SlideShare a Scribd company logo
1 of 28
Democritus University of Thrace
Dep. of Forestry & Management of the Environment & Natural Resources
Forest Informatics Laboratory
Konstantinos Demertzis – Lazaros Iliadis
ESADM
ECISMD
Hybrid Artificial Intelligence System for Cyber Security
2
Hybrid Artificial Intelligence System for Cyber Security
 Agenda
– Introduction
– Hybrid Artificial Intelligence System for Cyber Security (HAISCS)
– Evolving Spiking Anomaly Detection Model (ESADM)
– Evolving Computational Intelligence System for Malware Detection (ECISMD)
– ESADM
– Spiking Neural Network Classification
– Spiking Neural Network Pattern Recognition
– ECISMD
– Spiking Neural Network Classification
– Evolving Classification Function (ECF)
– Genetic Algorithm for Offline ECF Optimization
– Results
– Future Directions
– Conclusions
Democritus University of Thrace
Dep. of Forestry & Management of the Environment & Natural Resources
Forest Informatics Laboratory
3
 Introduction
– Artificial Intelligence (AI)
– is the intelligence exhibited by machines or software, and the branch of computer
science that develops machines and software with intelligence.
– Machine Learning
– a branch of artificial intelligence, concerns the construction and study of systems
that can learn from data.
Hybrid Artificial Intelligence System for Cyber Security
– Pattern Recognition
– in machine learning aims to classify data
(patterns) based on either priori knowledge
extracted from the patterns.
– Classification
– is the problem of identifying to which of a set of
categories (sub-populations) a new observation
belongs, on the basis of a training set of data
containing observations (or instances) whose
category membership is known (Supervised
Learning).
Democritus University of Thrace
Dep. of Forestry & Management of the Environment & Natural Resources
Forest Informatics Laboratory
4
 Hybrid Artificial Intelligence System for Cyber Security (HAISCS)
Hybrid
Evolving
Spiking
Anomaly
Detection
Model
(HESADM)
Hybrid Artificial Intelligence System for Cyber Security
ESADM
ECISMD
Democritus University of Thrace
Dep. of Forestry & Management of the Environment & Natural Resources
Forest Informatics Laboratory
5
 Evolving Spiking Anomaly Detection Model (ESADM)
Hybrid Artificial Intelligence System for Cyber Security
ESADM
Democritus University of Thrace
Dep. of Forestry & Management of the Environment & Natural Resources
Forest Informatics Laboratory
6
 Evolving Spiking Anomaly Detection Model (ESADM)
Hybrid Artificial Intelligence System for Cyber Security
Democritus University of Thrace
Dep. of Forestry & Management of the Environment & Natural Resources
Forest Informatics Laboratory
7
 Evolving Spiking Anomaly Detection Model (ESADM)
Hybrid Artificial Intelligence System for Cyber Security
Democritus University of Thrace
Dep. of Forestry & Management of the Environment & Natural Resources
Forest Informatics Laboratory
8
 Evolving Spiking Anomaly Detection Model (ESADM)
– Evolving Spiking Neural Network (eSNN) Classification
– Gaussian Receptive Fields
– Rank Order Population Encoding
– One-Pass Learning
Hybrid Artificial Intelligence System for Cyber Security
Democritus University of Thrace
Dep. of Forestry & Management of the Environment & Natural Resources
Forest Informatics Laboratory
9
 Evolving Spiking Anomaly Detection Model (ESADM)
Hybrid Artificial Intelligence System for Cyber Security
Democritus University of Thrace
Dep. of Forestry & Management of the Environment & Natural Resources
Forest Informatics Laboratory
10
 Evolving Spiking Anomaly Detection Model (ESADM)
Hybrid Artificial Intelligence System for Cyber Security
Democritus University of Thrace
Dep. of Forestry & Management of the Environment & Natural Resources
Forest Informatics Laboratory
11
 Evolving Spiking Anomaly Detection Model (ESADM)
Hybrid Artificial Intelligence System for Cyber Security
Democritus University of Thrace
Dep. of Forestry & Management of the Environment & Natural Resources
Forest Informatics Laboratory
12
 Evolving Spiking Anomaly Detection Model (ESADM)
Hybrid Artificial Intelligence System for Cyber Security
Democritus University of Thrace
Dep. of Forestry & Management of the Environment & Natural Resources
Forest Informatics Laboratory
13
 Evolving Spiking Anomaly Detection Model (ESADM)
Hybrid Artificial Intelligence System for Cyber Security
Traf_Red_Full Dataset
Classifier
Train
Accuracy
Test
Accuracy
NaiveBayes 96.387% 95.3981%
RBFNetwork 94.9734% 93.3281%
MLP 97.9475% 97.3743%
LibSVM 98.9691% 97.0335%
k-NN 97.5435% 97.4452%
J48 97.619% 97.4909%
RandomForest 97.57% 97.5046%
LogisticRegression 97.8937% 96.9008%
BayesNet 97.9025% 96.9237%
AdaBoost 96.0311% 95.947%
eSNN 98,9% 97,7%
normalFull Dataset
Classifier
Train
Accuracy
Test
Accuracy
NaiveBayes 99.5112% 98.895%
RBFNetwork 99.9351% 99.4412%
MLP 99.9818% 99.8992%
LibSVM 99.673% 99.1088%
k-NN 99.2554% 98.9278%
J48 99.7751% 99.719%
RandomForest 99.8463% 98.9561%
LogisticRegression 98.998% 98.9855%
BayesNet 98.9933% 98.9718%
AdaBoost 99.2784% 98.9357%
eSNN 99.999% 99.9%
Democritus University of Thrace
Dep. of Forestry & Management of the Environment & Natural Resources
Forest Informatics Laboratory
14
 Evolving Computational Intelligence System for Malware Detection (ECISMD)
Hybrid Artificial Intelligence System for Cyber Security
ESADM
ECISMD
Democritus University of Thrace
Dep. of Forestry & Management of the Environment & Natural Resources
Forest Informatics Laboratory
15
 Evolving Computational Intelligence System for Malware Detection (ECISMD)
Hybrid Artificial Intelligence System for Cyber Security
Democritus University of Thrace
Dep. of Forestry & Management of the Environment & Natural Resources
Forest Informatics Laboratory
16
 Evolving Computational Intelligence System for Malware Detection (ECISMD)
Hybrid Artificial Intelligence System for Cyber Security
Democritus University of Thrace
Dep. of Forestry & Management of the Environment & Natural Resources
Forest Informatics Laboratory
17
 Evolving Computational Intelligence System for Malware Detection (ECISMD)
– Evolving Classification Function (ECF)
– used for pattern classification, generates rule nodes in an N dimensional input
space and associate them with classes. Each rule node is defined with its centre,
radius (influence field) and the class it belongs to. A learning mechanism is
designed in such a way that the nodes can be generated.
Hybrid Artificial Intelligence System for Cyber Security
Rule 1:if
X1 is ( 2: 0.50 )
X2 is ( 1: 0.69 )
X3 is ( 1: 0.95 )
X4 is ( 1: 0.95 )
X5 is ( 1: 0.94 )
X6 is ( 1: 0.52 )
X7 is ( 1: 0.95 )
X8 is ( 2: 0.87 )
X9 is ( 2: 0.82 )
then Class is [1]
Radius = 0.022719 , 20 in node
Democritus University of Thrace
Dep. of Forestry & Management of the Environment & Natural Resources
Forest Informatics Laboratory
18
 Evolving Computational Intelligence System for Malware Detection (ECISMD)
Hybrid Artificial Intelligence System for Cyber Security
Democritus University of Thrace
Dep. of Forestry & Management of the Environment & Natural Resources
Forest Informatics Laboratory
19
 Evolving Computational Intelligence System for Malware Detection (ECISMD).
Hybrid Artificial Intelligence System for Cyber Security
– Genetic Algorithm for Offline ECF Optimization
– A Genetic Algorithm is an evolutionary
algorithm in which the principles of the
Darwin's theory of evolution are applied to
a population of solutions to a problem in
order to "breed" better solutions.
– Solutions, in this case the parameters of the
ECF network, are encoded in a binary string
and each solution is given a score depending
on how well it performs.
– Good solutions are selected more frequently
for breeding, and are subjected to crossover
and mutation (loosely analogous to those
operations found in biological systems).
– After several generations, the population of
solutions should converge on a "good"
solution.
Democritus University of Thrace
Dep. of Forestry & Management of the Environment & Natural Resources
Forest Informatics Laboratory
20
 Evolving Computational Intelligence System for Malware Detection (ECISMD)
Hybrid Artificial Intelligence System for Cyber Security
Democritus University of Thrace
Dep. of Forestry & Management of the Environment & Natural Resources
Forest Informatics Laboratory
21
 Evolving Computational Intelligence System for Malware Detection (ECISMD)
Hybrid Artificial Intelligence System for Cyber Security
Democritus University of Thrace
Dep. of Forestry & Management of the Environment & Natural Resources
Forest Informatics Laboratory
22
 Evolving Computational Intelligence System for Malware Detection (ECISMD)
Hybrid Artificial Intelligence System for Cyber Security
Packed Dataset
Classifier
Train
Accuracy
Test
Accuracy
RBFNetwork 98.3085% 98.0859%
NaiveBayes 98.3975% 97.1144%
MLP 99.5326% 96.2189%
LibSVM 99.4436% 89.8507%
k-NN 99.4436% 96.6169%
eSNN 99.8% 99.2%
Democritus University of Thrace
Dep. of Forestry & Management of the Environment & Natural Resources
Forest Informatics Laboratory
23
 Evolving Computational Intelligence System for Malware Detection (ECISMD)
Hybrid Artificial Intelligence System for Cyber Security
Malware Dataset
Classifier
Train
Accuracy
Test
Accuracy
RBFNetwork 94.4031% 93.0612%
NaiveBayes 94.0533% 92.3469%
MLP 97.7551% 97.289%
LibSVM 94.6218% 94.2857%
k-NN 98.1198% 96.8367%
ECF 99.05% 95.561%
Optimized
ECF
99.87% 97.992%
Democritus University of Thrace
Dep. of Forestry & Management of the Environment & Natural Resources
Forest Informatics Laboratory
24
 Evolving Computational Intelligence System for Malware Detection (ECISMD)
– Future Directions
Hybrid Artificial Intelligence System for Cyber Security
Democritus University of Thrace
Dep. of Forestry & Management of the Environment & Natural Resources
Forest Informatics Laboratory
25
 Demertzis K., Iliadis L. (2014). A Hybrid Network Anomaly and Intrusion Detection Approach Based on
Evolving Spiking Neural Network Classification. In: Sideridis A., Kardasiadou Z., Yialouris C., Zorkadis V.
(eds) E-Democracy, Security, Privacy and Trust in a Digital World. e-Democracy 2013. Communications in
Computer and Information Science, vol 441. Springer, Cham
 Demertzis K., Iliadis L. (2014). Evolving Computational Intelligence System for Malware Detection, In:
Advanced Information Systems Engineering Workshops, Lecture Notes in Business Information
Processing, 178, 322-334. doi: 10.1007/978-3-319-07869-4_30
 Demertzis K., Iliadis L. (2014, April). Bio-Inspired Hybrid Artificial Intelligence Framework for Cyber
Security. In: Daras N., Rassias M. (eds) Computation, Cryptography, and Network Security. Springer,
Cham
 Demertzis K., Iliadis L. (2014, November). Bio-Inspired Hybrid Intelligent Method for Detecting Android
Malware, In: Iliadis L., Papazoglou M., Pohl K. (eds) Advanced Information Systems Engineering
Workshops. CAiSE 2014. Lecture Notes in Business Information Processing, vol 178. Springer, Cham
 [Demertzis K., Iliadis L. (2015, April). Evolving Smart URL Filter in a Zone-based Policy Firewall for
Detecting Algorithmically Generated Malicious Domains. In: Gammerman A., Vovk V., Papadopoulos H.
(eds) Statistical Learning and Data Sciences. SLDS 2015. Lecture Notes in Computer Science, vol 9047.
Springer, Cham.
 Demertzis K., Iliadis L. (2015, September). SAME: An Intelligent Anti-Malware Extension for Android ART
Virtual Machine. In: Núñez M., Nguyen N., Camacho D., Trawiński B. (eds) Computational Collective
Intelligence. Lecture Notes in Computer Science, vol 9330. Springer.
 Demertzis K., Iliadis L. (2016), Computational Intelligence Anti-Malware Framework for Android OS,
Vietnam J Comput Sci (2017) 4: 245. https://doi.org/10.1007/s40595-017-0095-3.
Hybrid Artificial Intelligence System for Cyber Security
Democritus University of Thrace
Dep. of Forestry & Management of the Environment & Natural Resources
Forest Informatics Laboratory
26
 Demertzis K., Iliadis L. (2016), Ladon: A Cyber-Threat Bio-Inspired Intelligence Management System,
Journal of Applied Mathematics & Bioinformatics, vol.6, no.3, 2016, 45-64, ISSN: 1792-6602 (print), 1792-
6939 (online), Scienpress Ltd, 2016.
 Demertzis K., L. S. Iliadis, V.-D. Anezakis, An innovative soft computing system for smart energy grids
cybersecurity, Advances in Building Energy Research, pp. 1-22, Taylor & Francis.
 K. Demertzis and L. Iliadis, “The Impact of Climate Change on Biodiversity: The Ecological Consequences
of Invasive Species in Greece”. In: Leal Filho W., Manolas E., Azul A., Azeiteiro U., McGhie H. (eds),
Handbook of Climate Change Communication: vol. 1, Climate Change Management, pp.15-38. Springer,
Cham, 2018. https://doi.org/10.1007/978-3-319-69838-0_2
 K. Demertzis, L. Iliadis and V.D. Anezakis, “A deep spiking machine-hearing system for the case of
invasive fish species”, Proceedings of 2017 IEEE International Conference on Innovations in Intelligent
Systems and Applications, Gdynia, Poland, pp. 23-28, 2017. doi:10.1109/INISTA.2017.8001126
 K. Demertzis, L.S. Iliadis and V.D. Anezakis, “Commentary: Aedes albopictus and Aedes japonicus—two
invasive mosquito species with different temperature niches in Europe”, Frontiers in Environmental
Science, vol.5, no. 85, pp. 1-3, 2017. doi: 10.3389/fenvs.2017.00085
 K. Demertzis and L. Iliadis, “Detecting invasive species with a bio-inspired semisupervised
neurocomputing approach: the case of Lagocephalus sceleratus”, Neural Computing & Applications,
vol.28, no.6, pp. 1225-1234, 2017. Springer, London. https://doi.org/10.1007/s00521-016-2591-2
Hybrid Artificial Intelligence System for Cyber Security
Democritus University of Thrace
Dep. of Forestry & Management of the Environment & Natural Resources
Forest Informatics Laboratory
27
Hybrid Artificial Intelligence System for Cyber Security
 Forest Informatics Laboratory
 Director of the Lab Professor Lazaros S. Iliadis
 Research Areas
– Fuzzy Logic
– Computational Intelligence
– Soft Computing
– Machine Learning
– Pattern Recognition
– Neural Networks
– Support Vector Machines
– Genetic Algorithms
– Adaptive Fuzzy Clustering
– Heuristic Models
– Intelligent Agents – multiAgent Systems
– Expert Systems - Knowledge Systems - Fuzzy Inference Systems
– Intelligent Information Systems and Applications in Risk Management
Democritus University of Thrace
Dep. of Forestry & Management of the Environment & Natural Resources
Forest Informatics Laboratory
28
kdemertz@fmenr.duth.gr | liliadis@fmenr.duth.gr
Hybrid Artificial Intelligence System for Cyber Security
 Conclusion
Democritus University of Thrace
Dep. of Forestry & Management of the Environment & Natural Resources
Forest Informatics Laboratory

More Related Content

Similar to Hybrid Artificial Intelligence System for Cyber Security

II-SDV 2017: The Next Era: Deep Learning for Biomedical Research
II-SDV 2017: The Next Era: Deep Learning for Biomedical ResearchII-SDV 2017: The Next Era: Deep Learning for Biomedical Research
II-SDV 2017: The Next Era: Deep Learning for Biomedical Research
Dr. Haxel Consult
 
An intrusion detection system for packet and flow based networks using deep n...
An intrusion detection system for packet and flow based networks using deep n...An intrusion detection system for packet and flow based networks using deep n...
An intrusion detection system for packet and flow based networks using deep n...
IJECEIAES
 
Titles with Abstracts_2023-2024_Data Mining.pdf
Titles with Abstracts_2023-2024_Data Mining.pdfTitles with Abstracts_2023-2024_Data Mining.pdf
Titles with Abstracts_2023-2024_Data Mining.pdf
info751436
 
Enhancement of Error Correction in Quantum Cryptography BB84 ...
Enhancement of Error Correction in Quantum Cryptography BB84 ...Enhancement of Error Correction in Quantum Cryptography BB84 ...
Enhancement of Error Correction in Quantum Cryptography BB84 ...
butest
 

Similar to Hybrid Artificial Intelligence System for Cyber Security (20)

BOTNET DETECTION USING VARIOUS MACHINE LEARNING ALGORITHMS: A REVIEW
BOTNET DETECTION USING VARIOUS MACHINE LEARNING ALGORITHMS: A REVIEWBOTNET DETECTION USING VARIOUS MACHINE LEARNING ALGORITHMS: A REVIEW
BOTNET DETECTION USING VARIOUS MACHINE LEARNING ALGORITHMS: A REVIEW
 
What the Brain says about Machine Intelligence
What the Brain says about Machine Intelligence What the Brain says about Machine Intelligence
What the Brain says about Machine Intelligence
 
II-SDV 2017: The Next Era: Deep Learning for Biomedical Research
II-SDV 2017: The Next Era: Deep Learning for Biomedical ResearchII-SDV 2017: The Next Era: Deep Learning for Biomedical Research
II-SDV 2017: The Next Era: Deep Learning for Biomedical Research
 
My
MyMy
My
 
AI for Cybersecurity Innovation
AI for Cybersecurity InnovationAI for Cybersecurity Innovation
AI for Cybersecurity Innovation
 
An intrusion detection system for packet and flow based networks using deep n...
An intrusion detection system for packet and flow based networks using deep n...An intrusion detection system for packet and flow based networks using deep n...
An intrusion detection system for packet and flow based networks using deep n...
 
1st review android malware.pptx
1st review  android malware.pptx1st review  android malware.pptx
1st review android malware.pptx
 
MultiAgent artificial immune system for network intrusion detection
MultiAgent artificial immune system for network intrusion detectionMultiAgent artificial immune system for network intrusion detection
MultiAgent artificial immune system for network intrusion detection
 
Titles with Abstracts_2023-2024_Data Mining.pdf
Titles with Abstracts_2023-2024_Data Mining.pdfTitles with Abstracts_2023-2024_Data Mining.pdf
Titles with Abstracts_2023-2024_Data Mining.pdf
 
Applications of Artificial Neural Networks in Cancer Prediction
Applications of Artificial Neural Networks in Cancer PredictionApplications of Artificial Neural Networks in Cancer Prediction
Applications of Artificial Neural Networks in Cancer Prediction
 
A Literature Research Review On Animal Intrusion Detection And Repellent Systems
A Literature Research Review On Animal Intrusion Detection And Repellent SystemsA Literature Research Review On Animal Intrusion Detection And Repellent Systems
A Literature Research Review On Animal Intrusion Detection And Repellent Systems
 
INTELLIGENT MALWARE DETECTION USING EXTREME LEARNING MACHINE
INTELLIGENT MALWARE DETECTION USING EXTREME LEARNING MACHINEINTELLIGENT MALWARE DETECTION USING EXTREME LEARNING MACHINE
INTELLIGENT MALWARE DETECTION USING EXTREME LEARNING MACHINE
 
Using Learning Vector Quantization in IDS Alert Management System
Using Learning Vector Quantization in IDS Alert Management SystemUsing Learning Vector Quantization in IDS Alert Management System
Using Learning Vector Quantization in IDS Alert Management System
 
Creating Alert Messages Based on Wild Animal Activity Detection Using Hybrid ...
Creating Alert Messages Based on Wild Animal Activity Detection Using Hybrid ...Creating Alert Messages Based on Wild Animal Activity Detection Using Hybrid ...
Creating Alert Messages Based on Wild Animal Activity Detection Using Hybrid ...
 
Bioinformatics_1_ChenS.pptx
Bioinformatics_1_ChenS.pptxBioinformatics_1_ChenS.pptx
Bioinformatics_1_ChenS.pptx
 
Data mining
Data mining Data mining
Data mining
 
Wireless sensor network wireless network
Wireless sensor network wireless networkWireless sensor network wireless network
Wireless sensor network wireless network
 
Enhancement of Error Correction in Quantum Cryptography BB84 ...
Enhancement of Error Correction in Quantum Cryptography BB84 ...Enhancement of Error Correction in Quantum Cryptography BB84 ...
Enhancement of Error Correction in Quantum Cryptography BB84 ...
 
Machine Learning
Machine LearningMachine Learning
Machine Learning
 
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdfIRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
 

More from Konstantinos Demertzis

A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
Konstantinos Demertzis
 
The Next Generation Cognitive Security Operations Center: Adaptive Analytic L...
The Next Generation Cognitive Security Operations Center: Adaptive Analytic L...The Next Generation Cognitive Security Operations Center: Adaptive Analytic L...
The Next Generation Cognitive Security Operations Center: Adaptive Analytic L...
Konstantinos Demertzis
 
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
Konstantinos Demertzis
 
GeoAI: A Model-Agnostic Meta-Ensemble Zero-Shot Learning Method for Hyperspec...
GeoAI: A Model-Agnostic Meta-Ensemble Zero-Shot Learning Method for Hyperspec...GeoAI: A Model-Agnostic Meta-Ensemble Zero-Shot Learning Method for Hyperspec...
GeoAI: A Model-Agnostic Meta-Ensemble Zero-Shot Learning Method for Hyperspec...
Konstantinos Demertzis
 
Extreme deep learning in biosecurity the case of machine hearing for marine s...
Extreme deep learning in biosecurity the case of machine hearing for marine s...Extreme deep learning in biosecurity the case of machine hearing for marine s...
Extreme deep learning in biosecurity the case of machine hearing for marine s...
Konstantinos Demertzis
 
Πρόβλεψη Χαλαζοπτώσεων Μέσω Μηχανικής Μάθησης
Πρόβλεψη Χαλαζοπτώσεων Μέσω Μηχανικής ΜάθησηςΠρόβλεψη Χαλαζοπτώσεων Μέσω Μηχανικής Μάθησης
Πρόβλεψη Χαλαζοπτώσεων Μέσω Μηχανικής Μάθησης
Konstantinos Demertzis
 

More from Konstantinos Demertzis (12)

Commentary: Aedes albopictus and Aedes japonicus—two invasive mosquito specie...
Commentary: Aedes albopictus and Aedes japonicus—two invasive mosquito specie...Commentary: Aedes albopictus and Aedes japonicus—two invasive mosquito specie...
Commentary: Aedes albopictus and Aedes japonicus—two invasive mosquito specie...
 
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
 
The Next Generation Cognitive Security Operations Center: Adaptive Analytic L...
The Next Generation Cognitive Security Operations Center: Adaptive Analytic L...The Next Generation Cognitive Security Operations Center: Adaptive Analytic L...
The Next Generation Cognitive Security Operations Center: Adaptive Analytic L...
 
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
 
GeoAI: A Model-Agnostic Meta-Ensemble Zero-Shot Learning Method for Hyperspec...
GeoAI: A Model-Agnostic Meta-Ensemble Zero-Shot Learning Method for Hyperspec...GeoAI: A Model-Agnostic Meta-Ensemble Zero-Shot Learning Method for Hyperspec...
GeoAI: A Model-Agnostic Meta-Ensemble Zero-Shot Learning Method for Hyperspec...
 
Modeling and Forecasting the COVID-19 Temporal Spread in Greece: An Explorato...
Modeling and Forecasting the COVID-19 Temporal Spread in Greece: An Explorato...Modeling and Forecasting the COVID-19 Temporal Spread in Greece: An Explorato...
Modeling and Forecasting the COVID-19 Temporal Spread in Greece: An Explorato...
 
Extreme deep learning in biosecurity the case of machine hearing for marine s...
Extreme deep learning in biosecurity the case of machine hearing for marine s...Extreme deep learning in biosecurity the case of machine hearing for marine s...
Extreme deep learning in biosecurity the case of machine hearing for marine s...
 
Internet programming
Internet programmingInternet programming
Internet programming
 
Cyber security
Cyber securityCyber security
Cyber security
 
Machine learning
Machine learningMachine learning
Machine learning
 
Safer internet
Safer internetSafer internet
Safer internet
 
Πρόβλεψη Χαλαζοπτώσεων Μέσω Μηχανικής Μάθησης
Πρόβλεψη Χαλαζοπτώσεων Μέσω Μηχανικής ΜάθησηςΠρόβλεψη Χαλαζοπτώσεων Μέσω Μηχανικής Μάθησης
Πρόβλεψη Χαλαζοπτώσεων Μέσω Μηχανικής Μάθησης
 

Recently uploaded

+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
Health
 
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Klinik kandungan
 
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
nirzagarg
 
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
nirzagarg
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
nirzagarg
 
PLE-statistics document for primary schs
PLE-statistics document for primary schsPLE-statistics document for primary schs
PLE-statistics document for primary schs
cnajjemba
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 
一比一原版(UCD毕业证书)加州大学戴维斯分校毕业证成绩单原件一模一样
一比一原版(UCD毕业证书)加州大学戴维斯分校毕业证成绩单原件一模一样一比一原版(UCD毕业证书)加州大学戴维斯分校毕业证成绩单原件一模一样
一比一原版(UCD毕业证书)加州大学戴维斯分校毕业证成绩单原件一模一样
wsppdmt
 
怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制
怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制
怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制
vexqp
 
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
nirzagarg
 
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
gajnagarg
 
怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制
怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制
怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制
vexqp
 
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
gajnagarg
 
怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制
怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制
怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制
vexqp
 

Recently uploaded (20)

+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
 
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
 
Capstone in Interprofessional Informatic // IMPACT OF COVID 19 ON EDUCATION
Capstone in Interprofessional Informatic  // IMPACT OF COVID 19 ON EDUCATIONCapstone in Interprofessional Informatic  // IMPACT OF COVID 19 ON EDUCATION
Capstone in Interprofessional Informatic // IMPACT OF COVID 19 ON EDUCATION
 
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
 
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
 
PLE-statistics document for primary schs
PLE-statistics document for primary schsPLE-statistics document for primary schs
PLE-statistics document for primary schs
 
Switzerland Constitution 2002.pdf.........
Switzerland Constitution 2002.pdf.........Switzerland Constitution 2002.pdf.........
Switzerland Constitution 2002.pdf.........
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 
The-boAt-Story-Navigating-the-Waves-of-Innovation.pptx
The-boAt-Story-Navigating-the-Waves-of-Innovation.pptxThe-boAt-Story-Navigating-the-Waves-of-Innovation.pptx
The-boAt-Story-Navigating-the-Waves-of-Innovation.pptx
 
一比一原版(UCD毕业证书)加州大学戴维斯分校毕业证成绩单原件一模一样
一比一原版(UCD毕业证书)加州大学戴维斯分校毕业证成绩单原件一模一样一比一原版(UCD毕业证书)加州大学戴维斯分校毕业证成绩单原件一模一样
一比一原版(UCD毕业证书)加州大学戴维斯分校毕业证成绩单原件一模一样
 
怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制
怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制
怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制
 
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
 
Aspirational Block Program Block Syaldey District - Almora
Aspirational Block Program Block Syaldey District - AlmoraAspirational Block Program Block Syaldey District - Almora
Aspirational Block Program Block Syaldey District - Almora
 
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
 
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
 
怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制
怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制
怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制
 
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
 
怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制
怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制
怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制
 

Hybrid Artificial Intelligence System for Cyber Security

  • 1. Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory Konstantinos Demertzis – Lazaros Iliadis ESADM ECISMD Hybrid Artificial Intelligence System for Cyber Security
  • 2. 2 Hybrid Artificial Intelligence System for Cyber Security  Agenda – Introduction – Hybrid Artificial Intelligence System for Cyber Security (HAISCS) – Evolving Spiking Anomaly Detection Model (ESADM) – Evolving Computational Intelligence System for Malware Detection (ECISMD) – ESADM – Spiking Neural Network Classification – Spiking Neural Network Pattern Recognition – ECISMD – Spiking Neural Network Classification – Evolving Classification Function (ECF) – Genetic Algorithm for Offline ECF Optimization – Results – Future Directions – Conclusions Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory
  • 3. 3  Introduction – Artificial Intelligence (AI) – is the intelligence exhibited by machines or software, and the branch of computer science that develops machines and software with intelligence. – Machine Learning – a branch of artificial intelligence, concerns the construction and study of systems that can learn from data. Hybrid Artificial Intelligence System for Cyber Security – Pattern Recognition – in machine learning aims to classify data (patterns) based on either priori knowledge extracted from the patterns. – Classification – is the problem of identifying to which of a set of categories (sub-populations) a new observation belongs, on the basis of a training set of data containing observations (or instances) whose category membership is known (Supervised Learning). Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory
  • 4. 4  Hybrid Artificial Intelligence System for Cyber Security (HAISCS) Hybrid Evolving Spiking Anomaly Detection Model (HESADM) Hybrid Artificial Intelligence System for Cyber Security ESADM ECISMD Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory
  • 5. 5  Evolving Spiking Anomaly Detection Model (ESADM) Hybrid Artificial Intelligence System for Cyber Security ESADM Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory
  • 6. 6  Evolving Spiking Anomaly Detection Model (ESADM) Hybrid Artificial Intelligence System for Cyber Security Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory
  • 7. 7  Evolving Spiking Anomaly Detection Model (ESADM) Hybrid Artificial Intelligence System for Cyber Security Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory
  • 8. 8  Evolving Spiking Anomaly Detection Model (ESADM) – Evolving Spiking Neural Network (eSNN) Classification – Gaussian Receptive Fields – Rank Order Population Encoding – One-Pass Learning Hybrid Artificial Intelligence System for Cyber Security Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory
  • 9. 9  Evolving Spiking Anomaly Detection Model (ESADM) Hybrid Artificial Intelligence System for Cyber Security Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory
  • 10. 10  Evolving Spiking Anomaly Detection Model (ESADM) Hybrid Artificial Intelligence System for Cyber Security Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory
  • 11. 11  Evolving Spiking Anomaly Detection Model (ESADM) Hybrid Artificial Intelligence System for Cyber Security Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory
  • 12. 12  Evolving Spiking Anomaly Detection Model (ESADM) Hybrid Artificial Intelligence System for Cyber Security Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory
  • 13. 13  Evolving Spiking Anomaly Detection Model (ESADM) Hybrid Artificial Intelligence System for Cyber Security Traf_Red_Full Dataset Classifier Train Accuracy Test Accuracy NaiveBayes 96.387% 95.3981% RBFNetwork 94.9734% 93.3281% MLP 97.9475% 97.3743% LibSVM 98.9691% 97.0335% k-NN 97.5435% 97.4452% J48 97.619% 97.4909% RandomForest 97.57% 97.5046% LogisticRegression 97.8937% 96.9008% BayesNet 97.9025% 96.9237% AdaBoost 96.0311% 95.947% eSNN 98,9% 97,7% normalFull Dataset Classifier Train Accuracy Test Accuracy NaiveBayes 99.5112% 98.895% RBFNetwork 99.9351% 99.4412% MLP 99.9818% 99.8992% LibSVM 99.673% 99.1088% k-NN 99.2554% 98.9278% J48 99.7751% 99.719% RandomForest 99.8463% 98.9561% LogisticRegression 98.998% 98.9855% BayesNet 98.9933% 98.9718% AdaBoost 99.2784% 98.9357% eSNN 99.999% 99.9% Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory
  • 14. 14  Evolving Computational Intelligence System for Malware Detection (ECISMD) Hybrid Artificial Intelligence System for Cyber Security ESADM ECISMD Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory
  • 15. 15  Evolving Computational Intelligence System for Malware Detection (ECISMD) Hybrid Artificial Intelligence System for Cyber Security Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory
  • 16. 16  Evolving Computational Intelligence System for Malware Detection (ECISMD) Hybrid Artificial Intelligence System for Cyber Security Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory
  • 17. 17  Evolving Computational Intelligence System for Malware Detection (ECISMD) – Evolving Classification Function (ECF) – used for pattern classification, generates rule nodes in an N dimensional input space and associate them with classes. Each rule node is defined with its centre, radius (influence field) and the class it belongs to. A learning mechanism is designed in such a way that the nodes can be generated. Hybrid Artificial Intelligence System for Cyber Security Rule 1:if X1 is ( 2: 0.50 ) X2 is ( 1: 0.69 ) X3 is ( 1: 0.95 ) X4 is ( 1: 0.95 ) X5 is ( 1: 0.94 ) X6 is ( 1: 0.52 ) X7 is ( 1: 0.95 ) X8 is ( 2: 0.87 ) X9 is ( 2: 0.82 ) then Class is [1] Radius = 0.022719 , 20 in node Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory
  • 18. 18  Evolving Computational Intelligence System for Malware Detection (ECISMD) Hybrid Artificial Intelligence System for Cyber Security Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory
  • 19. 19  Evolving Computational Intelligence System for Malware Detection (ECISMD). Hybrid Artificial Intelligence System for Cyber Security – Genetic Algorithm for Offline ECF Optimization – A Genetic Algorithm is an evolutionary algorithm in which the principles of the Darwin's theory of evolution are applied to a population of solutions to a problem in order to "breed" better solutions. – Solutions, in this case the parameters of the ECF network, are encoded in a binary string and each solution is given a score depending on how well it performs. – Good solutions are selected more frequently for breeding, and are subjected to crossover and mutation (loosely analogous to those operations found in biological systems). – After several generations, the population of solutions should converge on a "good" solution. Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory
  • 20. 20  Evolving Computational Intelligence System for Malware Detection (ECISMD) Hybrid Artificial Intelligence System for Cyber Security Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory
  • 21. 21  Evolving Computational Intelligence System for Malware Detection (ECISMD) Hybrid Artificial Intelligence System for Cyber Security Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory
  • 22. 22  Evolving Computational Intelligence System for Malware Detection (ECISMD) Hybrid Artificial Intelligence System for Cyber Security Packed Dataset Classifier Train Accuracy Test Accuracy RBFNetwork 98.3085% 98.0859% NaiveBayes 98.3975% 97.1144% MLP 99.5326% 96.2189% LibSVM 99.4436% 89.8507% k-NN 99.4436% 96.6169% eSNN 99.8% 99.2% Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory
  • 23. 23  Evolving Computational Intelligence System for Malware Detection (ECISMD) Hybrid Artificial Intelligence System for Cyber Security Malware Dataset Classifier Train Accuracy Test Accuracy RBFNetwork 94.4031% 93.0612% NaiveBayes 94.0533% 92.3469% MLP 97.7551% 97.289% LibSVM 94.6218% 94.2857% k-NN 98.1198% 96.8367% ECF 99.05% 95.561% Optimized ECF 99.87% 97.992% Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory
  • 24. 24  Evolving Computational Intelligence System for Malware Detection (ECISMD) – Future Directions Hybrid Artificial Intelligence System for Cyber Security Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory
  • 25. 25  Demertzis K., Iliadis L. (2014). A Hybrid Network Anomaly and Intrusion Detection Approach Based on Evolving Spiking Neural Network Classification. In: Sideridis A., Kardasiadou Z., Yialouris C., Zorkadis V. (eds) E-Democracy, Security, Privacy and Trust in a Digital World. e-Democracy 2013. Communications in Computer and Information Science, vol 441. Springer, Cham  Demertzis K., Iliadis L. (2014). Evolving Computational Intelligence System for Malware Detection, In: Advanced Information Systems Engineering Workshops, Lecture Notes in Business Information Processing, 178, 322-334. doi: 10.1007/978-3-319-07869-4_30  Demertzis K., Iliadis L. (2014, April). Bio-Inspired Hybrid Artificial Intelligence Framework for Cyber Security. In: Daras N., Rassias M. (eds) Computation, Cryptography, and Network Security. Springer, Cham  Demertzis K., Iliadis L. (2014, November). Bio-Inspired Hybrid Intelligent Method for Detecting Android Malware, In: Iliadis L., Papazoglou M., Pohl K. (eds) Advanced Information Systems Engineering Workshops. CAiSE 2014. Lecture Notes in Business Information Processing, vol 178. Springer, Cham  [Demertzis K., Iliadis L. (2015, April). Evolving Smart URL Filter in a Zone-based Policy Firewall for Detecting Algorithmically Generated Malicious Domains. In: Gammerman A., Vovk V., Papadopoulos H. (eds) Statistical Learning and Data Sciences. SLDS 2015. Lecture Notes in Computer Science, vol 9047. Springer, Cham.  Demertzis K., Iliadis L. (2015, September). SAME: An Intelligent Anti-Malware Extension for Android ART Virtual Machine. In: Núñez M., Nguyen N., Camacho D., Trawiński B. (eds) Computational Collective Intelligence. Lecture Notes in Computer Science, vol 9330. Springer.  Demertzis K., Iliadis L. (2016), Computational Intelligence Anti-Malware Framework for Android OS, Vietnam J Comput Sci (2017) 4: 245. https://doi.org/10.1007/s40595-017-0095-3. Hybrid Artificial Intelligence System for Cyber Security Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory
  • 26. 26  Demertzis K., Iliadis L. (2016), Ladon: A Cyber-Threat Bio-Inspired Intelligence Management System, Journal of Applied Mathematics & Bioinformatics, vol.6, no.3, 2016, 45-64, ISSN: 1792-6602 (print), 1792- 6939 (online), Scienpress Ltd, 2016.  Demertzis K., L. S. Iliadis, V.-D. Anezakis, An innovative soft computing system for smart energy grids cybersecurity, Advances in Building Energy Research, pp. 1-22, Taylor & Francis.  K. Demertzis and L. Iliadis, “The Impact of Climate Change on Biodiversity: The Ecological Consequences of Invasive Species in Greece”. In: Leal Filho W., Manolas E., Azul A., Azeiteiro U., McGhie H. (eds), Handbook of Climate Change Communication: vol. 1, Climate Change Management, pp.15-38. Springer, Cham, 2018. https://doi.org/10.1007/978-3-319-69838-0_2  K. Demertzis, L. Iliadis and V.D. Anezakis, “A deep spiking machine-hearing system for the case of invasive fish species”, Proceedings of 2017 IEEE International Conference on Innovations in Intelligent Systems and Applications, Gdynia, Poland, pp. 23-28, 2017. doi:10.1109/INISTA.2017.8001126  K. Demertzis, L.S. Iliadis and V.D. Anezakis, “Commentary: Aedes albopictus and Aedes japonicus—two invasive mosquito species with different temperature niches in Europe”, Frontiers in Environmental Science, vol.5, no. 85, pp. 1-3, 2017. doi: 10.3389/fenvs.2017.00085  K. Demertzis and L. Iliadis, “Detecting invasive species with a bio-inspired semisupervised neurocomputing approach: the case of Lagocephalus sceleratus”, Neural Computing & Applications, vol.28, no.6, pp. 1225-1234, 2017. Springer, London. https://doi.org/10.1007/s00521-016-2591-2 Hybrid Artificial Intelligence System for Cyber Security Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory
  • 27. 27 Hybrid Artificial Intelligence System for Cyber Security  Forest Informatics Laboratory  Director of the Lab Professor Lazaros S. Iliadis  Research Areas – Fuzzy Logic – Computational Intelligence – Soft Computing – Machine Learning – Pattern Recognition – Neural Networks – Support Vector Machines – Genetic Algorithms – Adaptive Fuzzy Clustering – Heuristic Models – Intelligent Agents – multiAgent Systems – Expert Systems - Knowledge Systems - Fuzzy Inference Systems – Intelligent Information Systems and Applications in Risk Management Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory
  • 28. 28 kdemertz@fmenr.duth.gr | liliadis@fmenr.duth.gr Hybrid Artificial Intelligence System for Cyber Security  Conclusion Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory