IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 9 - Issue 10, October 2020 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Survey On The Applications Of Artificial Intelligence In Cyber Security

[Full Text]

 

AUTHOR(S)

Shidawa Baba Atiku, Achi Unimke Aaron, Goteng Kuwunidi Job, Fatima Shittu, Ismail Zahraddeen Yakubu

 

KEYWORDS

Artificial Intelligence (AI), AI Engines, Cyber Attacks, Cyber Security, Deep Learning (DL), Machine Learning (ML), Scanning Engine

 

ABSTRACT

the rise in cyber attacks has overwhelmed the monetary resources and human ability to analyze and combat every new form of cyber threat in the cyber security industry. With the increasing digital presence, there is a large amount of personal and financial information that should be protected from cyber attacks. In fact, cyber attacks can ruin the reputation of an organization or letdown the organization completely. This research examines the use of AI in the enhancement of cyber security. Recent developments in artificial intelligence are transformational and have exceeded the level of human performance in tasks such as data analytics. The study adopted the thematic literature review method, and data were sourced from Google scholar, science direct, research gates, academia, and others. The investigation revealed that application of AI in controlling cyber attack has advantages and disadvantages; however, the advantages outweigh the disadvantages. This researcher discovers that with the speedy and efficient technology required to operate AI systems, they are likely to improve the protection of customers and businesses in the cyberspace. This is proven by the increasing deployment of AI engines rather than conventional scanning engines in cyber security.

 

REFERENCES

[1] S. Bhutada and P. Bhutada, Application of Artificial Intelligence in Cyber Security: in IJERCSE, 2018, 5(4): 214-219
[2] P.V. Alberto, lecture, Topic: Application of Artificial Intelligence (AI) to Network Security”, ITEC 625, University of Maryland, University College, Maryland, Mar. 2018.
[3] Avira, The Application of AI to Cybersecurity – An Avira White Paper, Germany, Avira Operation, 2017.
[4] S. A Panimalar, U.G. Pai and K.S. Khan, “AI Techniques for Cyber Security”, International Research Journal of Engineering and Technology, vol. 5, 3, pp. 122-124, Mar. 2018. Available: https://www.irjet.net [assessed May. 29, 2020]
[5] T.S. Tuang. Diep.Q. B, and Zelinka. I, Artificial Intelligence in the Cyber Domain: Offense and Defense: Symmetry, 2020, 12,410 available: www.mdp.com/journal/symmetry on [assessed Apr. 20, 2020]
[6] E. Kanal, Machine Learning in Cybersecurity: Carnegie Mellon University Software Engineering Institute, available onhttp://insights.sei.cnu.edu./sei_blog/2017/06/machine_learning_in_cybersecurity.html
[7] D. Selma, C. Huseyin and A. Mustafa, Application of Artificial Intelligence Techniques to Combating Cyber Crimes: A Review, International Journal of Artificial Intelligence &Applications, vol. 6, issue 1, pp. 21-39, January 2015.
[8] T. Enn, “Artificial Intelligence in Cyber Defense”, in Proceedings of 3rd International Conference on Cyber Conflicts [ICCC], 7-10 June, 2011 Tallin Estonia.
[9] P. Dennis, A. Stuart, “Global Challenges: Twelve risks that threaten human civilization, Global Challenges Foundation”: 2015,Available: http://globalchallenges.org /wp-content/ uploads/12-Risks-with-infinite-impact.pdf [accessed Jun. 3, 2020]
[10] R. Stuart, D. Daniel, T. Max, ‘‘Research Priorities for Robust and Beneficial Artificial Intelligence’’, AI Magazine, vol. 36, issue 4, pp. 105-114, Winter 2015
[11] National Science & Technology Council, “Artificial Intelligence and Cybersecurity: Opportunities and Challenges” Net. & Info.Tech R&D Sub-comtt and the ML & AI Sub-comtt, 2020.
[12] A. M. Shamiulla, Role of Artificial Intelligence in Cyber Security, International Journal of Innovative Technology and Exploring Engineering, vol. 9 issue 1 pp. 4628-4630, November 2019
[13] P. Pranav, “Artificial Intelligence in cyber security”, International Journal of Research in Computer Applications & Robotics, vol 4, 1, pp.1-5, May 2016
[14] J. Kivimaa, A. Ojamaa, E. Tyugu. Graded Security Expert System. Lecture Notes in Computer Science, v. 5508. Springer, 2009, 279-286.
[15] B. Christain, D.A. Elizondo and T. Watson, “Application of artificial neural networks and related techniques to intrusion detection”, World Congress on Computation Intelligence, pp 949-954, 2010
[16] E. Tyugu, “Artificial Intelligence in Cyber Defense”, International conference on Cyber Conflict, vol. 3, pp. 95-105, Tallinn, Estonia, Jan. 2011
[17] W. Nadine and K. Hadas, “Artificial Intelligence in Cybersecurity”, Cyber, Intelligence, and Security, vol. 1, 1, pp. 103-119, Jan. 2017
[18] S. Dima, M. Robert, B. Zvi, S. Shahar and E. Yuval, “Using Artificial Neural Network to Detect Unknown Computer Worms”, Neural Computing and Applications, vol.18, 7, pp. 663-674, Oct. 2009
[19] E. H. Geoffrey, O. Simon and T. Yee-Whye, “A Fast Learning Algorithm for Deep Belief Nets”, Neural Computation, vol. 18, no. 7, pp. 1527-1554, 2006
[20] V. Thomson, “Cyber Attacks Could be Predicted with Artificial Intelligence”, iTechPost,www.itechpost.com/articles/1734 7/cyber-attacks-predicted-artificial-intelligen ce-help.htm, Apr. 21, 2016 [Jun. 2, 2020]
[21] S. Franklin and A. Graesser, “Is It an Agent, or Just a Program? A Taxonomy for Autonomous Agents”, Third International Workshop on Agent Theories, Architectures, and Languages, no. 3, pp. 21-35, 1997
[22] Y. Xia and L. Junshan, “A Security Architecture Based on Immune Agents for MANET”, International Conference on Wireless Communication and Sensor Computing, no. , pp. 1-5, 2010
[23] M. F. AbRazak, etal, “Bio-inspired for features optimization and malware detection.Arabian Journal of Science and Engineering, no. 43, pp. 6963–6979. 2018
[24] A. Fatima, etal, “Android Malware Detection Using Genetic Algorithm based Optimized Feature Selection and Machine Learning”, In Proceedings of the 42nd International Conference on Telecommunications and Signal Processing (TSP), Budapest, Hungary, 1–3 July 2019; pp. 220–223.
[25] R.A.R Ashfaq, etal, “Fuzziness based semi-supervised learning approach for intrusion detection system”. Inf. Sci. 2017, 378, 484–497.
[26] L. Lazic, “Benefits from AI in Cyber Security”, The 11th international Conference on Business Information Security, 18th Oct. 2019, Belgrade, Serbia, pp. 1-9