0% found this document useful (0 votes)
52 views5 pages

F-23-149.1 Presentation

The document discusses using artificial intelligence and machine learning technologies to enhance cyber security protections against threats. AI-powered security solutions are designed to automate detecting, analyzing, and responding to security incidents in real-time, improving efficiency and effectiveness over traditional human-only defenses. These solutions can analyze large amounts of data, identify patterns and anomalies, and make faster, more accurate decisions than humans alone. However, AI in cyber security also faces challenges like cost, limited resources for training, and the risk that attackers could use AI to develop harder-to-detect malware.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views5 pages

F-23-149.1 Presentation

The document discusses using artificial intelligence and machine learning technologies to enhance cyber security protections against threats. AI-powered security solutions are designed to automate detecting, analyzing, and responding to security incidents in real-time, improving efficiency and effectiveness over traditional human-only defenses. These solutions can analyze large amounts of data, identify patterns and anomalies, and make faster, more accurate decisions than humans alone. However, AI in cyber security also faces challenges like cost, limited resources for training, and the risk that attackers could use AI to develop harder-to-detect malware.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

International Journal of Multidisciplinary Research and Growth Evaluation www.allmultidisciplinaryjournal.

com

AI-Driven cyber security: Security intelligence modelling


Guru Prasad BS 1*, Dr. Kiran GM 2, Dr. Dinesha HA 3
1
Student, Shridevi Institute of Engineering and Technology, Tumakuru, Karnataka, India
2
Associate Professor, Department of CSE, Shridevi Institute of Engineering and Technology ,Tumakuru, Karnataka, India
3
Professor, Dept. of CSE, Shridevi Institute of Engineering and Technology, Tumakuru, Karnataka, India

* Corresponding Author: Guru Prasad BS

Article Info Abstract


The process of defending computer networks from cyber attacks or unintended,
unauthorized access is known as cyber security. Organizations, businesses, and
ISSN (online): 2582-7138 governments need cyber security solutions because cyber criminals pose a threat to
Impact Factor: 5.307 (SJIF) everyone. Artificial intelligence promises to be a great solution for this. Security
Volume: 04 experts are better able to defend vulnerable networks and data from cyber attackers by
Issue: 06 combining the strengths of artificial intelligence and cyber security. This paper
November-December 2023 provides an introduction to the use of artificial intelligence in cyber security. AI-driven
cyber security refers to the use of artificial intelligence and machine learning
Received: 05-10-2023; technologies to enhance the protection of computer systems and networks from cyber
Accepted: 07-11-2023 threats such as hacking, malware, phishing, and other forms of cyberattacks. AI-
Page No: 961-965 powered security solutions are designed to automate the process of detecting,
analyzing, and responding to security incidents in real-time, thereby improving the
efficiency and effectiveness of cyber defense. These solutions can analyze large
amounts of data, identify patterns and anomalies, and make decisions faster and more
accurately than humans alone, enabling organizations to stay ahead of evolving cyber
threats.

DOI: https://doi.org/10.54660/.IJMRGE.2023.4.6.961-965

Keywords: Cyber security, Cyber-attacks, Artificial Intelligence

Introduction
Cybercriminals pose a significant threat to the online world, and it is essential to take necessary precautions to protect se nsitive
information. It is crucial for organizations, businesses, governments, and individuals to understand the risks associated w ith online
activities and to implement measures to reduce these risks. This includes using strong passwords, regularly updating software and
hardware, keeping software up-to-date, and backing up important data. Additionally, it is recommended to educate employees and
family members about safe online practices and to be aware of common scams and phishing attempts. By being proactive in prote cting
personal and sensitive information, the risk of cyber-attacks can be minimized and individuals and organizations can secure their online
presence. Cyber security refers to technology and practices designed to protect networks and information from damage or unauthorized
access [5]. It is vital because governments, companies, and military organizations collect, process, and store a lot of data. Cyber security
takes different forms, including military, law enforcement, judicial, commerce, infrastructure, and interior, intelligence, a nd
information systems. Cyber security is a dynamic, interdisciplinary field involving information systems, computer science, and
criminology. The security objectives have been availability, authentication, confidentiality, no-repudiation, and integrity [7].
The management of organizations should adopt a holistic approach to cyber security that covers people, processes, and technology.
This includes regular security training for employees, risk assessments, and incident response planning. The use of encryptio n and
multi-factor authentication can also help to secure sensitive information. In conclusion, managing cyber risks requires a comprehensive
and proactive approach that involves the entire organization [8].
By adopting best practices and staying informed about the latest threats and trends, organizations can reduce the risk of cyber-
attacks and ensure the safety of their data and systems.

961 | P a g e
International Journal of Multidisciplinary Research and Growth Evaluation www.allmultidisciplinaryjournal.com

Challenges the good outweighs the bad. Just as AI technologies can be


Although artificial intelligence tools could help fight used to identify and stop cyber-attacks, cybercriminals can
cybercrime, the tools are not a silver bullet and could be also use the AI systems to launch attacks. Besides, a shortage
exploited by malicious hackers. There are limitations that of cyber security experts is another problem. These
prevent AI from becoming a mainstream tool. The downsides challenges prevent AI from becoming the only cyber security
of AI in cyber security include cost, intensive resources, and solution.
training. AI in cyber security necessitates more resources and
funds than traditional, non-AI cyber security solutions, and it AI for Cyber Security
may be impractical in some cases. Cyber security is a domain The study concludes by emphasizing the importance of XAI
where absolute security is impossible. If a machine learning- in improving the transparency and accountability of AI
based security tool misses a particular kind of cyber-attack models in the field of cyber security, thereby enabling
because it is not coded into it that may lead to problems [4]. organizations to better understand and manage the risks
Hackers themselves can use AI to test and develop their associated with AI-based cyber security solutions [2]. The
malware and make it potentially AI-proof. Some critics have authors hope that the review will provide a valuable resource
warned that AI could make cyber-attacks more dangerous for researchers, practitioners, and stakeholders in the field of
and difficult to spot than ever before [1]. Some regard AI in XAI and cyber security, and will encourage further research
cyber security as posing both a blessing and a curse, although and development in this area [3].

Fig 1: Relationship between AI and ML

AI limitations necessitate the use of XAI in cyber security evades the AI-based detection framework. This highlights the
AI in cyber security has its own set of challenges and need for continuous improvement and adaptation of AI
limitations. Evasion attacks are one of the major concerns models to stay ahead of attackers and provide effective cyber
where attackers can manipulate the malware in a way that it security solutions [10].

Fig 2: AI cyber incidents detection and response

962 | P a g e
International Journal of Multidisciplinary Research and Growth Evaluation www.allmultidisciplinaryjournal.com

AI-driven cyber security refers to the use of artificial responding to security incidents in real-time, thereby
intelligence and machine learning technologies to enhance improving the efficiency and effectiveness of cyber defense.
the protection of computer systems and networks from cyber These solutions can analyze large amounts of data, identify
threats such as hacking, malware, phishing, and other forms patterns and anomalies, and make decisions faster and more
of cyberattacks. AI-powered security solutions are designed accurately than humans alone, enabling organizations to stay
to automate the process of detecting, analyzing, and ahead of evolving cyber threats [3].

Fig 3: Schematic representation of the AI architecture and its attack surface

AI Cyber security Solutions stories, AI technologies like machine learning and natural
As cyberattacks grow in volume and complexity, artificial language processing provide rapid insights to cut through the
intelligence (AI) is helping under-resourced security noise of daily alerts, drastically reducing response times.
operations analysts stay ahead of threats. Curating threat Watch the video to see how AI helps analysts connect the dots
intelligence from millions of research papers, blogs and news between threats [6].

Fig 4: Application of AI across the cyber kill chain

Enabling AI-powered Smarter Cyber security Solutions Security Intelligence, Operations and Analytics, Malware
Service offerings for Enabling AI-driven Cyber Security for Detection and Vulnerability management Solutions.

Table 1: Results of website legitimacy decision – Database 1


Database 1
Decision
Phishing Non-phishing Suspicious
Phishing 567 256 212
Non-Phishing 284 159 369
Suspicious 216 241 152

963 | P a g e
International Journal of Multidisciplinary Research and Growth Evaluation www.allmultidisciplinaryjournal.com

Fig 5

Table 2: Results of website legitimacy decision – Database 2


Database 2
Decision
Phishing Non-phishing Suspicious
Phishing 201 135 189
Non-Phishing 125 125 152
Suspicious 157 141 128

Fig 6

Conclusion machine learning, 2019, 1210-1214.


AI can detect and stop cyber threats in real-time with limited 3. Baptista I, Shiaeles S, Kolokotronis N. A novel malware
resources. The constantly evolving nature of cyber-attacks detection system based on machine learning and binary
means that humans shall struggle to keep up with the intel. visualization, 2019, 1-6.
However, using machine learning, AI can chomp down data https://doi.org/10.1109/ICCW.2019.8757060
for quick analysis and provide excellent security coverage 4. Barbara D, Couto J, Jajodia S, Popyack L, Wu N. Adam:
without taking much time or energy away from the existing Detecting intru-sions by data mining, 2001, 5-6.
tasks. Machine learning allows Human analysts to focus on 5. Bose S, Barao T, Liu X. Explaining ai for malware
interpreting the results from deep analysis and devising novel detection: Analysis of mechanisms of malconv. In: 2020
techniques for fighting cyber-crime. International Joint Conference on Neural Networks
(IJCNN), 2020, 1-8.
References 6. Chowdhury M, Rahman A, Islam MR. Malware analysis
1. Al-Yaseen W, Othman Z, Ahmad Nazri MZ. Multi-level and detection using data mining and machine learning
hybrid support vector machine and extreme learning classification, 2018, 266-274.
machine based on modified k-means for intrusion https://doi.org/10.1007/978-3-319-67071-3 33
detection system. Expert Systems with Applications 67 7. Coull S, Gardner C. Activation analysis of a byte-based
(01 2017) deep neural network for malware classification, 2019,
2. Banu R, MA, CA, SA, Ujwala H, NH. Detecting 21-27. https://doi.org/10.1109/SPW.2019.00017
phishing attacks using natural language processing and 8. Demetrio L, Biggio B, Lagorio G, Roli F, Armando A.

964 | P a g e
International Journal of Multidisciplinary Research and Growth Evaluation www.allmultidisciplinaryjournal.com

Explaining vulnera-bilities of deep learning to


adversarial malware binaries, 2019.
9. Feng F, Zhou Q, Shen Z, Xuhui Y, Lihong H, Wang J.
The application of a novel neural network in the
detection of phishing websites. Journal of Ambient
Intelligence and Humanized Computing, 2018.
10. Feng W, Sun J, Zhang L, Cao C, Yang Q. A support
vector machine based naive bayes algorithm for spam
filtering, 2016, 1-8.

965 | P a g e

You might also like