Application of Artificial Intelligence in Cybersecurity

  • Shivangi Verma
  • Neetu Gupta
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 103)


This paper provides an introduction to application of artificial intelligence (AI) could solve the problems in cybersecurity. The physical gadgets and human impedance are insufficient for managing and ensuring the cybercrimes. Criminals use the Internet to pass on numerous cybercrimes. The specialists want help to stop attacks and security breaks and also react on attacks. The main goal of the cybersecurity is to reduce the attacks by using this AI technology. Applications of artificial intelligence in cybersecurity which exist already and some cybersecurity issues can be resolved by using AI strategies and concluded some useful AI applications.


Cybercrime Artificial intelligence Intrusion detection and prevention system Intelligent cyber defenses methods 


  1. 1.
    Chen H, Wang FY (2005) Guest editors’ introduction: artificial intelligence for homeland security. IEEE Intell Syst 20(5):12–16CrossRefGoogle Scholar
  2. 2.
    Dasgupta D (2006) Computational intelligence in cyber security. In: IEEE international conference on computational intelligence for homeland security and personal safet (CIHSPS 2006), pp 2– 3Google Scholar
  3. 3.
    Stytz, MR, Lichtblau DE, Banks SB (2005) Toward using intelligent agents to detect, assess, and counter cyberattacks in a network centric environment. Institute for defense analyses, Alexandria, VaGoogle Scholar
  4. 4.
    Helano J, Nogueira M (2006) Mobile intelligent agents to fight cyber intrusions. Int J Forensic Comput Sci (IJoFCS) 1:28–32Google Scholar
  5. 5.
    Patel A et al. (2012) Taxonomy and proposed architecture of intrusion detection and prevention systems for cloud computing. In: Cyberspace safety and security. Springer, Berlin, Heidelberg, pp 441–458CrossRefGoogle Scholar
  6. 6.
  7. 7.
  8. 8.
  9. 9.
    Dijle H, Doğan N (2011) Türkiye’de Bilişim Suçlarına Eğitimli İnsanların Bakışı. Bilişim Teknolojiler Dergisi, 4(2)Google Scholar
  10. 10.
    Gordon S, Ford R (2006) On the definition and classification of cybercrime. J Comput Virol 2(1):13–20CrossRefGoogle Scholar
  11. 11.
  12. 12.
    Fisher BS (ed) (2010) Encyclopaedia of victimology and crime prevention. vol 1. SageGoogle Scholar
  13. 13.
    Bitter C, Elizondo DA, Watson T (2010) Application of artificial neural networks and related techniques to intrusion detection. In: The 2010 international joint conference on neural networks (IJCNN). IEEEGoogle Scholar
  14. 14.
    Chen Y (2008) NeuroNet: towards an intelligent internet infrastructure. In: 2008 5th IEEE consumer communications and networking conference, IEEEGoogle Scholar
  15. 15.
    Barika F, Hadjar K, El-Kadhi N (2009) Artificial neural network for mobile IDS solution. Secur Manag 271–277Google Scholar
  16. 16.
    Barman DK, Khataniar G (2012) Design of intrusion detection system based on artificial neural network and application of rough set. Int J Comput Sci Commun Netw 2(4):548–552Google Scholar
  17. 17.
    Rowe NC (2003) Counterplanning deceptions to foil cyber-attack plans. In: IEEE systems, man and cybernetics societyinformation assurance workshop, 2003. IEEEGoogle Scholar
  18. 18.
    Wei D et al. (2010) An integrated security system of protecting smart grid against cyber-attacks. In: 2010 innovative smart grid technologies (ISGT). IEEEGoogle Scholar
  19. 19.
    Rui L, Wanbo L (2010) Intrusion response model based on AIS. In: 2010 International forum on information technology and applications, vol 1. IEEEGoogle Scholar
  20. 20.
    Sirisanyalak B, Sornil O (2007) An artificial immunity-based spam detection system. In: IEEE congress on evolutionary computation (CEC 2007), pp 3392–3398Google Scholar
  21. 21.
    Hong L (2008) Artificial immune system for anomaly detection. In: 2008 IEEE international symposium on knowledge acquisition and modeling workshop. IEEEGoogle Scholar
  22. 22.
    Chao R, Tan Y (2009) A virus detection system based on artificial immune system. In: 2009 international conference on computational intelligence and security, vol. 1. IEEEGoogle Scholar
  23. 23.
    Danforth M (2009) Towards a classifying artificial immune system for web server attacks. In: 2009 International conference on machine learning and applications. IEEEGoogle Scholar
  24. 24.
    Fang X et al. (2012) An artificial immune system for phishing detection. In: 2012 IEEE congress on evolutionary computation. IEEEGoogle Scholar
  25. 25.
    Anderson Frivold Valdes. Next-Generation Intrusion-detection Expert System (NIDES)Google Scholar
  26. 26.
  27. 27.
    Jongsuebsuk P, Wattanapongsakorn N, Charnsripinyo C (2013) Real-time intrusion detection with fuzzy genetic algorithm. In: 2013 10th international conference on electrical engineering/electronics, computer, telecommunications and information technology. IEEEGoogle Scholar
  28. 28.
    Alrajeh NA, Lloret J (2013) Intrusion detection systems based on artificial intelligence techniques in wireless sensor networks. Int J Distrib Sens Netw . Article ID 351047Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Shivangi Verma
    • 1
  • Neetu Gupta
    • 1
  1. 1.Amity Institute of Information TechnologyAmity UniversityNoidaIndia

Personalised recommendations