Abstract
This paper provides an introduction to application of artificial intelligence (AI) could solve the problems in cybersecurity. The physical gadgets and human impedance are insufficient for managing and ensuring the cybercrimes. Criminals use the Internet to pass on numerous cybercrimes. The specialists want help to stop attacks and security breaks and also react on attacks. The main goal of the cybersecurity is to reduce the attacks by using this AI technology. Applications of artificial intelligence in cybersecurity which exist already and some cybersecurity issues can be resolved by using AI strategies and concluded some useful AI applications.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Chen H, Wang FY (2005) Guest editors’ introduction: artificial intelligence for homeland security. IEEE Intell Syst 20(5):12–16
Dasgupta D (2006) Computational intelligence in cyber security. In: IEEE international conference on computational intelligence for homeland security and personal safet (CIHSPS 2006), pp 2– 3
Stytz, MR, Lichtblau DE, Banks SB (2005) Toward using intelligent agents to detect, assess, and counter cyberattacks in a network centric environment. Institute for defense analyses, Alexandria, Va
Helano J, Nogueira M (2006) Mobile intelligent agents to fight cyber intrusions. Int J Forensic Comput Sci (IJoFCS) 1:28–32
Patel A et al. (2012) Taxonomy and proposed architecture of intrusion detection and prevention systems for cloud computing. In: Cyberspace safety and security. Springer, Berlin, Heidelberg, pp 441–458
https://ieeexplore.ieee.org/document/5954703/authors#authors
Dijle H, Doğan N (2011) Türkiye’de Bilişim Suçlarına Eğitimli İnsanların Bakışı. Bilişim Teknolojiler Dergisi, 4(2)
Gordon S, Ford R (2006) On the definition and classification of cybercrime. J Comput Virol 2(1):13–20
http://dictionary.reference.com/browse/cybercrime, 24/11/2014
Fisher BS (ed) (2010) Encyclopaedia of victimology and crime prevention. vol 1. Sage
Bitter C, Elizondo DA, Watson T (2010) Application of artificial neural networks and related techniques to intrusion detection. In: The 2010 international joint conference on neural networks (IJCNN). IEEE
Chen Y (2008) NeuroNet: towards an intelligent internet infrastructure. In: 2008 5th IEEE consumer communications and networking conference, IEEE
Barika F, Hadjar K, El-Kadhi N (2009) Artificial neural network for mobile IDS solution. Secur Manag 271–277
Barman DK, Khataniar G (2012) Design of intrusion detection system based on artificial neural network and application of rough set. Int J Comput Sci Commun Netw 2(4):548–552
Rowe NC (2003) Counterplanning deceptions to foil cyber-attack plans. In: IEEE systems, man and cybernetics societyinformation assurance workshop, 2003. IEEE
Wei D et al. (2010) An integrated security system of protecting smart grid against cyber-attacks. In: 2010 innovative smart grid technologies (ISGT). IEEE
Rui L, Wanbo L (2010) Intrusion response model based on AIS. In: 2010 International forum on information technology and applications, vol 1. IEEE
Sirisanyalak B, Sornil O (2007) An artificial immunity-based spam detection system. In: IEEE congress on evolutionary computation (CEC 2007), pp 3392–3398
Hong L (2008) Artificial immune system for anomaly detection. In: 2008 IEEE international symposium on knowledge acquisition and modeling workshop. IEEE
Chao R, Tan Y (2009) A virus detection system based on artificial immune system. In: 2009 international conference on computational intelligence and security, vol. 1. IEEE
Danforth M (2009) Towards a classifying artificial immune system for web server attacks. In: 2009 International conference on machine learning and applications. IEEE
Fang X et al. (2012) An artificial immune system for phishing detection. In: 2012 IEEE congress on evolutionary computation. IEEE
Anderson Frivold Valdes. Next-Generation Intrusion-detection Expert System (NIDES)
Jongsuebsuk P, Wattanapongsakorn N, Charnsripinyo C (2013) Real-time intrusion detection with fuzzy genetic algorithm. In: 2013 10th international conference on electrical engineering/electronics, computer, telecommunications and information technology. IEEE
Alrajeh NA, Lloret J (2013) Intrusion detection systems based on artificial intelligence techniques in wireless sensor networks. Int J Distrib Sens Netw . Article ID 351047
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Verma, S., Gupta, N. (2020). Application of Artificial Intelligence in Cybersecurity. In: Saini, H., Sayal, R., Buyya, R., Aliseri, G. (eds) Innovations in Computer Science and Engineering. Lecture Notes in Networks and Systems, vol 103. Springer, Singapore. https://doi.org/10.1007/978-981-15-2043-3_9
Download citation
DOI: https://doi.org/10.1007/978-981-15-2043-3_9
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-2042-6
Online ISBN: 978-981-15-2043-3
eBook Packages: EngineeringEngineering (R0)