Skip to main content

Application of Artificial Intelligence in Cybersecurity

  • Chapter
  • First Online:

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 103))

Abstract

This paper provides an introduction to application of artificial intelligence (AI) could solve the problems in cybersecurity. The physical gadgets and human impedance are insufficient for managing and ensuring the cybercrimes. Criminals use the Internet to pass on numerous cybercrimes. The specialists want help to stop attacks and security breaks and also react on attacks. The main goal of the cybersecurity is to reduce the attacks by using this AI technology. Applications of artificial intelligence in cybersecurity which exist already and some cybersecurity issues can be resolved by using AI strategies and concluded some useful AI applications.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Chen H, Wang FY (2005) Guest editors’ introduction: artificial intelligence for homeland security. IEEE Intell Syst 20(5):12–16

    Article  Google Scholar 

  2. Dasgupta D (2006) Computational intelligence in cyber security. In: IEEE international conference on computational intelligence for homeland security and personal safet (CIHSPS 2006), pp 2– 3

    Google Scholar 

  3. Stytz, MR, Lichtblau DE, Banks SB (2005) Toward using intelligent agents to detect, assess, and counter cyberattacks in a network centric environment. Institute for defense analyses, Alexandria, Va

    Google Scholar 

  4. Helano J, Nogueira M (2006) Mobile intelligent agents to fight cyber intrusions. Int J Forensic Comput Sci (IJoFCS) 1:28–32

    Google Scholar 

  5. Patel A et al. (2012) Taxonomy and proposed architecture of intrusion detection and prevention systems for cloud computing. In: Cyberspace safety and security. Springer, Berlin, Heidelberg, pp 441–458

    Chapter  Google Scholar 

  6. https://link.springer.com/article/10.1631/FITEE.1800573

  7. https://ieeexplore.ieee.org/document/5954703/authors#authors

  8. https://arxiv.org/ftp/arxiv/papers/1803/1803.09992.pdf

  9. Dijle H, Doğan N (2011) Türkiye’de Bilişim Suçlarına Eğitimli İnsanların Bakışı. Bilişim Teknolojiler Dergisi, 4(2)

    Google Scholar 

  10. Gordon S, Ford R (2006) On the definition and classification of cybercrime. J Comput Virol 2(1):13–20

    Article  Google Scholar 

  11. http://dictionary.reference.com/browse/cybercrime, 24/11/2014

  12. Fisher BS (ed) (2010) Encyclopaedia of victimology and crime prevention. vol 1. Sage

    Google Scholar 

  13. Bitter C, Elizondo DA, Watson T (2010) Application of artificial neural networks and related techniques to intrusion detection. In: The 2010 international joint conference on neural networks (IJCNN). IEEE

    Google Scholar 

  14. Chen Y (2008) NeuroNet: towards an intelligent internet infrastructure. In: 2008 5th IEEE consumer communications and networking conference, IEEE

    Google Scholar 

  15. Barika F, Hadjar K, El-Kadhi N (2009) Artificial neural network for mobile IDS solution. Secur Manag 271–277

    Google Scholar 

  16. Barman DK, Khataniar G (2012) Design of intrusion detection system based on artificial neural network and application of rough set. Int J Comput Sci Commun Netw 2(4):548–552

    Google Scholar 

  17. Rowe NC (2003) Counterplanning deceptions to foil cyber-attack plans. In: IEEE systems, man and cybernetics societyinformation assurance workshop, 2003. IEEE

    Google Scholar 

  18. Wei D et al. (2010) An integrated security system of protecting smart grid against cyber-attacks. In: 2010 innovative smart grid technologies (ISGT). IEEE

    Google Scholar 

  19. Rui L, Wanbo L (2010) Intrusion response model based on AIS. In: 2010 International forum on information technology and applications, vol 1. IEEE

    Google Scholar 

  20. Sirisanyalak B, Sornil O (2007) An artificial immunity-based spam detection system. In: IEEE congress on evolutionary computation (CEC 2007), pp 3392–3398

    Google Scholar 

  21. Hong L (2008) Artificial immune system for anomaly detection. In: 2008 IEEE international symposium on knowledge acquisition and modeling workshop. IEEE

    Google Scholar 

  22. Chao R, Tan Y (2009) A virus detection system based on artificial immune system. In: 2009 international conference on computational intelligence and security, vol. 1. IEEE

    Google Scholar 

  23. Danforth M (2009) Towards a classifying artificial immune system for web server attacks. In: 2009 International conference on machine learning and applications. IEEE

    Google Scholar 

  24. Fang X et al. (2012) An artificial immune system for phishing detection. In: 2012 IEEE congress on evolutionary computation. IEEE

    Google Scholar 

  25. Anderson Frivold Valdes. Next-Generation Intrusion-detection Expert System (NIDES)

    Google Scholar 

  26. https://www.irjet.net/archives/V5/i3/IRJET-V5I327.pdf

  27. Jongsuebsuk P, Wattanapongsakorn N, Charnsripinyo C (2013) Real-time intrusion detection with fuzzy genetic algorithm. In: 2013 10th international conference on electrical engineering/electronics, computer, telecommunications and information technology. IEEE

    Google Scholar 

  28. Alrajeh NA, Lloret J (2013) Intrusion detection systems based on artificial intelligence techniques in wireless sensor networks. Int J Distrib Sens Netw . Article ID 351047

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Verma, S., Gupta, N. (2020). Application of Artificial Intelligence in Cybersecurity. In: Saini, H., Sayal, R., Buyya, R., Aliseri, G. (eds) Innovations in Computer Science and Engineering. Lecture Notes in Networks and Systems, vol 103. Springer, Singapore. https://doi.org/10.1007/978-981-15-2043-3_9

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-2043-3_9

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-2042-6

  • Online ISBN: 978-981-15-2043-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics