Cham and cyber security devrukhkar
AI and Cyber Security 1
AI and Cyber Security
Table of Contents
Introduction...............................................................................................................................................4Problem statement & purpose..............................................................................................................6
Literature review.......................................................................................................................................8
AI in cybersecurity................................................................................................................................8
Research methodology.............................................................................................................................12
Data analysis............................................................................................................................................13
Cyber security is referred to as a body of practices for more processors and technologies which has been designed in order to protect the programs, data, devices and networks from the unauthorized access, damaged and attack. Cyber security is considered important as the military, financial, government, medical organizations and corporates to process and collect the unprecedented amount of data on computers as well as different devices (Jeffrey, 2019). A significant part of the data may be consistent of the sensitive information for which the exposure or unauthorized access can have a negative consequence. With the increasing volume and the sophistication of the cyber-attacks, the organizational company that have been dealing with the safeguarding information related to the national security financial records for health require to take strict actions in order to protect the personal information as well as the sensitive business information.
Artificial intelligence today is considered as one of the fastest growing branches of computer science which develops and researches theories for the modern technique, application, system and techniques in order to stimulate the expansion and extension of human intelligence. Artificial intelligence has become very popular buzzword today. Not unlike the cloud, loT and big data, in the previous year’s increasing number of companies have been looking for the ways in order to jump on the artificial intelligence bandwagon. The artificial intelligence is suited in order to find solutions for many of the time cyber security is considered as one of the categories. With the changing times and emerging technology cyber security has been at-risk due to the evolving proliferation of the devices as well as to Cyber-attacks, Artificial Intelligence and machine learning has been develop in order to automatically detect the thread and respond efficiently compared to the traditional approaches that are software-driven.
Problem statement & purpose
Internet, today, has become one of the most integral parts of an individual's life and it has become almost impossible to complete even the smallest of world without making the use of internet. Whereas on the other hand the increasing volume of data has become vulnerable to proliferation and cybercrimes. Different industries over the years have benefited because of the implementation of artificial intelligence. The use of artificial intelligence has been currently evident in different segments of Auto ltd online orders, theft prevention, inventory management, customer behavior as well as many more. Despite of the widespread use of artificial intelligence in different sectors it can commonly be seen that the technology is under threat. The theft of confidential and send it sensitive data and information along with the financial assets as well as several other aspects together constitutes the threatening challenges of cybersecurity. However these aforementioned risks I said to be - effectively in order to a credible extent through the innovative measures in order to tackle the issues of cyber security. The research paper focuses on the identification and investigation and evaluation of the aforementioned innovation in the measures of cyber security in order to overcome the threats.
This research paper highlights the fundamental questions related to artificial intelligence in cyber security, i.e.,
What are the significant measures of cybersecurity?
Research objectives that have been undertaken in order to complete this research paper have been mentioned below-
The most important objective of this paper is to identify the various tools of artificial intelligence along with its importance in cyber security.
Even though artificial intelligence have been considered an important introduction for the use of cybersecurity there are still certain aspects which are yet to be explored. The researches mostly have made Research and presented the facts which speaks about the benefits of artificial intelligence in cyber security but the drawbacks are still to be considered as they can be of significant importance.
Literature review
While coming up with the analysis of long run development as well as application of artificial intelligence in the cybersecurity, it is important to distinguish between the long views as well as the immediate goals. While cybersecurity experts have accepting AI as the future of the industry, finding solutions to its problems are still not adequately addressed. This technology can analyze efficiently the behavior of the users, identify different sorts of irregularities or abnormalities in the network as well as deduce their pattern. The technology has helped to easily and quickly identify such kinds of vulnerabilities of Cyber security. Contrarily the intelligence responsibilities that were dependent on the humans will now be susceptible to the malicious programs that imitate the legitimate algorithm which are based on artificial intelligence. Different organisations have been rushing into getting the products that are based on machine learning in market which makes them overlook algorithms which have been creating a sense of security that is false. Relying totally on the supervised learning can be one of the major threats.
In this the data sets are labelled by the algorithms according to the nature which could either be a clean data a Malware or any other kind of tag. If by any chance the cyber criminals get an access to these security firms, they can easily alter these labels according to that convenience. Apart from the risks mentioned above the routine tasks which rely on the artificial intelligence may also be manipulated by the advanced campaigns of hacking by making use of the machine learning. Despite of all the security risks artificial intelligence have been continuously minimizing the responsibilities of routine security with the results that are of high quality. The automation of AI enables to identify the incidents that are referring as well as remediate them.
The setting up of firewall policies, backup management as well as other tasks related to it needs a professional but with the emerging technology Artificial Intelligence can be a game changer when compared to the traditional approach.
The technology easily enables the organizations in order to monitor as well as respond to the incidence of security by making use of these advanced tools.
AI and Cyber Security 10
The adoption and implementation of the newer strategies of defense have impacted the basic economic as well as the models of return of investment of the cyber criminals. Therefore in order to continuously give a response the community of these cyber criminals have been adjusting as well as accelerating the efforts of development.
The future of AI in the cyber security is a game changer but AI being used by the cyber criminals is considered as one of the major threats to the security. According to the cyber criminals AI itself can become one of the biggest disasters for the world. Since there is a fixed algorithm which is followed by the artificial intelligence which makes it easily possible for the cyber criminals to attack the applications by adopting a number of methods and tools.
Research methodology
1. Various sources which are available for data collection.
2. Different methods as well as tools which can be used in order to collect the data.
been used in order to identify as well as prevent the crimes of cyber attackers. As well as to analyze the collected
data the statistical tools mentioned below have been taken into consideration -
the secondary source in order to complete this research. In order to analyze the data which has been collected the
methods of simple average analysis as well as the percentile analysis have been used in order to make analysis.
Cyber crimes | January to May- 2019 | ||
---|---|---|---|
Cyber | 567 | 779 | +212 |
harassment | |||
---|---|---|---|
752 | 792 | +38 | |
Online fraud | 5570 | 5748 | +178 |
Spam | 650 | 694 | +44 |
5100 | 4660 | -440 | |
Vulnerabilities | 79 | 65 | -14 |
Service Denial | 345 | 300 | -45 |
From the table created above it can be interpreted that there has been a clear increase of +212 in the cyber harassment, increase of +38 in the attacks that are content related, along with the increase to +178 and +44 in online fraud and spam respectively. On the other hand there has been a decrease by -440 in the intrusive atoms, decrease by -14 in the reports of The attacks related to vulnerability as well as the attacks related to the denial of service has been decreased by - 45.
It is considered significant for every business or individual organization as well as a company to pain high attention towards the security of data and move towards the purchasing of various kinds of software in order to protect themselves from any threat related to cybersecurity.
which are being used by the business is form of companies or organizations as well as the individuals in order to work, think, decide and learn each and every scenario of the daily life whether it is related to a problem solution for making use in order to make a decision. Although the businesses have been adopted the AI for the security of sensitive data and important information, there has been a similar increase in the attacks by the cyber attackers currently. Cyber attack is not just considered as a problem that is being faced by any one of the country but challenge for every nation present all over the world. Therefore it is important to take appropriate measurements of cyber security as it can come meaningless if it is accessible easily by others. These kinds of crimes have today become a significant read for the individuals from a government form of businesses as well as the companies as a lot of important information along with sensitive data are easily exploited by the criminals within seconds. And the introduction of artificial intelligence has been approved as a game changer in the cyber security as well as it has gained more importance over the time period.
References
Conti, M., Dargahi, T., & Dehghantanha, A. (2018). Cyber threat intelligence: challenges and opportunities. In Cyber Threat Intelligence (pp. 1-6). Springer, Cham.
AI and Cyber Security 14
Li, J. H. (2018). Cyber security meets artificial intelligence: A survey. Frontiers of Information Technology & Electronic Engineering, 19(12), 1462-1474.
Mellit, A., & Kalogirou, S. A. (2008). Artificial intelligence techniques for photovoltaic applications: A review. Progress in energy and combustion science, 34(5), 574-632.
AI and Cyber Security 15
Tyugu, E. (2011, June). Artificial intelligence in cyber defense. In 2011 3rd International Conference on Cyber Conflict (pp. 1-11). IEEE.