS mitigation has shown that even a security against large-scale attacks are unbowed with rather restricted resources once intelligent ways that square measure used. Associate in Nursing analysis of publications shows that the AI results most usually applicable in cyber security square measure provided by the analysis in artificial visual nets. Applications of visual nets will keep it up in cyber security. there’s to boot an essential would love for application of intelligent cyber security ways that in several areas where neural nets don’t seem to be the foremost acceptable technology. These square measure as are referred to as support, situation awareness and knowledge management. skilled system technology is that the foremost promising throughout this case. it’s not clear but quick development of gneral computing is ahead, but a threat exists that a replacement level of computing might additionally be utilized by the attackers, as presently as a result of it becomes procurable. Obviously, the new developments in data understanding, illustration and handling what is more in machine learning will greatly enhance the cyber security capability of systems that may use them.
V. REFERENCES
[1]. (George, january 11,2017) http://www.securityweek.com/role-artificial-intelligence-cyber-security
[2]. E. Tyugu. Algorithms and Architectures of engineering. IOS Press. 2007.
[3]. B. Mayo, E. Tyugu, J. Penjam. Constraint Programming. alignment ASI Series, v. 131, SpringerVerlag. 1994.
[4]. I. Bratko. logic programming Programming for engineering. Addison-Wesley, 2001 (third edition).
[5]. http://singinst.org/overview/whatisthesingularity/
[6]. F. Rosenblatt. The Perceptron – a perceiving and recognising automaton. Report 85-460-1, Cornell natural philosophy Laboratory, 1957.
[7]. F. Barika, K. Hadjar, and N. El-Kadhi, “Artificial neural network for mobile IDS resolution,” in Security and Management, 2009.
[8]. P. Norvig, S. Russell. Artificial Intelligence: fashionable Approach. tiro Hall, 2000.
[9]. http://en.wikipedia.org/wiki/Expert_system. accomplished System. Wikipedia.
[10]. http://en.wikipedia.org/wiki/Conficker
[11]. TF. Lunt, R. Jagannathan. AN example amount of your time Intrusion-Detection accomplished System.Proc. IEEE conference on Security and Privacy, 1988, p. 59.
[12]. V. Chatzigiannakis, G. Androulidakis, B. Maglaris. A Distributed Intrusion Detection example pattern Security Agents. HP OpenView University Association, 2004.
[13]. R. Kurzweil. The Singularity is near. Norse Adult. 2005.
[14]. J. Kivimaa, A. Ojamaa, E. Tyugu. graded Security accomplished System. Lecture Notes in engineering, v. 5508. Springer, 2009, 279-286.
[15]. J. Kivimaa, A. Ojamaa, E. Tyugu. Pareto-Optimal state of affairs Analysis for the selection of Security Measures. Proc. Milcom, 2008.
[16]. B. Iftikhar, A. S. Alghamdi, “Application of artificial neural network within the detection of dos attacks,” in SIN '09: Proceedings of the ordinal international conference on Security of knowledge and networks. New York, NY, USA: ACM, 2009, pp. 229-234.
[17]. P. Central yank country et al. Framework for Zombie Detection pattern Neural Networks. In: Fourth International Conference on web observance and Protection ICIMP-09, 2009.
[18]. J. Bai, Y. Wu, G. Wang, S. X. Yang, and W. Qiu, a very distinctive intrusion detection model based on multilayer self-organizing maps and principal part analysis, in Advances in Neural Networks. Lecture Notes in engineering. Springer, 2006.
References (17)
- V. REFERENCES
- George, january 11,2017)
- E. Tyugu. Algorithms and Architectures of engineering. IOS Press. 2007.
- B. Mayo, E. Tyugu, J. Penjam. Constraint Programming. alignment ASI Series, v. 131, Springer- Verlag. 1994.
- I. Bratko. logic programming Programming for engineering. Addison-Wesley, 2001 (third edition).
- F. Rosenblatt. The Perceptron --a perceiving and recognising automaton. Report 85-460-1, Cornell natural philosophy Laboratory, 1957.
- F. Barika, K. Hadjar, and N. El-Kadhi, "Artificial neural network for mobile IDS resolution," in Security and Management, 2009.
- P. Norvig, S. Russell. Artificial Intelligence: fashionable Approach. tiro Hall, 2000.
- TF. Lunt, R. Jagannathan. AN example amount of your time Intrusion-Detection accomplished
- System.Proc. IEEE conference on Security and Privacy, 1988, p. 59.
- V. Chatzigiannakis, G. Androulidakis, B. Maglaris. A Distributed Intrusion Detection example pattern Security Agents. HP OpenView University Association, 2004.
- R. Kurzweil. The Singularity is near. Norse Adult. 2005.
- J. Kivimaa, A. Ojamaa, E. Tyugu. graded Security accomplished System. Lecture Notes in engineering, v. 5508. Springer, 2009, 279-286.
- J. Kivimaa, A. Ojamaa, E. Tyugu. Pareto-Optimal state of affairs Analysis for the selection of Security Measures. Proc. Milcom, 2008.
- B. Iftikhar, A. S. Alghamdi, "Application of artificial neural network within the detection of dos attacks," in SIN '09: Proceedings of the ordinal international conference on Security of knowledge and networks. New York, NY, USA: ACM, 2009, pp. 229-234.
- P. Central yank country et al. Framework for Zombie Detection pattern Neural Networks. In: Fourth International Conference on web observance and Protection ICIMP-09, 2009.
- J. Bai, Y. Wu, G. Wang, S. X. Yang, and W. Qiu, a very distinctive intrusion detection model based on multilayer self-organizing maps and principal part analysis, in Advances in Neural Networks. Lecture Notes in engineering. Springer, 2006.