SlideShare a Scribd company logo
1 of 5
Download to read offline
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS
www.ijrcar.com
Vol.4 Issue 5, Pg.: 1-5
May 2016
D r . P r a n a v P a t i l Page 1
INTERNATIONAL JOURNAL OF
RESEARCH IN COMPUTER
APPLICATIONS AND ROBOTICS
ISSN 2320-7345
ARTIFICIAL INTELLIGENCE IN
CYBER SECURITY
Dr. Pranav Patil
Assistant Professor, Department of Computer Science, M. J. College, Jalgaon, Maharashtra, India
Abstract: - The speed of processes and also the quantity of knowledge to be utilized in defensive the cyber
area cannot be handled by humans while not sizeable automation. However, it is troublesome to develop software
system with standard mounted algorithms (hard-wired logic on deciding level) for effectively defensive against the
dynamically evolving attacks in networks. This example may be handled by applying strategies of computing that
offer flexibility and learning capability to software system. This paper presents a quick survey of computing
applications in cyber security, and analyzes the prospects of enhancing the cyber security capabilities by suggests
that of accelerating the intelligence of the security systems. Once measuring the papers obtainable regarding AI
applications in cyber security, we will conclude that helpful applications exist already. They belong; initial of all, to
applications of artificial neural nets in perimeter security and a few alternative cyber security areas. From the
opposite facet – it has become obvious that several cyber security issues may be resolved with success only
strategies of AI are getting used. For instance, wide information usage is critical in deciding, and intelligent call
support is one in all however unresolved issues in cyber security.
Keywords: Cyber Security Methods, Artificial Intelligence, Visual nets, Expert Systems.
1. Introduction
It is understandable that security against intelligent cyber bats will be achieved only by intelligent code, and events
of the most recent years have shown quickly increasing intelligence of malware and cyber-weapons. Application of
network central warfare makes cyber incidents particularly dangerous, and changes in cyber security are desperately
needed. The new security ways like dynamic setup of secured perimeters, comprehensive scenario awareness,
extremely machine-driven reaction on attacks in networks would require wide usage of AI ways and knowledge-
based tools. Why has the role of intelligent code in cyber operations accrued thus rapidly? Wanting nearer at the
cyber house, one will see the subsequent answer. AI is required, initial of all, for speedy reaction to things in web.
One should be able to handle great deal of data in no time so as to explain and analyze events that happen in cyber
house and to form needed choices. The speed of processes and also the quantity of information to be used cannot be
handled by humans while not substantial automation. However, it is troublesome to develop code with standard
mounted algorithms (hard-wired logic on deciding level) for effectively defensive against the attacks in cyber house,
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS
www.ijrcar.com
Vol.4 Issue 5, Pg.: 1-5
May 2016
D r . P r a n a v P a t i l Page 2
as a result of new threats seem perpetually.
2. Concerning AI
Artificial intelligence (AI) as a field of research project (also known as machine intelligence within the beginning) is
sort of as previous as electronic computers are a prospect of building devices/software/systems additional intelligent
than persons has been from the first days of AI “on the horizon”. The matter is that the time horizon moves away
once time passes. We have witnessed the determination of variety of showing intelligence exhausting issues by
computers like enjoying sensible chess, as an example. Throughout the first days of computing the chess enjoying
was thought of a benchmark showing a true intelligence. Even in seventies of the last century, once the pc chess was
on the master’s level, it appeared nearly not possible to form a program that might beat the planet champion. it's
typically accepted that AI will be thought of in 2 ways: as a science aimed toward making an attempt to get the
essence of intelligence and developing typically intelligent machines, or as a science providing ways for
determination complicated issues that can't be solved while not applying some intelligence like, as an example,
enjoying sensible chess or creating right choices supported giant amounts of knowledge. Within the gift paper we
are going to take the second approach, advocate for applying specific AI ways to cyber security issues.
A large range of ways is developed within the AI field for finding laborious issues that need intelligence from
the human perspective. Some of these ways have reached a stage of maturity wherever precise algorithms exist that
is supported these ways. Some ways have even become thus wide known that they are not thought of happiness to
AI any further, but became a section of some application area, as an example, data processing algorithms that have
emerged from the training subfield of AI. It might be impossible to do to offer a lot of or less complete survey of all
much helpful AI methods in a very transient survey. Instead, we have sorted the ways and architectures in many
categories: neural nets, knowledgeable systems, intelligent agents, search, machine learning, data processing and
constraint finding. We define these classes here, and that we provide references to the usage of individual ways in
cyber security. We are not aiming to discuss tongue understanding, artificial intelligence and pc vision that we
contemplate specific applications of AI. Robots and pc vision have positively spectacular military applications,
however we have not found something specific to cyber security there.
2.1. Visual nets: visual nets have an extended history that begins with the invention of perceptron by Frank
Rosenblatt in 1958 – a man-made nerve cell that has remained one among the foremost well-liked components of
neural nets. Already a little variety of perceptrons combined along will learn and solve fascinating issues. However
neural nets will include an oversized variety of artificial neurons. So neural nets offer a practicality of massively
parallel learning and decision-making. Their most distinguished feature is that the speed of operation. They’re well
matched for learning pattern recognition, for classification, for choice of responses to attacks etc. they will be
enforced either in hardware before in software system. Neural nets are well relevant in intrusion detection and
intrusion bar. There are proposals to use them in DoS detection, pc worm detection, spam detection, zombie
detection, and malware classification and in rhetorical investigations. A reason for the recognition of neural nets in
cyber security is their high speed, if enforced in hardware or utilized in graphic processors. There are new
developments within the neural nets technology: third generation neural nets prickling neural networks that imitate
organic neurons a lot of realistically, and supply a lot of application opportunities.
2.2Expert systems: These are unquestionably the foremost wide used AI tools. Associate skilled system is software
system for locating answers to queries in some application domain bestowed either by a user or by another software
system. It will be directly used for 98 call support, e.g. in diagnosing, in finances or in computer network. There’s a
good sort of skilled systems from little technical diagnostic systems to terribly massive and hybrid systems for
finding complex issues. Conceptually, associate skilled system includes a mental object, wherever skilled
information a few specific application domains are hold on. Besides the mental object, it includes associate illation
engine for account answers supported this information and, possibly, further information a few state of affairs.
Empty mental object and illation engine are along referred to as skilled system shell - it should be stuffed with
information, before it will be used. This system shell should be supported by software system for adding information
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS
www.ijrcar.com
Vol.4 Issue 5, Pg.: 1-5
May 2016
D r . P r a n a v P a t i l Page 3
within the mental object, and it will be extended with programs for user interactions, and with different programs
that will be utilized in hybrid skilled systems. Developing associate skilled system means that, first,
selection/adaptation of associate skilled system shell and, second, exploits skilled information and filling the mental
object with the information. The second step is out and away a lot of difficult and time overwhelming than the
primary. There are several tools for developing expert systems. In general, a tool includes associate expert system
shell and has conjointly a practicality for adding information to the information repository. Expert systems will have
further practicality for simulation, for creating calculations etc. There are many various information illustration
forms in expert systems; the foremost common may be a rule-based illustration. However the utility of associate
expert system depends principally on the standard of information within the expert system’s knowledge domain, and
not most on the inner type of the information illustration. This leads one to the information acquisition drawback
that is crucial in developing real applications. Example of a Cyber Security expert system is one for security
designing. This expert system facilitates significantly choice of security measures, and provides guidance for best
usage of restricted resources. There are early works on mistreatment expert systems in intrusion detection.
2.3. Intelligent agents: Intelligent agents are software system elements that possess some options of intelligent
behavior that produces them special: pro-activeness, understanding of an agent communication language, reactivity
(ability to form some selections and to act). They will have a designing ability, quality and reflection ability. Within
the software system engineering community, there is a thought of software system agents wherever they are thought
of to be objects that are a minimum of proactive and have the flexibility to use the agent communication language.
comparison agents and objects, one will say that objects is also passive, and that they do not need to perceive any
language victimization intelligent agents in security against DDoS has been represented, wherever simulation shows
that cooperating agents will effectively defend against DDoS attacks. Once determination some legal and conjointly
industrial several issues, it should be attainable in premise to develop a “cyber police” subsisting of mobile
intelligent agents. This may need implementation of infrastructure for supporting the cyber agents’ quality and
communication, however should be inaccessible for adversaries. This may need cooperation with ISP-s. Multi-agent
tools will give a lot of complete operational image of the cyber house, as an example, a hybrid multi-agent and
neural network-based intrusion detection method has been projected. Agent-based distributed intrusion detection is
represented.
2.4. Search: Search may be a universal technique of downside finding which will be applied altogether cases once
no different ways of downside finding are applicable. Individuals apply search in their daily life perpetually, while
not listening to it. Little should be known so as to use some general search formula within the formal setting of the
search problem: one should be able to generate candidates of solutions, and a procedure should be out there for
deciding whether or not a planned candidate satisfies the wants for an answer. However, if extra information may be
exploited to guide the search, then the potency of search may be drastically improved. Search is gift in some type
nearly in each intelligent program, and its potency is commonly vital to the performance of the total program. An
excellent form of search ways are developed that take under consideration the precise information regarding
particular search issues. Though several search ways are developed in AI, and that they are wide utilized in several
programs, it's rarely thought-about because the usage of AI. For instance, dynamic programming is actually utilized
in finding optimum security issues, the search is hidden within the package and it's not visible as an AI application.
Search on and or trees, αβ-search, minimax search and random search square measure wide utilized in games
package, and that they are helpful in decision-making for cyber security. The αβ-search formula, originally
developed for pc chess, is an implementation of a typically helpful preparation of “divide and conquer” in problem
finding, and mostly in deciding once 2 adversaries are selecting their absolute best actions. It uses the estimates of
minimally secured win and maximally doable loss. This allows one typically to ignore great amount of choices and
significantly to hurry up the search.
2.5. Learning: Learning is raising a data system by extending or rearranging its cognitive content or by raising the
illation engine. This is often one in all the foremost fascinating issues of AI that is beneath intensive investigation.
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS
www.ijrcar.com
Vol.4 Issue 5, Pg.: 1-5
May 2016
D r . P r a n a v P a t i l Page 4
Machine learning includes procedure strategies for getting new data, new skills and new ways that to prepare
existing data. Issues of learning vary greatly by their complexness from easy constant learning which suggests
learning values of some parameters, to difficult kinds of symbolic learning, for instance, learning of ideas,
grammars, functions, even learning of behavior. AI provides strategies for each -- supervised learning further as
unattended learning. The latter is very helpful within the case of presence of enormous quantity of knowledge, and
this is often common in cyber security wherever giant logs will be collected. Data processing has originally adult out
of unattended learning in AI. Unattended learning will be a practicality of neural nets, especially, of self-organizing
maps. A distinguished category of learning strategies is implanted by parallel learning algorithms that are
appropriate for execution on parallel hardware. These learning strategies are diagrammatical by genetic algorithms
and neural nets. Genetic algorithms and symbolic logic has been, as an example, utilized in threat detection systems
represented.
2.6.Constraint finding: Constraint finding or constraint satisfaction may be a technique developed in AI for
locating solutions for issues that area unit conferred by giving a group of constraints on the answer, e.g. logical
statements, tables, equations, inequalities. An answer of a drag may be a assortment of values that satisfy all
constraints. Actually, there are many various constraint determination techniques, betting on the character of
constraints. On a really abstract level, nearly any downside will be conferred as a constraint satisfaction downside.
Particularly, several designing issues will be conferred as constraint satisfaction issues. These issues are troublesome
to resolve as a result of great amount of search required normally. All constraint determination strategies are aimed
toward limiting the search by taking into consideration specific info regarding the actual category of issues.
Constraint determination will be used in scenario analysis and call support together with logic programming.
3. Challenges in Intelligent Cyber Security
When coming up with the long run analysis, development and application of AI ways in Cyber Security, one needs
to distinguish between the immediate goals and long views. There are varied AI ways directly applicable in Cyber
Security, and present are immediate Cyber Security issues that must a lot of intelligent solutions than are enforced
nowadays. As yet we have mentioned these existing immediate applications. Within the future, one will see
promising views of the appliance of fully new principles of data handling in state of affairs management and
deciding. These principles embrace introduction of a standard and hierarchal data design within the deciding
software system. This sort of design has been planned. A difficult application space is that the data management for
internet central warfare. Only automatic data management will guarantee fast state of affairs assessment that
provides a choice superiority to leaders and decision manufacturers on any C2 level. Knowledgeable systems are
already getting used in several applications, typically hidden within an application, like within the security measures
coming up with software system. However, knowledgeable systems will get wider application, if massive data bases
are going to be developed. This may need tidy investment in data acquisition, and development of huge standard
data bases. Considering a lot of distant future -- a minimum of some decades ahead, maybe we should always not
prohibit us to the “narrow AI”. Some individuals are convinced that the grand goal of the AI development of
artificial general intelligence will be reached within the middle of the current century. The primary conference on
artificial general intelligence was control in 2008 at the University of Memphis. The Singularity Institute for AI,
supported in 4000, warns researchers of a danger that exponentially quicker development of intelligence in
computers could occur. This development could result in Singularity, delineate in follows: “The Singularity is that
the technological creation of smarter-than-human intelligence. There are many technologies that are usually
mentioned as heading during this direction. The foremost usually mentioned is perhaps AI; however there are others
many totally different technologies that, if they reached an intensity of sophistication, would change the creation of
smarter-than-human intelligence. An opportunity that includes smarter-than-human minds is actually totally different
in a very manner that goes on the far side the standard visions of a future stuffed with advanced devices.” A
researcher has expected the event to come back up with Singularity. One needn't to believe the Singularity threat;
however the fast development of knowledge technology will certainly change one to make significantly higher
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS
www.ijrcar.com
Vol.4 Issue 5, Pg.: 1-5
May 2016
D r . P r a n a v P a t i l Page 5
intelligence into software system in coming back years. Severally of whether or not the factitious general
intelligence is obtainable or Singularity comes, it's crucial to own the power to use higher AI in cyber security than
the offenders have it.
4. Conclusions
In the present scenario of quickly growing intelligence of malware and class of cyber-attacks, it is inescapable to
develop intelligent cyber security ways. The expertise in DDoS mitigation has shown that even a security against
large-scale attacks will be undefeated with rather restricted resources once intelligent ways are used. An analysis of
publications shows that the AI results most generally applicable in cyber security are provided by the analysis in
artificial visual nets. Applications of visual nets can keep on in cyber security. There is additionally an imperative
would like for application of intelligent cyber security ways in many areas wherever neural nets are not the foremost
appropriate technology. These areas are called support, scenario awareness and data management. Professional
system technology is that the most promising during this case. It is not clear however fast development of general
computing is ahead, however a threat exists that a replacement level of computing could also be utilized by the
attackers, as presently because it becomes obtainable. Obviously, the new developments in knowledge
understanding, illustration and handling furthermore in machine learning can greatly enhance the cyber security
capability of systems that will use them.
REFERENCES:
[1] E. Tyugu. Algorithms and Architectures of Artificial Intelligence. IOS Press. 2007.
[2] B. Mayoh, E. Tyugu, J. Penjam. Constraint Programming. NATO ASI Series, v. 131, Springer Verlag. 1994.
[3] I. Bratko. PROLOG Programming for Artificial Intelligence. Addison-Wesley, 2001 (third edition).
[4] http://singinst.org/overview/whatisthesingularity/
[5] F. Rosenblatt. The Perceptron -- a perceiving and recognizing automaton. Report 85-460-1, Cornell
Aeronautical Laboratory, 1957.
[6] U. Schade, M. R. Hieb. A Battle Management Language for Orders, Requests and Reports. In: 2007 Spring
Simulatin Ineroperability Workshop. Norfolk, USA, 2006
[7] F. Barika, K. Hadjar, and N. El-Kadhi, “Artificial neural network for mobile IDS solution,” in Security and
Management, 2009.
[8] P. Norvig, S. Russell. Artificial Intelligence: Modern Approach. Prentice Hall, 2000.
[9] http://en.wikipedia.org/wiki/Expert_system. Expert System. Wikipedia.
[10] http://en.wikipedia.org/wiki/Conficker
[11] TF. Lunt, R. Jagannathan. A Prototype Real-Time Intrusion-Detection Expert System.Proc. IEEE
Symposium on Security and Privacy, 1988, p. 59.
[12] V. Chatzigiannakis, G. Androulidakis, B. Maglaris. A Distributed Intrusion Detection Prototype Using
Security Agents. HP OpenView University Association, 2004.
[13] R. Kurtzwell. The Singularity is Near. Viking Adult. 2005.
[14] J. Kivimaa, A. Ojamaa, E. Tyugu. Graded Security Expert System. Lecture Notes in Computer Science, v.
5508. Springer, 2009, 279-286.
[15] J. Kivimaa, A. Ojamaa, E. Tyugu. Pareto-Optimal Situation Analysis for Selection of Security Measures.
Proc. MilCom, 2008.
[16] B. Iftikhar, A. S. Alghamdi, “Application of artificial neural network in detection of dos attacks,” in SIN
’09: Proceedings of the 2nd international conference on Security of information and networks. New York,
NY, USA: ACM, 2009, pp. 229–234.
[17] P. Salvador et al. Framework for Zombie Detection Using Neural Networks. In: Fourth International
Conference on Internet Monitoring and Protection ICIMP-09, 2009.
[18] J. Bai, Y. Wu, G. Wang, S. X. Yang, and W. Qiu, A novel intrusion detection model based on multi-layer
self-organizing maps and principal component analysis, in Advances in Neural Networks. Lecture Notes in
Computer Science. Springer, 2006.

More Related Content

Similar to ARTIFICIAL INTELLIGENCE IN CYBER SECURITY

Every thing about Artificial Intelligence
Every thing about Artificial Intelligence Every thing about Artificial Intelligence
Every thing about Artificial Intelligence Vaibhav Mishra
 
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...IJCI JOURNAL
 
IRJET- Use of Artificial Intelligence in Cyber Defence
IRJET- Use of Artificial Intelligence in Cyber DefenceIRJET- Use of Artificial Intelligence in Cyber Defence
IRJET- Use of Artificial Intelligence in Cyber DefenceIRJET Journal
 
ICMRI2023_paper_3887.pdf
ICMRI2023_paper_3887.pdfICMRI2023_paper_3887.pdf
ICMRI2023_paper_3887.pdfBurhanNaeem1
 
A review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber securityA review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber securitybijejournal
 
AGI Part 4.pdf
AGI Part 4.pdfAGI Part 4.pdf
AGI Part 4.pdfBob Marcus
 
Cognitive Technologies_ Simplifying Complex Network Solutions to Usher in a T...
Cognitive Technologies_ Simplifying Complex Network Solutions to Usher in a T...Cognitive Technologies_ Simplifying Complex Network Solutions to Usher in a T...
Cognitive Technologies_ Simplifying Complex Network Solutions to Usher in a T...Anil
 
Artificial Intelligence in Cyber Security Research Paper Writing.pptx
Artificial Intelligence in Cyber Security Research Paper Writing.pptxArtificial Intelligence in Cyber Security Research Paper Writing.pptx
Artificial Intelligence in Cyber Security Research Paper Writing.pptxkellysmith617941
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityIRJET Journal
 
journal for research
journal for researchjournal for research
journal for researchrikaseorika
 
trends of information systems and artificial technology
trends of information systems and artificial technologytrends of information systems and artificial technology
trends of information systems and artificial technologymilkesa13
 
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningan efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningVenkat Projects
 
Hyperparameter optimization using custom genetic algorithm for classificatio...
Hyperparameter optimization using custom genetic algorithm  for classificatio...Hyperparameter optimization using custom genetic algorithm  for classificatio...
Hyperparameter optimization using custom genetic algorithm for classificatio...IJECEIAES
 
Security in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceSecurity in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceFaction XYZ
 
Tinay Artificial Intelligence
Tinay Artificial IntelligenceTinay Artificial Intelligence
Tinay Artificial IntelligenceCristina Faalam
 
intelligent computing relating to cloud computing
intelligent computing relating to cloud computingintelligent computing relating to cloud computing
intelligent computing relating to cloud computingEr. rahul abhishek
 

Similar to ARTIFICIAL INTELLIGENCE IN CYBER SECURITY (20)

Every thing about Artificial Intelligence
Every thing about Artificial Intelligence Every thing about Artificial Intelligence
Every thing about Artificial Intelligence
 
2018 learning approach-digitaltrends
2018 learning approach-digitaltrends2018 learning approach-digitaltrends
2018 learning approach-digitaltrends
 
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
 
Cognitive computing
Cognitive computing Cognitive computing
Cognitive computing
 
IRJET- Use of Artificial Intelligence in Cyber Defence
IRJET- Use of Artificial Intelligence in Cyber DefenceIRJET- Use of Artificial Intelligence in Cyber Defence
IRJET- Use of Artificial Intelligence in Cyber Defence
 
ICMRI2023_paper_3887.pdf
ICMRI2023_paper_3887.pdfICMRI2023_paper_3887.pdf
ICMRI2023_paper_3887.pdf
 
A review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber securityA review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber security
 
AGI Part 4.pdf
AGI Part 4.pdfAGI Part 4.pdf
AGI Part 4.pdf
 
Cognitive Technologies_ Simplifying Complex Network Solutions to Usher in a T...
Cognitive Technologies_ Simplifying Complex Network Solutions to Usher in a T...Cognitive Technologies_ Simplifying Complex Network Solutions to Usher in a T...
Cognitive Technologies_ Simplifying Complex Network Solutions to Usher in a T...
 
Artificial Intelligence in Cyber Security Research Paper Writing.pptx
Artificial Intelligence in Cyber Security Research Paper Writing.pptxArtificial Intelligence in Cyber Security Research Paper Writing.pptx
Artificial Intelligence in Cyber Security Research Paper Writing.pptx
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
 
journal for research
journal for researchjournal for research
journal for research
 
trends of information systems and artificial technology
trends of information systems and artificial technologytrends of information systems and artificial technology
trends of information systems and artificial technology
 
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningan efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learning
 
Hyperparameter optimization using custom genetic algorithm for classificatio...
Hyperparameter optimization using custom genetic algorithm  for classificatio...Hyperparameter optimization using custom genetic algorithm  for classificatio...
Hyperparameter optimization using custom genetic algorithm for classificatio...
 
Security in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceSecurity in the age of Artificial Intelligence
Security in the age of Artificial Intelligence
 
Cybersecurity Research.pptx
Cybersecurity Research.pptxCybersecurity Research.pptx
Cybersecurity Research.pptx
 
Tinay Artificial Intelligence
Tinay Artificial IntelligenceTinay Artificial Intelligence
Tinay Artificial Intelligence
 
Artificial intelligence
Artificial intelligence Artificial intelligence
Artificial intelligence
 
intelligent computing relating to cloud computing
intelligent computing relating to cloud computingintelligent computing relating to cloud computing
intelligent computing relating to cloud computing
 

More from Cynthia King

Personal And Educational Goals Essay
Personal And Educational Goals EssayPersonal And Educational Goals Essay
Personal And Educational Goals EssayCynthia King
 
Market Failure Essay
Market Failure EssayMarket Failure Essay
Market Failure EssayCynthia King
 
Ethical Dilemma Essay
Ethical Dilemma EssayEthical Dilemma Essay
Ethical Dilemma EssayCynthia King
 
Satirical Essays On Texting
Satirical Essays On TextingSatirical Essays On Texting
Satirical Essays On TextingCynthia King
 
Opinion Article Examples For Kids Persuasive Essay W
Opinion Article Examples For Kids Persuasive Essay WOpinion Article Examples For Kids Persuasive Essay W
Opinion Article Examples For Kids Persuasive Essay WCynthia King
 
Writing The Personal Essay - Colledge
Writing The Personal Essay - ColledgeWriting The Personal Essay - Colledge
Writing The Personal Essay - ColledgeCynthia King
 
Online Paper Writer
Online Paper WriterOnline Paper Writer
Online Paper WriterCynthia King
 
Disney Writing, Writing Paper Printable Stationery, Disne
Disney Writing, Writing Paper Printable Stationery, DisneDisney Writing, Writing Paper Printable Stationery, Disne
Disney Writing, Writing Paper Printable Stationery, DisneCynthia King
 
22 Free Policy Brief Templates Examples
22 Free Policy Brief Templates Examples22 Free Policy Brief Templates Examples
22 Free Policy Brief Templates ExamplesCynthia King
 
Why They CanT Write By John Warner
Why They CanT Write By John WarnerWhy They CanT Write By John Warner
Why They CanT Write By John WarnerCynthia King
 
Help - Barews.Web.Fc2.Com
Help - Barews.Web.Fc2.ComHelp - Barews.Web.Fc2.Com
Help - Barews.Web.Fc2.ComCynthia King
 
6 Things NOT To Do When Writing A Paper
6 Things NOT To Do When Writing A Paper6 Things NOT To Do When Writing A Paper
6 Things NOT To Do When Writing A PaperCynthia King
 
Tips For Teaching Grading Five Paragraph Essays P
Tips For Teaching Grading Five Paragraph Essays PTips For Teaching Grading Five Paragraph Essays P
Tips For Teaching Grading Five Paragraph Essays PCynthia King
 
How To Write A Play Script Fro
How To Write A Play Script FroHow To Write A Play Script Fro
How To Write A Play Script FroCynthia King
 
This Is Why I Hate Writing Essays RTumblr
This Is Why I Hate Writing Essays RTumblrThis Is Why I Hate Writing Essays RTumblr
This Is Why I Hate Writing Essays RTumblrCynthia King
 
An Informal Essay. Informal Essay Definition And Writin
An Informal Essay. Informal Essay Definition And WritinAn Informal Essay. Informal Essay Definition And Writin
An Informal Essay. Informal Essay Definition And WritinCynthia King
 
Writing A Prospectus For Your Academics - MakeMyAssig
Writing A Prospectus For Your Academics - MakeMyAssigWriting A Prospectus For Your Academics - MakeMyAssig
Writing A Prospectus For Your Academics - MakeMyAssigCynthia King
 
Who Is Writing Custom Essays - Top 3 Essay Writing Sevrice
Who Is Writing Custom Essays - Top 3 Essay Writing SevriceWho Is Writing Custom Essays - Top 3 Essay Writing Sevrice
Who Is Writing Custom Essays - Top 3 Essay Writing SevriceCynthia King
 

More from Cynthia King (20)

Personal And Educational Goals Essay
Personal And Educational Goals EssayPersonal And Educational Goals Essay
Personal And Educational Goals Essay
 
Market Failure Essay
Market Failure EssayMarket Failure Essay
Market Failure Essay
 
Ethical Dilemma Essay
Ethical Dilemma EssayEthical Dilemma Essay
Ethical Dilemma Essay
 
Do Essay
Do EssayDo Essay
Do Essay
 
Movie Essay
Movie EssayMovie Essay
Movie Essay
 
Satirical Essays On Texting
Satirical Essays On TextingSatirical Essays On Texting
Satirical Essays On Texting
 
Opinion Article Examples For Kids Persuasive Essay W
Opinion Article Examples For Kids Persuasive Essay WOpinion Article Examples For Kids Persuasive Essay W
Opinion Article Examples For Kids Persuasive Essay W
 
Writing The Personal Essay - Colledge
Writing The Personal Essay - ColledgeWriting The Personal Essay - Colledge
Writing The Personal Essay - Colledge
 
Online Paper Writer
Online Paper WriterOnline Paper Writer
Online Paper Writer
 
Disney Writing, Writing Paper Printable Stationery, Disne
Disney Writing, Writing Paper Printable Stationery, DisneDisney Writing, Writing Paper Printable Stationery, Disne
Disney Writing, Writing Paper Printable Stationery, Disne
 
22 Free Policy Brief Templates Examples
22 Free Policy Brief Templates Examples22 Free Policy Brief Templates Examples
22 Free Policy Brief Templates Examples
 
Why They CanT Write By John Warner
Why They CanT Write By John WarnerWhy They CanT Write By John Warner
Why They CanT Write By John Warner
 
Help - Barews.Web.Fc2.Com
Help - Barews.Web.Fc2.ComHelp - Barews.Web.Fc2.Com
Help - Barews.Web.Fc2.Com
 
6 Things NOT To Do When Writing A Paper
6 Things NOT To Do When Writing A Paper6 Things NOT To Do When Writing A Paper
6 Things NOT To Do When Writing A Paper
 
Tips For Teaching Grading Five Paragraph Essays P
Tips For Teaching Grading Five Paragraph Essays PTips For Teaching Grading Five Paragraph Essays P
Tips For Teaching Grading Five Paragraph Essays P
 
How To Write A Play Script Fro
How To Write A Play Script FroHow To Write A Play Script Fro
How To Write A Play Script Fro
 
This Is Why I Hate Writing Essays RTumblr
This Is Why I Hate Writing Essays RTumblrThis Is Why I Hate Writing Essays RTumblr
This Is Why I Hate Writing Essays RTumblr
 
An Informal Essay. Informal Essay Definition And Writin
An Informal Essay. Informal Essay Definition And WritinAn Informal Essay. Informal Essay Definition And Writin
An Informal Essay. Informal Essay Definition And Writin
 
Writing A Prospectus For Your Academics - MakeMyAssig
Writing A Prospectus For Your Academics - MakeMyAssigWriting A Prospectus For Your Academics - MakeMyAssig
Writing A Prospectus For Your Academics - MakeMyAssig
 
Who Is Writing Custom Essays - Top 3 Essay Writing Sevrice
Who Is Writing Custom Essays - Top 3 Essay Writing SevriceWho Is Writing Custom Essays - Top 3 Essay Writing Sevrice
Who Is Writing Custom Essays - Top 3 Essay Writing Sevrice
 

Recently uploaded

Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 

Recently uploaded (20)

Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 

ARTIFICIAL INTELLIGENCE IN CYBER SECURITY

  • 1. INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS www.ijrcar.com Vol.4 Issue 5, Pg.: 1-5 May 2016 D r . P r a n a v P a t i l Page 1 INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 ARTIFICIAL INTELLIGENCE IN CYBER SECURITY Dr. Pranav Patil Assistant Professor, Department of Computer Science, M. J. College, Jalgaon, Maharashtra, India Abstract: - The speed of processes and also the quantity of knowledge to be utilized in defensive the cyber area cannot be handled by humans while not sizeable automation. However, it is troublesome to develop software system with standard mounted algorithms (hard-wired logic on deciding level) for effectively defensive against the dynamically evolving attacks in networks. This example may be handled by applying strategies of computing that offer flexibility and learning capability to software system. This paper presents a quick survey of computing applications in cyber security, and analyzes the prospects of enhancing the cyber security capabilities by suggests that of accelerating the intelligence of the security systems. Once measuring the papers obtainable regarding AI applications in cyber security, we will conclude that helpful applications exist already. They belong; initial of all, to applications of artificial neural nets in perimeter security and a few alternative cyber security areas. From the opposite facet – it has become obvious that several cyber security issues may be resolved with success only strategies of AI are getting used. For instance, wide information usage is critical in deciding, and intelligent call support is one in all however unresolved issues in cyber security. Keywords: Cyber Security Methods, Artificial Intelligence, Visual nets, Expert Systems. 1. Introduction It is understandable that security against intelligent cyber bats will be achieved only by intelligent code, and events of the most recent years have shown quickly increasing intelligence of malware and cyber-weapons. Application of network central warfare makes cyber incidents particularly dangerous, and changes in cyber security are desperately needed. The new security ways like dynamic setup of secured perimeters, comprehensive scenario awareness, extremely machine-driven reaction on attacks in networks would require wide usage of AI ways and knowledge- based tools. Why has the role of intelligent code in cyber operations accrued thus rapidly? Wanting nearer at the cyber house, one will see the subsequent answer. AI is required, initial of all, for speedy reaction to things in web. One should be able to handle great deal of data in no time so as to explain and analyze events that happen in cyber house and to form needed choices. The speed of processes and also the quantity of information to be used cannot be handled by humans while not substantial automation. However, it is troublesome to develop code with standard mounted algorithms (hard-wired logic on deciding level) for effectively defensive against the attacks in cyber house,
  • 2. INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS www.ijrcar.com Vol.4 Issue 5, Pg.: 1-5 May 2016 D r . P r a n a v P a t i l Page 2 as a result of new threats seem perpetually. 2. Concerning AI Artificial intelligence (AI) as a field of research project (also known as machine intelligence within the beginning) is sort of as previous as electronic computers are a prospect of building devices/software/systems additional intelligent than persons has been from the first days of AI “on the horizon”. The matter is that the time horizon moves away once time passes. We have witnessed the determination of variety of showing intelligence exhausting issues by computers like enjoying sensible chess, as an example. Throughout the first days of computing the chess enjoying was thought of a benchmark showing a true intelligence. Even in seventies of the last century, once the pc chess was on the master’s level, it appeared nearly not possible to form a program that might beat the planet champion. it's typically accepted that AI will be thought of in 2 ways: as a science aimed toward making an attempt to get the essence of intelligence and developing typically intelligent machines, or as a science providing ways for determination complicated issues that can't be solved while not applying some intelligence like, as an example, enjoying sensible chess or creating right choices supported giant amounts of knowledge. Within the gift paper we are going to take the second approach, advocate for applying specific AI ways to cyber security issues. A large range of ways is developed within the AI field for finding laborious issues that need intelligence from the human perspective. Some of these ways have reached a stage of maturity wherever precise algorithms exist that is supported these ways. Some ways have even become thus wide known that they are not thought of happiness to AI any further, but became a section of some application area, as an example, data processing algorithms that have emerged from the training subfield of AI. It might be impossible to do to offer a lot of or less complete survey of all much helpful AI methods in a very transient survey. Instead, we have sorted the ways and architectures in many categories: neural nets, knowledgeable systems, intelligent agents, search, machine learning, data processing and constraint finding. We define these classes here, and that we provide references to the usage of individual ways in cyber security. We are not aiming to discuss tongue understanding, artificial intelligence and pc vision that we contemplate specific applications of AI. Robots and pc vision have positively spectacular military applications, however we have not found something specific to cyber security there. 2.1. Visual nets: visual nets have an extended history that begins with the invention of perceptron by Frank Rosenblatt in 1958 – a man-made nerve cell that has remained one among the foremost well-liked components of neural nets. Already a little variety of perceptrons combined along will learn and solve fascinating issues. However neural nets will include an oversized variety of artificial neurons. So neural nets offer a practicality of massively parallel learning and decision-making. Their most distinguished feature is that the speed of operation. They’re well matched for learning pattern recognition, for classification, for choice of responses to attacks etc. they will be enforced either in hardware before in software system. Neural nets are well relevant in intrusion detection and intrusion bar. There are proposals to use them in DoS detection, pc worm detection, spam detection, zombie detection, and malware classification and in rhetorical investigations. A reason for the recognition of neural nets in cyber security is their high speed, if enforced in hardware or utilized in graphic processors. There are new developments within the neural nets technology: third generation neural nets prickling neural networks that imitate organic neurons a lot of realistically, and supply a lot of application opportunities. 2.2Expert systems: These are unquestionably the foremost wide used AI tools. Associate skilled system is software system for locating answers to queries in some application domain bestowed either by a user or by another software system. It will be directly used for 98 call support, e.g. in diagnosing, in finances or in computer network. There’s a good sort of skilled systems from little technical diagnostic systems to terribly massive and hybrid systems for finding complex issues. Conceptually, associate skilled system includes a mental object, wherever skilled information a few specific application domains are hold on. Besides the mental object, it includes associate illation engine for account answers supported this information and, possibly, further information a few state of affairs. Empty mental object and illation engine are along referred to as skilled system shell - it should be stuffed with information, before it will be used. This system shell should be supported by software system for adding information
  • 3. INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS www.ijrcar.com Vol.4 Issue 5, Pg.: 1-5 May 2016 D r . P r a n a v P a t i l Page 3 within the mental object, and it will be extended with programs for user interactions, and with different programs that will be utilized in hybrid skilled systems. Developing associate skilled system means that, first, selection/adaptation of associate skilled system shell and, second, exploits skilled information and filling the mental object with the information. The second step is out and away a lot of difficult and time overwhelming than the primary. There are several tools for developing expert systems. In general, a tool includes associate expert system shell and has conjointly a practicality for adding information to the information repository. Expert systems will have further practicality for simulation, for creating calculations etc. There are many various information illustration forms in expert systems; the foremost common may be a rule-based illustration. However the utility of associate expert system depends principally on the standard of information within the expert system’s knowledge domain, and not most on the inner type of the information illustration. This leads one to the information acquisition drawback that is crucial in developing real applications. Example of a Cyber Security expert system is one for security designing. This expert system facilitates significantly choice of security measures, and provides guidance for best usage of restricted resources. There are early works on mistreatment expert systems in intrusion detection. 2.3. Intelligent agents: Intelligent agents are software system elements that possess some options of intelligent behavior that produces them special: pro-activeness, understanding of an agent communication language, reactivity (ability to form some selections and to act). They will have a designing ability, quality and reflection ability. Within the software system engineering community, there is a thought of software system agents wherever they are thought of to be objects that are a minimum of proactive and have the flexibility to use the agent communication language. comparison agents and objects, one will say that objects is also passive, and that they do not need to perceive any language victimization intelligent agents in security against DDoS has been represented, wherever simulation shows that cooperating agents will effectively defend against DDoS attacks. Once determination some legal and conjointly industrial several issues, it should be attainable in premise to develop a “cyber police” subsisting of mobile intelligent agents. This may need implementation of infrastructure for supporting the cyber agents’ quality and communication, however should be inaccessible for adversaries. This may need cooperation with ISP-s. Multi-agent tools will give a lot of complete operational image of the cyber house, as an example, a hybrid multi-agent and neural network-based intrusion detection method has been projected. Agent-based distributed intrusion detection is represented. 2.4. Search: Search may be a universal technique of downside finding which will be applied altogether cases once no different ways of downside finding are applicable. Individuals apply search in their daily life perpetually, while not listening to it. Little should be known so as to use some general search formula within the formal setting of the search problem: one should be able to generate candidates of solutions, and a procedure should be out there for deciding whether or not a planned candidate satisfies the wants for an answer. However, if extra information may be exploited to guide the search, then the potency of search may be drastically improved. Search is gift in some type nearly in each intelligent program, and its potency is commonly vital to the performance of the total program. An excellent form of search ways are developed that take under consideration the precise information regarding particular search issues. Though several search ways are developed in AI, and that they are wide utilized in several programs, it's rarely thought-about because the usage of AI. For instance, dynamic programming is actually utilized in finding optimum security issues, the search is hidden within the package and it's not visible as an AI application. Search on and or trees, αβ-search, minimax search and random search square measure wide utilized in games package, and that they are helpful in decision-making for cyber security. The αβ-search formula, originally developed for pc chess, is an implementation of a typically helpful preparation of “divide and conquer” in problem finding, and mostly in deciding once 2 adversaries are selecting their absolute best actions. It uses the estimates of minimally secured win and maximally doable loss. This allows one typically to ignore great amount of choices and significantly to hurry up the search. 2.5. Learning: Learning is raising a data system by extending or rearranging its cognitive content or by raising the illation engine. This is often one in all the foremost fascinating issues of AI that is beneath intensive investigation.
  • 4. INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS www.ijrcar.com Vol.4 Issue 5, Pg.: 1-5 May 2016 D r . P r a n a v P a t i l Page 4 Machine learning includes procedure strategies for getting new data, new skills and new ways that to prepare existing data. Issues of learning vary greatly by their complexness from easy constant learning which suggests learning values of some parameters, to difficult kinds of symbolic learning, for instance, learning of ideas, grammars, functions, even learning of behavior. AI provides strategies for each -- supervised learning further as unattended learning. The latter is very helpful within the case of presence of enormous quantity of knowledge, and this is often common in cyber security wherever giant logs will be collected. Data processing has originally adult out of unattended learning in AI. Unattended learning will be a practicality of neural nets, especially, of self-organizing maps. A distinguished category of learning strategies is implanted by parallel learning algorithms that are appropriate for execution on parallel hardware. These learning strategies are diagrammatical by genetic algorithms and neural nets. Genetic algorithms and symbolic logic has been, as an example, utilized in threat detection systems represented. 2.6.Constraint finding: Constraint finding or constraint satisfaction may be a technique developed in AI for locating solutions for issues that area unit conferred by giving a group of constraints on the answer, e.g. logical statements, tables, equations, inequalities. An answer of a drag may be a assortment of values that satisfy all constraints. Actually, there are many various constraint determination techniques, betting on the character of constraints. On a really abstract level, nearly any downside will be conferred as a constraint satisfaction downside. Particularly, several designing issues will be conferred as constraint satisfaction issues. These issues are troublesome to resolve as a result of great amount of search required normally. All constraint determination strategies are aimed toward limiting the search by taking into consideration specific info regarding the actual category of issues. Constraint determination will be used in scenario analysis and call support together with logic programming. 3. Challenges in Intelligent Cyber Security When coming up with the long run analysis, development and application of AI ways in Cyber Security, one needs to distinguish between the immediate goals and long views. There are varied AI ways directly applicable in Cyber Security, and present are immediate Cyber Security issues that must a lot of intelligent solutions than are enforced nowadays. As yet we have mentioned these existing immediate applications. Within the future, one will see promising views of the appliance of fully new principles of data handling in state of affairs management and deciding. These principles embrace introduction of a standard and hierarchal data design within the deciding software system. This sort of design has been planned. A difficult application space is that the data management for internet central warfare. Only automatic data management will guarantee fast state of affairs assessment that provides a choice superiority to leaders and decision manufacturers on any C2 level. Knowledgeable systems are already getting used in several applications, typically hidden within an application, like within the security measures coming up with software system. However, knowledgeable systems will get wider application, if massive data bases are going to be developed. This may need tidy investment in data acquisition, and development of huge standard data bases. Considering a lot of distant future -- a minimum of some decades ahead, maybe we should always not prohibit us to the “narrow AI”. Some individuals are convinced that the grand goal of the AI development of artificial general intelligence will be reached within the middle of the current century. The primary conference on artificial general intelligence was control in 2008 at the University of Memphis. The Singularity Institute for AI, supported in 4000, warns researchers of a danger that exponentially quicker development of intelligence in computers could occur. This development could result in Singularity, delineate in follows: “The Singularity is that the technological creation of smarter-than-human intelligence. There are many technologies that are usually mentioned as heading during this direction. The foremost usually mentioned is perhaps AI; however there are others many totally different technologies that, if they reached an intensity of sophistication, would change the creation of smarter-than-human intelligence. An opportunity that includes smarter-than-human minds is actually totally different in a very manner that goes on the far side the standard visions of a future stuffed with advanced devices.” A researcher has expected the event to come back up with Singularity. One needn't to believe the Singularity threat; however the fast development of knowledge technology will certainly change one to make significantly higher
  • 5. INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS www.ijrcar.com Vol.4 Issue 5, Pg.: 1-5 May 2016 D r . P r a n a v P a t i l Page 5 intelligence into software system in coming back years. Severally of whether or not the factitious general intelligence is obtainable or Singularity comes, it's crucial to own the power to use higher AI in cyber security than the offenders have it. 4. Conclusions In the present scenario of quickly growing intelligence of malware and class of cyber-attacks, it is inescapable to develop intelligent cyber security ways. The expertise in DDoS mitigation has shown that even a security against large-scale attacks will be undefeated with rather restricted resources once intelligent ways are used. An analysis of publications shows that the AI results most generally applicable in cyber security are provided by the analysis in artificial visual nets. Applications of visual nets can keep on in cyber security. There is additionally an imperative would like for application of intelligent cyber security ways in many areas wherever neural nets are not the foremost appropriate technology. These areas are called support, scenario awareness and data management. Professional system technology is that the most promising during this case. It is not clear however fast development of general computing is ahead, however a threat exists that a replacement level of computing could also be utilized by the attackers, as presently because it becomes obtainable. Obviously, the new developments in knowledge understanding, illustration and handling furthermore in machine learning can greatly enhance the cyber security capability of systems that will use them. REFERENCES: [1] E. Tyugu. Algorithms and Architectures of Artificial Intelligence. IOS Press. 2007. [2] B. Mayoh, E. Tyugu, J. Penjam. Constraint Programming. NATO ASI Series, v. 131, Springer Verlag. 1994. [3] I. Bratko. PROLOG Programming for Artificial Intelligence. Addison-Wesley, 2001 (third edition). [4] http://singinst.org/overview/whatisthesingularity/ [5] F. Rosenblatt. The Perceptron -- a perceiving and recognizing automaton. Report 85-460-1, Cornell Aeronautical Laboratory, 1957. [6] U. Schade, M. R. Hieb. A Battle Management Language for Orders, Requests and Reports. In: 2007 Spring Simulatin Ineroperability Workshop. Norfolk, USA, 2006 [7] F. Barika, K. Hadjar, and N. El-Kadhi, “Artificial neural network for mobile IDS solution,” in Security and Management, 2009. [8] P. Norvig, S. Russell. Artificial Intelligence: Modern Approach. Prentice Hall, 2000. [9] http://en.wikipedia.org/wiki/Expert_system. Expert System. Wikipedia. [10] http://en.wikipedia.org/wiki/Conficker [11] TF. Lunt, R. Jagannathan. A Prototype Real-Time Intrusion-Detection Expert System.Proc. IEEE Symposium on Security and Privacy, 1988, p. 59. [12] V. Chatzigiannakis, G. Androulidakis, B. Maglaris. A Distributed Intrusion Detection Prototype Using Security Agents. HP OpenView University Association, 2004. [13] R. Kurtzwell. The Singularity is Near. Viking Adult. 2005. [14] J. Kivimaa, A. Ojamaa, E. Tyugu. Graded Security Expert System. Lecture Notes in Computer Science, v. 5508. Springer, 2009, 279-286. [15] J. Kivimaa, A. Ojamaa, E. Tyugu. Pareto-Optimal Situation Analysis for Selection of Security Measures. Proc. MilCom, 2008. [16] B. Iftikhar, A. S. Alghamdi, “Application of artificial neural network in detection of dos attacks,” in SIN ’09: Proceedings of the 2nd international conference on Security of information and networks. New York, NY, USA: ACM, 2009, pp. 229–234. [17] P. Salvador et al. Framework for Zombie Detection Using Neural Networks. In: Fourth International Conference on Internet Monitoring and Protection ICIMP-09, 2009. [18] J. Bai, Y. Wu, G. Wang, S. X. Yang, and W. Qiu, A novel intrusion detection model based on multi-layer self-organizing maps and principal component analysis, in Advances in Neural Networks. Lecture Notes in Computer Science. Springer, 2006.