Cyber-Security And AI
- Concepts
- Computer Science And IT
- BlockChain
- Medical Informatics
- Multimedia Computing
- Digital Currencies – Bitcoin and cryptocurrencies
- Context-Aware Search System (CASS)
- Big Data
- Industrial Internet of things (IIoT)
- Assisted reality and virtual reality
- Deep learning - Artificial Intelligence and Machine Learning
- Cryptography
- Embedded System
- Databases and Data mining
- Computer Vision
- Wireless Body Area Network (WBAN)
- Computer Graphics and Visualization
- Operating Systems
- Data Privacy
- Programming Languages and Systems
- Scientific And Numerical computing
- Cyber-Security And AI
- Softwre Engineering
- Natural language Generation
- Producing Text From Computer Data
- AI Optimized Hardware
- Decision Management
- Deep Learning Platforms
- Pytorch
- Biometrics
- Robotic Process Automation
- Text Analytics And NLP
Cyber-Security And AI
The current challenge with defense against cyber-attacks is that the speed and amount of threats typically surmount humanist cyber defense capabilities. That’s why a replacement computing driven approach could enhance the effectiveness of security controls. However, it may be utilized by adversaries to form additional refined and adaptable attack mechanisms (Chomiak-Orsa, Rot, & Blaicke, 2019). Cybercriminals became a lot of refined. Current security controls don’t seem to be enough to defend networks from the quantity of extremely delicate cybercriminals. Cybercriminals have learned a way to evade the foremost refined tools, like Intrusion Detection and prevention Systems (IDPS), and botnets are nearly invisible to current tools. Luckily, the applying of artificial intelligence (AI) might increase the detection rate of IDPS systems, and Machine Learning (ML) techniques are ready to mine information to notice botnets’ sources. However, the implementation of AI might bring alternative risks, and cybersecurity consultants have to be compelled to realize a balance between risk and edges (Calderon, 2019).
Background
The data set problems caused by companies’ to share collected knowledge, which can even be because of privacy, written agreement, damage to reputation, and legal constraints. alternative problems embrace malware polymorphisms (derivative versions of a resourceful malware or malware tool) and ambiguities and similarities among sites (IP addresses, or hosts) with that malware communicate (Amit et al., 2018).
Three styles of cyber analytics that support IDS has been discussed on misuse-based (or signature-based), anomaly-based, and hybrid. Misuse-based analytics are designed to discover familiar attacks while not having an outsized rate of false positive alarms. They are not capable of detective work zero-day (never before seen) attacks. Anomaly-based analytics create a model of traditional activity patterns and conceive to discover deviations from these patterns. they need the potential to discover novel attacks and generate signatures that maybe used to discover similar future attacks. Hybrid analytics mix of above two approaches (Buczak & Guven, 2016).
AI systems and therefore the data of the way to style them will be place toward each civilian and military uses, and additional loosely, toward helpful and harmful ends .The report points out several problems, however one stands out: “Today’s AI systems suffer from a number of novel unresolved vulnerabilities. These embrace knowledge poisoning attacks (introducing coaching knowledge that causes a learning system to form mistakes), adversarial examples (inputs designed to be misclassified by machine learning systems), and the exploitation of flaws within the style of autonomous systems’ goals. The implications for the threat landscape are summarized (Brundage et al., 2018).
Challenges of Cybersecurity
1. Confidentiality
Generally, confidentiality is the preservation of authorised restrictions on information access and disclosure, as well as suggests that for shielding personal privacy and proprietary information. Once an unauthorised entity, individual, or method gains access to proprietary information, we have a tendency to take into account that the confidentiality of the particular system is lost. With this increased accessibility of client server on the internet, confidentiality is setting out to become more and more important (Yang, Littler, Sezer, McLaughlin, & Wang, 2011).
2. Availability
Availability is outlined because the provision of timely and reliable access to and use of information and services. A convenience attack takes place within the type of traffic flooding, wherever the attacker aims to delay or disrupt message transmission, or buffer flooding wherever the malicious actor aims to overwhelm the AMI’s buffer with false events.
3. Integrity
Integrity is outlined guaranteeing that there’ll be no quite violation of information, including destruction, modification or loss of data whereas maintaining consistency and accuracy.
4. Accountability
Accountability is guaranteeing that each action in any given system may be derived back to the person or entity that performed it. This way, all the knowledge will be used as proof while not anyone having the ability to dispute the chain of custody of the knowledge or question the non-repudiation of the system
Cybersecurity Threats and Weaknesses
Passive attacks:
These attacks does not have a intend on system resources and their sole purpose is to extract system data. In these kinds of attacks, the attacker’s objective is to find out or use data that it is transmitted, or to retrieve data hold on within the system. Generally, passive attacks are comparatively hard to discover, since no alteration of knowledge takes place, so the most effective defence against them is interference through solid security mechanisms.
Active attacks: these attacks aimed towards a system’s resources and attempt to either modify or disrupt them, the foremost common attackers in these types of attacks measure malicious users, spyware, worms, Trojans, and logic bombs.
Policy recommendation
1. Risk management and resilience
Governments, with the private sector, will promote the event and implementation of international norms and values that ‘do not harm’ civilian infrastructure and for transparency. Sensible work is required in info exchange covering the complete AI chain from pre-AI information capture to AI process to post-AI explain ability of algorithms.
2. Global common good
Clearly this statement makes associate in appealing to private–public collaboration and intergovernmental work the world organization to pursue the following world common merchandise for AI and ethics in Internet.
3. Strategic partnerships
For strategic partnerships its necessary on the implications of AI and ethics pointers (or law) applied to cybersecurity. The wisest route—and most likely on the brink of the center of many—is to hunt internationalizing such steering as this could keep the world commonweal route open.
According to Symantec, up to 980 million folks across twenty countries were suffering from law-breaking in 2017. Victims of law-breaking lost a complete of $172 billion. Cyber criminalize is incredibly remunerative. Nicole Eagan, CEO of cyber security firm Dark trace, points out that though we have a tendency to within the early stages of hackers mistreatment AI themselves as offensive tools, that day will eventually return. But fortunately, today, the largest firms within the cyber defense field are perpetually right there at the forefront once it involves potency, technology, and innovation.
.
References:
Amit, I., Matherly, J., Hewlett, W., Xu, Z., Meshi, Y., & Weinberger, Y. (2018). Machine Learning in Cyber-Security – Problems, Challenges and Data Sets. Retrieved from http://arxiv.org/abs/1812.07858
Calderon, R. (2019). The Benefits of Artificial Intelligence in Cybersecurity. Economic Crime Forensics Capstones. 36. Retrieved from https://digitalcommons.lasalle.edu/ecf_capstones/36
Chomiak-Orsa, I., Rot, A., & Blaicke, B. (2019). Artificial Intelligence in Cybersecurity: The Use of AI Along the Cyber Kill Chain. Springer International Publishing. Retrieved from https://www.springerprofessional.de/en/artificial-intelligence-in-cybersecurity-the-use-of-ai-along-the/17107752
Buczak, A. L., & Guven, E. (2016). A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection. IEEE Communications Surveys & Tutorials, 18(2), 1153–1176. https://doi.org/10.1109/COMST.2015.2494502
Yang, Y., Littler, T., Sezer, S., McLaughlin, K., & Wang, H. F. (2011). Impact of cyber-security issues on Smart Grid. In 2011 2nd IEEE PES International Conference and Exhibition on Innovative Smart Grid Technologies (pp. 1–7). IEEE. https://doi.org/10.1109/ISGTEurope.2011.6162722
10.0 Software engineering