Artificial Intelligence in Cyber Security

Authors

  • Amit Rajbanshi  Computer Science Department, AIT, Chandigarh, Kharar, Punjab, India
  • Shuvam Bhimrajka  Computer Science Department, AIT, Chandigarh, Kharar, Punjab, India
  • C. K. Raina  Computer Science Department, AIT, Chandigarh, Kharar, Punjab, India

Keywords:

Artificial Intelligence, Visual nets, Expert Systems, Challenges in Intelligent Cyber Security.

Abstract

Cyber-attackers unit investment automation technology to launch strikes, whereas many organisations unit still victimisation manual efforts to mixture internal security findings and contextualising them with external threat data. Victimisation these ancient ways that, it'll take weeks or months to sight intrusions, throughout that amount attackers can exploit vulnerabilities to compromise systems and extract info. To wear down these challenges, progressive organisations unit exploring the employment of AI (AI) in their regular cyber risk management operations. The speed of processes and conjointly the amount of data to be used in defensive the cyberspace can't be handled by humans whereas not sizeable automation. However, it's hard to develop code with customarily mounted algorithms (hard-wired logic on deciding level) for effectively defensive against the dynamically evolving attacks in networks. this instance is also handled by applying methods of computing that supply flexibility and learning capability to code. it has become obvious that many cyber security problems is also resolved with success solely strategies of AI area unit obtaining used. for example, wide data usage is vital in deciding, and intelligent decision support is one altogether but unresolved problems in cyber security.

References

  1.  (George, january 11,2017) http://www.securityweek.com/role-artificial-intelligence-cyber-security
  2. E. Tyugu. Algorithms and Architectures of engineering. IOS Press. 2007.
  3. B. Mayo, E. Tyugu, J. Penjam. Constraint Programming. alignment ASI Series, v. 131, Springer-Verlag. 1994.
  4. I. Bratko. logic programming Programming for engineering. Addison-Wesley, 2001 (third edition).
  5. http://singinst.org/overview/whatisthesingularity/
  6. F. Rosenblatt. The Perceptron -- a perceiving and recognising automaton. Report 85-460-1, Cornell natural philosophy Laboratory, 1957.
  7. F. Barika, K. Hadjar, and N. El-Kadhi, “Artificial neural network for mobile IDS resolution,” in Security and Management, 2009.
  8. P. Norvig, S. Russell. Artificial Intelligence: fashionable Approach. tiro Hall, 2000.
  9. http://en.wikipedia.org/wiki/Expert_system. accomplished System. Wikipedia.
  10. http://en.wikipedia.org/wiki/Conficker
  11. TF. Lunt, R. Jagannathan. AN example amount of your time Intrusion-Detection accomplished System.Proc. IEEE conference on Security and Privacy, 1988, p. 59.
  12. V. Chatzigiannakis, G. Androulidakis, B. Maglaris. A Distributed Intrusion Detection example pattern Security Agents. HP OpenView University Association, 2004.
  13. R. Kurzweil. The Singularity is near. Norse Adult. 2005.
  14. J. Kivimaa, A. Ojamaa, E. Tyugu. graded Security accomplished System. Lecture Notes in engineering, v. 5508. Springer, 2009, 279-286.
  15. J. Kivimaa, A. Ojamaa, E. Tyugu. Pareto-Optimal state of affairs Analysis for the selection of Security Measures. Proc. Milcom, 2008.
  16. B. Iftikhar, A. S. Alghamdi, “Application of artificial neural network within the detection of dos attacks,” in SIN ’09: Proceedings of the ordinal international conference on Security of knowledge and networks. New York, NY, USA: ACM, 2009, pp. 229–234.
  17. P. Central yank country et al. Framework for Zombie Detection pattern Neural Networks. In: Fourth International Conference on web observance and Protection ICIMP-09, 2009.
  18. J. Bai, Y. Wu, G. Wang, S. X. Yang, and W. Qiu, a very distinctive intrusion detection model based on multilayer self-organizing maps and principal part analysis, in Advances in Neural Networks. Lecture Notes in engineering. Springer, 2006.

Downloads

Published

2017-06-30

Issue

Section

Research Articles

How to Cite

[1]
Amit Rajbanshi, Shuvam Bhimrajka, C. K. Raina, " Artificial Intelligence in Cyber Security, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 3, pp.132-137, May-June-2017.