Preview

AI in cyber Defense

Powerful Essays
Open Document
Open Document
2430 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
AI in cyber Defense
Artificial Intelligence In Cyber
Defense
Qurat-ul-Ain Aftab IEEE, Sana Binte Tahir IEEE, Farah Haseen IEEE,
International Islamic University Islamabad. qsf@ieee.org

Abstract-The speed of procedures and the amount of data to be used in defending the cyber space cannot be controlled by humans without significant automation. On the other hand, it is hard to develop software with conservative fixed algorithms (hard-wired logic on decision making level) for efficiently defending in opposition to the vigorously evolving attacks in networks. The applications of artificial intelligence can be used to handle this situation that offers flexibility and learning potential to software. A brief review of artificial intelligence applications in cyber defense, and analysis of prospects of enhancing the cyber defense capabilities by increasing the intelligence of the defense systems have been presented in this paper. After surveying the papers available about artificial intelligence applications in cyber defense, we conclude that useful applications are already present. They belong to applications of artificial neural nets in perimeter defense and some other cyber defense fields. So it has become clear that only AI techniques can guarantee successful solutions to many cyber defense problems. For instance, use of extensive

knowledge is essential in decision making, and intelligent decision support is so far one of unanswered problems in cyber defense.

1. INTRODUCTION:
1.1. Background of Study.
1.1.1. Limitations in cyber security that are need to be addressed.
Cyber security is a multidisciplinary field that is targeted on reduction of risks to the secrecy, affinity and integrity of data, information and resources in computer as well as in network systems. Modern systems have become much complex. Need for an intelligent, adaptive and multimodal solution raises here for which best suited approach is artificial



References: [1]. AI and Cyber Security, May 2013, http://nlp.lsu.edu/flairs26-ai&cybersecurity.htm [2].Cybersecurity and Artificial Intelligence,  http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=04639011. [3].  Artificial Intelligence in Cyber Defense, Enn TyuguR&D Branch .2011. http://www.ccdcoe.org/publications/2011proceedings/ArtificialIntelligenceInCyberDefense-Tyugu.pdf [4]. E. Tyugu. Algorithms and Architectures of Artificial Intelligence. IOS Press. 2007. [5]. R. Kurtzwell. The Singularity is Near. Viking Adult. 2005. [6].http://www.ted.com/webcast/archive/event/ibmwatson [7].http://www.homelandsecuritynewswire.com/new-cctv-cameras-can-see-and-hear ------------------------------------------------------

You May Also Find These Documents Helpful

  • Powerful Essays

    their defensive controls at the perimeter in the belief that this makes it difficult for…

    • 5023 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    BIO 104 Chapter 3

    • 7229 Words
    • 29 Pages

    Chapter 3 Cell Function and Structure Wonder Drug j What You Will Be Learning 3.1 How Penicillin Was Discovered 3.2 Cell Theory: All Living Things Are Made of Cells 3.3 Membranes: All Cells Have Them 3.4 Prokaryotic and Eukaryotic Cells Have Different Structures 3.5 Some Antibiotics Target Bacterial Cell Walls 3.6 Some Antibiotics Inhibit Prokaryotic Ribosomes 3.7 Molecules Move across the Cell Membrane 3.8 Eukaryotic Cells Have Organelles UP CLOSE Eukaryotic Organelles 39 3620001C03.indd 39 1/27/11 10:14 AM Chapter 3 Cell Function and Structure Wonder Drug How a chance discovery in a London laboratory revolutionized medicine O n a September morning in 1928, biologist Alexander Fleming returned to his laboratory at St. Mary’s Hospital in London after a short summer vacation. As usual, the place was a mess—his bench piled high with the petri dishes on which he was growing bacteria.…

    • 7229 Words
    • 29 Pages
    Powerful Essays
  • Satisfactory Essays

    IS4799

    • 675 Words
    • 8 Pages

     Importance • Significant amount of supplemental information IS4799 Information Systems and Cybersecurity Capstone Project © ITT Educational Services, Inc. All rights reserved. Page 4 Key Concepts  Clarification • Additional information to clarify RFP contents…

    • 675 Words
    • 8 Pages
    Satisfactory Essays
  • Better Essays

    Hardware can be used to protect the network from outside threats. Intrusion detection systems (IDS) automate detection of threats and attack through traffic analysis. Cisco’s IDS “delivers a comprehensive, pervasive security solution for combating unauthorized intrusions, malicious Internet worms, along with bandwidth and e-Business application attacks” (Cisco Systems, 2007, Cisco Intrusion Detection). They take this one-step further with an intrusion prevention systems (IPS). IPS shifts the focus on the attacker, not the attack itself, by increasing the accuracy of threat prevention through global threat analysis (Cisco Systems, 2012, Intrusion Prevention System with Global Correlation). The Cisco Adaptive Security Appliances (ASA) “combines the industry 's most deployed stateful inspection firewall with…

    • 890 Words
    • 4 Pages
    Better Essays
  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Powerful Essays

    Isc363 Phase 3

    • 1899 Words
    • 8 Pages

    As we progress forward, a few specific requirements such as software and data, information and hardware must be obtained in order to identify the type of system needed. The collected information is vital when determining the type of classifications and what is needed to insure the items or information is being secured. When it comes to threat identification, are level of threats is categorize…

    • 1899 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Software is an integral part of most defense systems. Following are two reasons why software…

    • 2470 Words
    • 16 Pages
    Powerful Essays
  • Powerful Essays

    This risk assessment was to identify threats and vulnerabilities related to the Department of the Army (DoA) Information Technology (IT) systems. It will be utilized to identify vulnerabilities in the Computer Network Defense (CND) Capabilities and mitigation plans related to DoA’s IT systems. It was realized that this was a potential high-risk system as noted by the Department of Defense (DoD) Chief Information Officer (CIO). (DoD, 2012)…

    • 1633 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Cyber-security demands are ever increasing in the field of Information Technology with the globalization of the internet. Disruptions due to cyber-attacks are affecting the economy, costing companies billions of dollars each year in lost revenue. To counter this problem corporations are spending more and more on infrastructure and investing to secure the cyber security vulnerabilities which range anywhere from software to hardware to networks and people that use them. Due to the complexity of information systems that interact with each other and their counter parts, the requirement to meet specific cyber security compliances have become a challenging issues for security professionals worldwide. To help with these issues, security professionals have created different standards and frameworks over the years for addressing this growing concern of vulnerabilities within enterprise systems and the critical information they hold (“Critical Security Controls,” n.d.).…

    • 3199 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Bibliography: U.S. Department of Homeland Security. (n.d.). Cyber-Security. Retrieved from Department of Homeland Security: http://www.dhs.gov/cybersecurity…

    • 1965 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Assuming command of any Army organization presents a number of challenges a commander must be prepared to confront. Leaders must be cognizant of the “mental shift” required when moving into the position, and how he may execute the principles of mission command. Furthermore, commanders must fully appreciate the need to accurately assess the organization he’s been charged to lead. It so happens, history provides numerous examples of senior officers succeeding and failing in these endeavors. A critical analysis of LTG Matthew Ridgway’s command of the Eight Army and their success during the Korean War highlights these two concepts.…

    • 1557 Words
    • 7 Pages
    Good Essays
  • Good Essays

    CSIA Renews Call for Congressional Action on Cyber Security . (2007, September 6). Retrieved October 9, 2007, from https://www.csialliance.org…

    • 302 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Computer security is made up of digital forensic, network security, and preventing malware, and is a rapidly growing field that involves gathering and analyzing evidence from computers and networks. Because computers and the internet are the fastest growing technology used for criminal activity, the need for computer security managers will increase in years to come.…

    • 525 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Incident response begins with prevention and security awareness (figure 1). In the case of malware attacks such as viruses, worms or Trojan horses, defense-in-depth plays a large role in the defense and early detection of potential threats to information systems connected to the internet. Personnel utilizing these assets also play a large role in defending and protecting these assets. Authorized users should be aware of all policies and procedures pertaining to the proper use of all networks, applications, and systems within the organization. The frequency of incidents can be greatly reduced through user awareness (Whitman, Mattord, & Green, 2014).…

    • 805 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Military Ai

    • 2895 Words
    • 12 Pages

    The significant advances of artificial intelligence have convinced the US military to increase spending into its research by at least $487 billion in an environment that is calling for budget cuts. With the help of these machines the death rate could be significantly reduced in the future. All contrary arguments come down to moral disagreements concerning the lack of human morals that bind most modern soldiers coupled with the ever present danger of hacking attempts. However, machines can be considered more consistent than a human and as the programs rapidly evolve it will become nigh on impossible to hack them. The rapidly advancing field of artificial intelligence would greatly benefit the military as operation planning would be made easier, soldiers could be trained both better and faster and existing drone technologies could be further augmented.…

    • 2895 Words
    • 12 Pages
    Best Essays