SlideShare a Scribd company logo
1 of 7
Download to read offline
Advanced Computing: An International Journal (ACIJ), Vol.10, No.6, November 2019
DOI:10.5121/acij.2019.10601 1
CYBERSECURITY INFRASTRUCTURE AND SECURITY
AUTOMATION
Alex Mathew
Department of Computer Science & Cyber Security, Bethany College, WV, USA.
ABSTRACT
AI-based security systems utilize big data and powerful machine learning algorithms to automate the
security management task. The case study methodology is used to examine the effectiveness of AI-enabled
security solutions. The result shows that compared with the signature-based system, AI-supported security
applications are efficient, accurate, and reliable. This is because the systems are capable of reviewing and
correlating large volumes of data to facilitate the detection and response to threats.
KEYWORDS
Automation, Cybersecurity, AI, Big data
1. INTRODUCTION
Cyber security threats have become sophisticated and the traditional signature-based security
solutions have become quite ineffective. Advanced security solutions that utilize artificial
intelligence and machine learning are required to automate information security management.
Most organizations depend on their information resources to remain relevant and competitive. A
security breach can thus have devastating effects on a company’s operations. To enhance the
security of their information assets, organizations can leverage AI and ML technologies to
automate security management tasks and provide insight into security threats1
. AI is concerned
with information systems that automate complex and complicated tasks necessary for threat
detection and mitigation. The systems are capable of analyzing huge volumes of data and
identifying patterns that they use to make decisions. Machine learning is a core component of AI
that provides computer systems with a means to learn and adapt through experience. The purpose
is to examine the effectiveness of AI-based information security solutions in reducing security
risks, improving efficiency and addressing common cyber security concerns.
2. THEORY OF RESEARCH
A security solution can be classified as either signature-based or AI-based. Signature-based
solutions use rules developed by security experts to detect security threats. These types of
security solutions have become ineffective and unreliable due to high rates of false positives4
.
Furthermore, there is usually an element of delay between threat detection and the
implementation of countermeasures. The signatures must also be updated regularly to be effective
in the long-term. Attackers can take advantage of the delay in releasing or installing updates to
compromise the security of an information system3
. Cybercriminals can also use sophisticated
tools to design new threats or sidestep detection when signature-based security systems are used.
Advanced Computing: An International Journal (ACIJ), Vol.10, No.6, November 2019
2
Figure one below shows the block diagram of an AI-driven information security solution. In the
diagram, data from different sources such as intelligence feed, the indication of compromise,
system logs, network traffic, and historical data are used to support supervised, unsupervised
learning and reinforcement learning mechanisms. After learning, the system uses an identity
tracker to detect rare and evolving patterns that may indicate new attacks5
. The identity tracker
comprises of behavior analytics and fuzzy logic systems. The tracker goes through various types
of analyses such as reasoning, contextual and future impacts analyses4
. The analyses allow the
system to detect new and evolving threats so that appropriate deterrence responses can be taken.
The system then identifies ranks and displays the key issues on a dashboard. It is important to
note that the security system incorporates an automated response engine that enables it to respond
to threats automatically without the intervention of an administrator.
Figure 1: block diagram of an AI-driven security solution
3. PROPOSED METHODOLOGY
The case study methodology is used to examine the performance of two AI-based security
solutions. The methodology involves intensive investigation or exploration of a phenomenon. The
case study methodology was selected because it allows for comparison of different aspects of AI-
based security systems and signature-based systems. Besides, the method allows for a
comprehensive examination of the subject under investigation. It is also possible to locate deviant
cases which can reveal new information about the subject being studied. The case study
methodology is however associated with a high risk of biased data collection and interpretation9
.
Deep Instinct and Darktrace security solutions are used as case studies.
Advanced Computing: An International Journal (ACIJ), Vol.10, No.6, November 2019
3
4. ALGORITHMS
To be effective, AI-driven security solutions use some forms of supervised, unsupervised or
reinforced learning algorithms. Supervised learning algorithms are vital in situation assessment.
The algorithms are used to examine past experiences, prevailing situations and future impact of
identified issues5
. The main analyses undertaken by the algorithms include reasoning, context,
and risk analysis. Reasoning analysis helps the security system to understand the goal, purpose,
and reason for a course of action. The context analysis is used to study the background and
relationships of key security events in a computing environment6
. Finally, risk analysis is used to
examine the advantages and disadvantages of possible causes of action. The three analyses form
the basis for selecting available actions in supervised algorithms. In unsupervised algorithms, the
analyses are used to create new actions that are appropriate for emerging and evolving threats. In
the reinforced learning algorithms, the three analyses are used to identify similar patterns.
It is noteworthy that available options are usually preloaded on AI-driven security systems. As
such, supervised algorithms can make prompt responses based on the characteristics of an
identified security event. In contrast, unsupervised learning algorithms learn from the data as they
access it. This makes it possible to customize responses based on new information or respond to a
threat dynamically7
. Unsupervised algorithms are thus used to create new options in AI-driven
security systems. Reinforcement learning algorithms are used to select the most suitable option
based on the results of a cost-benefit analysis.
Various AI-driven security solutions used different types of algorithms. The algorithms can be
proprietary or publicly available. For example, Deep Instinct utilizes static file analysis and threat
prediction modeling to detect and eliminate threats autonomously. The application uses deep
learning algorithms to learn to anticipate new attacks7
. Its developers built a neural network in the
laboratory then trained it with a large dataset of malicious codes6
. Deep Instinct, therefore, uses
predictive algorithms to determine whether an application is malicious or not. The security
solution is capable of continuous learning as it comes across new data sets. When Deep Instinct
accesses a suspicious application, its algorithm breaks the software into small snippets for
analysis11
. The security system operates similarly as genomic sequencing where small sequences
are used to teach neural networks so that they can identify unique patterns. To support the
required complex computations, Deep Instinct uses GPU clusters.
Advanced Computing: An International Journal (ACIJ), Vol.10, No.6, November 2019
4
Figure 2: AI-Driven security system processes
Figure two above shows a flow chart depicting common processes used by AI-drive security
system. The flow chart begins with the analysis of data from various sources. The collected data
is then checked for malicious applications or activities. If something abnormal is identified, the
system issues an alert and remediates the issue. Afterward, it continues monitoring new
information to detect threats and learn. When a security operation is complete, the system creates
a final report and updates its real-time dashboard.
Advanced Computing: An International Journal (ACIJ), Vol.10, No.6, November 2019
5
5. RESULTS ANALYSIS
Table one below shows the result of tests performed by a third party security company called AV-
Comparatives on popular AI-driven endpoint security solutions. The goal of the tests was to
gauge the automatic prevention and detection capabilities of some popular AI-driven cyber
security solutions. Proactive, real-world protection and ransomware tests were conducted 11.
During the real-world protection testing that was based on 300 live test cases such as malicious
URL and email vector, Deep Instinct and Bitdefender were capable of offering 100% protection
rate. Cylance and Symantec both recorded a 99.7% protection rate during real-world testing.
The proactive testing framework was used to gauge the ability of security solutions to detect
unknown and evolving threats. The products' definitions were frozen before the test. 1000 new
and verified malware samples were tested against each of the applications. The results show that
Deep Instinct returned 100% protection rate while Bitdefender recorded a 99.9% protection rate.
On the other hand, Cylance and Symantec registered 99.5% and 95.5% protection rates
respectively.
The ransomware test gauged the effectiveness of the security systems at detecting and blocking
ransomware. A sample consisting of a variety of new ransomware was used. Bitdefender and
Deep Instinct each recorded 100% protection rate. Cylance and Symantec recorded 99.3% and
97.3% protection rates respectively during the test. The false alarm test was conducted to verify
that the applications do not block legitimate applications. Out of 1000 clean files, Deep Instinct
and Symantec did not issue any false alarm. Bitdefender issued 8 false alarms while Cylance
issued 9.
Table 1: Test results for selected AI-driven systems
Advanced Computing: An International Journal (ACIJ), Vol.10, No.6, November 2019
6
The results show that all the four AI-driven products are very good at detecting and blocking
common threats including malicious scripts, applications, and ransomware.
The security systems are also capable of detecting and responding to unknown and evolving
threats with accuracy. This is because they utilize machine learning techniques to learn about
unknown threats. This is in contrast with traditional security systems that depend entirely on set
rules, known signatures, behavioral analysis and prior knowledge to detect malicious
applications. The AI-enabled solutions are therefore capable of recognizing emerging threats that
circumvent traditional security systems. They are therefore ideal in setting up automated security
in organizations. Once deployed, the security team will hardly ever need to manually configure or
update the tools. The tools will run without fail and will keep updating their threat knowledge to
incrementally become more effective at sealing any IT security loopholes.
6. CONCLUSION
AI-based cyber security solutions have unmatched performance when compared to signature-
based tools. The AI-based systems use artificial intelligence to detect significant deviations that
are then correlated to identify genuine threats with minimum floods of false positives. The
security systems are also capable of monitoring, detecting and remediating threats autonomously.
The examination of AI-based security solutions shows that they leverage patented machine
learning technologies to improve their effectiveness. Moreover, the solutions use a mixture of
approaches including behavioral analysis and signature-based threat detection. While machine
learning is used to train the systems and support automation, behavioral analysis is used to
combat modern-day malware. Security tools based entirely on behavioral analysis are prone to a
high number of false positives. This is why AI-based tools do not solely depend on the
increasingly defective conventional threat detection technologies. As advancements are made in
computing, AI-based tools will become more efficient at ensuring the security of organizations
without human assistance.
REFERENCES
[1] AV-Comparatives, Advanced Endpoint Protection Test, AV-Comparatives, 23 March 2018,
https://www.av-comparatives.org/tests/advanced-endpoint-protection-test/
[2] IBM. “Artificial intelligence for a smarter kind of cybersecurity.” IBM, 16 August 2018,
https://www.ibm.com/security/artificial-intelligence
[3] Joshi, Naveen, “Can AI Become Our New Cybersecurity Sheriff?” Forbes, Feb. 4 2019,
https://www.forbes.com/sites/cognitiveworld/2019/02/04/can-ai-become-our-new-cybersecurity-
sheriff/#6d981a6f36a8
[4] Mandt, Ej. “Integrating Cyber-Intelligence Analysis and Active Cyber-Defence Operations", Journal
of Information Warfare, vol. 16, no. 1, pp. 31-48. 2017.
[5] Mitkovskiy Alexey, Ponomarev Andrey and Proletarskiy Andrey. “SIEM-Platform for Research and
Educational Tasks on Processing of Security Information Events.” The International Scientific
Conference eLearning and Software for Education Bucharest. Vol. 3, pp 48-56. 2019.
Advanced Computing: An International Journal (ACIJ), Vol.10, No.6, November 2019
7
[6] Powell, Matt. “Artificial Intelligence: A Cybersecurity Solution or the Greatest Risk of All?” CPO
Magazine, April 15, 2019, https://www.cpomagazine.com/cyber-security/artificial-intelligence-a-
cybersecurity-solution-or-the-greatest-risk-of-all/
[7] Panimalar Arockia, Pai Giri and Khan Salman, Artificial intelligence techniques for cyber security.
International Research Journal of Engineering and Technology, Vol. 5, no. 3. pp. 122-124. 2018.
[8] Siddiqui Zeeshan, Yadav Sonali and Husain Mohd. Application of Articicial Intelligence in fight
against cyber crimes: A review. International Journal of Advanced Research in Computer Science,
Vol. 9, no. 2, pp. 118-121. 2018.
[9] Starman, Adrijana. “The case study as a type of qualitative research.” Journal of contemporary
educational studies vol. 1. pp.28-43. 2013.
[10] Veeramachaneni, Kalyan and Arnaldo, Ignacio. “AI2: Training a big data machine to defend.” MIT,
[10] July 2016, https://people.csail.mit.edu/kalyan/AI2_Paper.pdf
[11] Vahakainu, Petri and Lehto, Martti. Artificial Intelligence in the Cyber Security Environment,
Academic Conferences International Limited, Reading. 2019.
AUTHOR:
Alex Mathew Ph.D., CISSP, CEH, CHFI, ECSA, MCSE, CCNA. Security+

More Related Content

What's hot

A Survey On Genetic Algorithm For Intrusion Detection System
A Survey On Genetic Algorithm For Intrusion Detection SystemA Survey On Genetic Algorithm For Intrusion Detection System
A Survey On Genetic Algorithm For Intrusion Detection SystemIJARIIE JOURNAL
 
Machine Learning Algorithms Applied to System Security: A Systematic Review
Machine Learning Algorithms Applied to System Security: A Systematic ReviewMachine Learning Algorithms Applied to System Security: A Systematic Review
Machine Learning Algorithms Applied to System Security: A Systematic ReviewAssociate Professor in VSB Coimbatore
 
A predictive framework for cyber security analytics using attack graphs
A predictive framework for cyber security analytics using attack graphsA predictive framework for cyber security analytics using attack graphs
A predictive framework for cyber security analytics using attack graphsIJCNCJournal
 
Ontology-based context-sensitive software security knowledge management model...
Ontology-based context-sensitive software security knowledge management model...Ontology-based context-sensitive software security knowledge management model...
Ontology-based context-sensitive software security knowledge management model...IJECEIAES
 
Classification of Malware Attacks Using Machine Learning In Decision Tree
Classification of Malware Attacks Using Machine Learning In Decision TreeClassification of Malware Attacks Using Machine Learning In Decision Tree
Classification of Malware Attacks Using Machine Learning In Decision TreeCSCJournals
 
[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral AnalyticsInterset
 
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...IJNSA Journal
 
Machine learning in Cyber Security
Machine learning in Cyber SecurityMachine learning in Cyber Security
Machine learning in Cyber SecurityRajathV2
 
A retrovirus inspired algorithm for virus detection & optimization
A retrovirus inspired algorithm for virus detection & optimizationA retrovirus inspired algorithm for virus detection & optimization
A retrovirus inspired algorithm for virus detection & optimizationUltraUploader
 
Lookingglass whitepaper
Lookingglass whitepaperLookingglass whitepaper
Lookingglass whitepaperDaniel Coulbourne
 
Vulnerability in ai
 Vulnerability in ai Vulnerability in ai
Vulnerability in aiSrajalTiwari1
 
To situation awareness theory
To situation awareness theoryTo situation awareness theory
To situation awareness theoryengineerteju
 
Application of Machine Learning in Cyber Security
Application of Machine Learning in Cyber SecurityApplication of Machine Learning in Cyber Security
Application of Machine Learning in Cyber SecurityDr. Umesh Rao.Hodeghatta
 
Applicability of Network Logs for Securing Computer Systems
Applicability of Network Logs for Securing Computer SystemsApplicability of Network Logs for Securing Computer Systems
Applicability of Network Logs for Securing Computer SystemsIDES Editor
 
Efficient Security Alert Management System
Efficient Security Alert Management SystemEfficient Security Alert Management System
Efficient Security Alert Management SystemCSCJournals
 

What's hot (18)

A Survey On Genetic Algorithm For Intrusion Detection System
A Survey On Genetic Algorithm For Intrusion Detection SystemA Survey On Genetic Algorithm For Intrusion Detection System
A Survey On Genetic Algorithm For Intrusion Detection System
 
Machine Learning Algorithms Applied to System Security: A Systematic Review
Machine Learning Algorithms Applied to System Security: A Systematic ReviewMachine Learning Algorithms Applied to System Security: A Systematic Review
Machine Learning Algorithms Applied to System Security: A Systematic Review
 
A predictive framework for cyber security analytics using attack graphs
A predictive framework for cyber security analytics using attack graphsA predictive framework for cyber security analytics using attack graphs
A predictive framework for cyber security analytics using attack graphs
 
Ontology-based context-sensitive software security knowledge management model...
Ontology-based context-sensitive software security knowledge management model...Ontology-based context-sensitive software security knowledge management model...
Ontology-based context-sensitive software security knowledge management model...
 
Classification of Malware Attacks Using Machine Learning In Decision Tree
Classification of Malware Attacks Using Machine Learning In Decision TreeClassification of Malware Attacks Using Machine Learning In Decision Tree
Classification of Malware Attacks Using Machine Learning In Decision Tree
 
[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics
 
N018138696
N018138696N018138696
N018138696
 
46 102-112
46 102-11246 102-112
46 102-112
 
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
 
Machine learning in Cyber Security
Machine learning in Cyber SecurityMachine learning in Cyber Security
Machine learning in Cyber Security
 
Ijcet 06 07_002
Ijcet 06 07_002Ijcet 06 07_002
Ijcet 06 07_002
 
A retrovirus inspired algorithm for virus detection & optimization
A retrovirus inspired algorithm for virus detection & optimizationA retrovirus inspired algorithm for virus detection & optimization
A retrovirus inspired algorithm for virus detection & optimization
 
Lookingglass whitepaper
Lookingglass whitepaperLookingglass whitepaper
Lookingglass whitepaper
 
Vulnerability in ai
 Vulnerability in ai Vulnerability in ai
Vulnerability in ai
 
To situation awareness theory
To situation awareness theoryTo situation awareness theory
To situation awareness theory
 
Application of Machine Learning in Cyber Security
Application of Machine Learning in Cyber SecurityApplication of Machine Learning in Cyber Security
Application of Machine Learning in Cyber Security
 
Applicability of Network Logs for Securing Computer Systems
Applicability of Network Logs for Securing Computer SystemsApplicability of Network Logs for Securing Computer Systems
Applicability of Network Logs for Securing Computer Systems
 
Efficient Security Alert Management System
Efficient Security Alert Management SystemEfficient Security Alert Management System
Efficient Security Alert Management System
 

Similar to CYBERSECURITY INFRASTRUCTURE AND SECURITY AUTOMATION

Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016Janghyuck Choi
 
Optimizing cybersecurity incident response decisions using deep reinforcemen...
Optimizing cybersecurity incident response decisions using deep  reinforcemen...Optimizing cybersecurity incident response decisions using deep  reinforcemen...
Optimizing cybersecurity incident response decisions using deep reinforcemen...IJECEIAES
 
Managing Intrusion Detection Alerts Using Support Vector Machines
Managing Intrusion Detection Alerts Using Support Vector MachinesManaging Intrusion Detection Alerts Using Support Vector Machines
Managing Intrusion Detection Alerts Using Support Vector MachinesCSCJournals
 
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Leslie McFarlin
 
Articles - International Journal of Network Security & Its Applications (IJNSA)
Articles - International Journal of Network Security & Its Applications (IJNSA)Articles - International Journal of Network Security & Its Applications (IJNSA)
Articles - International Journal of Network Security & Its Applications (IJNSA)IJNSA Journal
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber securitySandip Juthani
 
METRICS FOR EVALUATING ALERTS IN INTRUSION DETECTION SYSTEMS
METRICS FOR EVALUATING ALERTS IN INTRUSION DETECTION SYSTEMSMETRICS FOR EVALUATING ALERTS IN INTRUSION DETECTION SYSTEMS
METRICS FOR EVALUATING ALERTS IN INTRUSION DETECTION SYSTEMSIJNSA Journal
 
Exploring the Key Types of Cybersecurity Testing
Exploring the Key Types of Cybersecurity TestingExploring the Key Types of Cybersecurity Testing
Exploring the Key Types of Cybersecurity Testingjatniwalafizza786
 
Cognitive Computing in Security with AI
Cognitive Computing in Security with AI Cognitive Computing in Security with AI
Cognitive Computing in Security with AI JoAnna Cheshire
 
Synthesis of Polyurethane Solution (Castor oil based polyol for polyurethane)
Synthesis of Polyurethane Solution (Castor oil based polyol for polyurethane)Synthesis of Polyurethane Solution (Castor oil based polyol for polyurethane)
Synthesis of Polyurethane Solution (Castor oil based polyol for polyurethane)IJARIIE JOURNAL
 
AI model security.pdf
AI model security.pdfAI model security.pdf
AI model security.pdfStephenAmell4
 
IT Executive Guide to Security Intelligence
IT Executive Guide to Security IntelligenceIT Executive Guide to Security Intelligence
IT Executive Guide to Security IntelligencethinkASG
 
A method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devicesA method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devicesRaja Ram
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessSirius
 
What's behind a cyber attack
What's behind a cyber attackWhat's behind a cyber attack
What's behind a cyber attackAndreanne Clarke
 
Technology for Cyber Security - Cyberroot Risk Advisory
Technology for Cyber Security - Cyberroot Risk AdvisoryTechnology for Cyber Security - Cyberroot Risk Advisory
Technology for Cyber Security - Cyberroot Risk AdvisoryCR Group
 
The NIST Cybersecurity Framework
The NIST Cybersecurity FrameworkThe NIST Cybersecurity Framework
The NIST Cybersecurity FrameworkEMMAIntl
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackamrutharam
 

Similar to CYBERSECURITY INFRASTRUCTURE AND SECURITY AUTOMATION (20)

Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016
 
Optimizing cybersecurity incident response decisions using deep reinforcemen...
Optimizing cybersecurity incident response decisions using deep  reinforcemen...Optimizing cybersecurity incident response decisions using deep  reinforcemen...
Optimizing cybersecurity incident response decisions using deep reinforcemen...
 
Managing Intrusion Detection Alerts Using Support Vector Machines
Managing Intrusion Detection Alerts Using Support Vector MachinesManaging Intrusion Detection Alerts Using Support Vector Machines
Managing Intrusion Detection Alerts Using Support Vector Machines
 
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018
 
Articles - International Journal of Network Security & Its Applications (IJNSA)
Articles - International Journal of Network Security & Its Applications (IJNSA)Articles - International Journal of Network Security & Its Applications (IJNSA)
Articles - International Journal of Network Security & Its Applications (IJNSA)
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber security
 
METRICS FOR EVALUATING ALERTS IN INTRUSION DETECTION SYSTEMS
METRICS FOR EVALUATING ALERTS IN INTRUSION DETECTION SYSTEMSMETRICS FOR EVALUATING ALERTS IN INTRUSION DETECTION SYSTEMS
METRICS FOR EVALUATING ALERTS IN INTRUSION DETECTION SYSTEMS
 
Exploring the Key Types of Cybersecurity Testing
Exploring the Key Types of Cybersecurity TestingExploring the Key Types of Cybersecurity Testing
Exploring the Key Types of Cybersecurity Testing
 
Cognitive Computing in Security with AI
Cognitive Computing in Security with AI Cognitive Computing in Security with AI
Cognitive Computing in Security with AI
 
Ijetr042329
Ijetr042329Ijetr042329
Ijetr042329
 
Synthesis of Polyurethane Solution (Castor oil based polyol for polyurethane)
Synthesis of Polyurethane Solution (Castor oil based polyol for polyurethane)Synthesis of Polyurethane Solution (Castor oil based polyol for polyurethane)
Synthesis of Polyurethane Solution (Castor oil based polyol for polyurethane)
 
AI model security.pdf
AI model security.pdfAI model security.pdf
AI model security.pdf
 
IT Executive Guide to Security Intelligence
IT Executive Guide to Security IntelligenceIT Executive Guide to Security Intelligence
IT Executive Guide to Security Intelligence
 
A method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devicesA method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devices
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 
What's behind a cyber attack
What's behind a cyber attackWhat's behind a cyber attack
What's behind a cyber attack
 
Technology for Cyber Security - Cyberroot Risk Advisory
Technology for Cyber Security - Cyberroot Risk AdvisoryTechnology for Cyber Security - Cyberroot Risk Advisory
Technology for Cyber Security - Cyberroot Risk Advisory
 
I0516064
I0516064I0516064
I0516064
 
The NIST Cybersecurity Framework
The NIST Cybersecurity FrameworkThe NIST Cybersecurity Framework
The NIST Cybersecurity Framework
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 

More from acijjournal

Jan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfJan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfacijjournal
 
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdfCall for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdfacijjournal
 
cs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdfcs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdfacijjournal
 
cs - ACIJ (2).pdf
cs - ACIJ (2).pdfcs - ACIJ (2).pdf
cs - ACIJ (2).pdfacijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)acijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...acijjournal
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)acijjournal
 
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable DevelopmentGraduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Developmentacijjournal
 
Genetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary MethodologyGenetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary Methodologyacijjournal
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...acijjournal
 
Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) acijjournal
 
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & PrinciplesE-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principlesacijjournal
 
10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...acijjournal
 
10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...acijjournal
 
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...acijjournal
 
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...acijjournal
 

More from acijjournal (20)

Jan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfJan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdf
 
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdfCall for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
 
cs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdfcs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdf
 
cs - ACIJ (2).pdf
cs - ACIJ (2).pdfcs - ACIJ (2).pdf
cs - ACIJ (2).pdf
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
 
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable DevelopmentGraduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
 
Genetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary MethodologyGenetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary Methodology
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...
 
Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ)
 
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & PrinciplesE-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
 
10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...
 
10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...
 
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
 
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
 

Recently uploaded

APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 

Recently uploaded (20)

APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 

CYBERSECURITY INFRASTRUCTURE AND SECURITY AUTOMATION

  • 1. Advanced Computing: An International Journal (ACIJ), Vol.10, No.6, November 2019 DOI:10.5121/acij.2019.10601 1 CYBERSECURITY INFRASTRUCTURE AND SECURITY AUTOMATION Alex Mathew Department of Computer Science & Cyber Security, Bethany College, WV, USA. ABSTRACT AI-based security systems utilize big data and powerful machine learning algorithms to automate the security management task. The case study methodology is used to examine the effectiveness of AI-enabled security solutions. The result shows that compared with the signature-based system, AI-supported security applications are efficient, accurate, and reliable. This is because the systems are capable of reviewing and correlating large volumes of data to facilitate the detection and response to threats. KEYWORDS Automation, Cybersecurity, AI, Big data 1. INTRODUCTION Cyber security threats have become sophisticated and the traditional signature-based security solutions have become quite ineffective. Advanced security solutions that utilize artificial intelligence and machine learning are required to automate information security management. Most organizations depend on their information resources to remain relevant and competitive. A security breach can thus have devastating effects on a company’s operations. To enhance the security of their information assets, organizations can leverage AI and ML technologies to automate security management tasks and provide insight into security threats1 . AI is concerned with information systems that automate complex and complicated tasks necessary for threat detection and mitigation. The systems are capable of analyzing huge volumes of data and identifying patterns that they use to make decisions. Machine learning is a core component of AI that provides computer systems with a means to learn and adapt through experience. The purpose is to examine the effectiveness of AI-based information security solutions in reducing security risks, improving efficiency and addressing common cyber security concerns. 2. THEORY OF RESEARCH A security solution can be classified as either signature-based or AI-based. Signature-based solutions use rules developed by security experts to detect security threats. These types of security solutions have become ineffective and unreliable due to high rates of false positives4 . Furthermore, there is usually an element of delay between threat detection and the implementation of countermeasures. The signatures must also be updated regularly to be effective in the long-term. Attackers can take advantage of the delay in releasing or installing updates to compromise the security of an information system3 . Cybercriminals can also use sophisticated tools to design new threats or sidestep detection when signature-based security systems are used.
  • 2. Advanced Computing: An International Journal (ACIJ), Vol.10, No.6, November 2019 2 Figure one below shows the block diagram of an AI-driven information security solution. In the diagram, data from different sources such as intelligence feed, the indication of compromise, system logs, network traffic, and historical data are used to support supervised, unsupervised learning and reinforcement learning mechanisms. After learning, the system uses an identity tracker to detect rare and evolving patterns that may indicate new attacks5 . The identity tracker comprises of behavior analytics and fuzzy logic systems. The tracker goes through various types of analyses such as reasoning, contextual and future impacts analyses4 . The analyses allow the system to detect new and evolving threats so that appropriate deterrence responses can be taken. The system then identifies ranks and displays the key issues on a dashboard. It is important to note that the security system incorporates an automated response engine that enables it to respond to threats automatically without the intervention of an administrator. Figure 1: block diagram of an AI-driven security solution 3. PROPOSED METHODOLOGY The case study methodology is used to examine the performance of two AI-based security solutions. The methodology involves intensive investigation or exploration of a phenomenon. The case study methodology was selected because it allows for comparison of different aspects of AI- based security systems and signature-based systems. Besides, the method allows for a comprehensive examination of the subject under investigation. It is also possible to locate deviant cases which can reveal new information about the subject being studied. The case study methodology is however associated with a high risk of biased data collection and interpretation9 . Deep Instinct and Darktrace security solutions are used as case studies.
  • 3. Advanced Computing: An International Journal (ACIJ), Vol.10, No.6, November 2019 3 4. ALGORITHMS To be effective, AI-driven security solutions use some forms of supervised, unsupervised or reinforced learning algorithms. Supervised learning algorithms are vital in situation assessment. The algorithms are used to examine past experiences, prevailing situations and future impact of identified issues5 . The main analyses undertaken by the algorithms include reasoning, context, and risk analysis. Reasoning analysis helps the security system to understand the goal, purpose, and reason for a course of action. The context analysis is used to study the background and relationships of key security events in a computing environment6 . Finally, risk analysis is used to examine the advantages and disadvantages of possible causes of action. The three analyses form the basis for selecting available actions in supervised algorithms. In unsupervised algorithms, the analyses are used to create new actions that are appropriate for emerging and evolving threats. In the reinforced learning algorithms, the three analyses are used to identify similar patterns. It is noteworthy that available options are usually preloaded on AI-driven security systems. As such, supervised algorithms can make prompt responses based on the characteristics of an identified security event. In contrast, unsupervised learning algorithms learn from the data as they access it. This makes it possible to customize responses based on new information or respond to a threat dynamically7 . Unsupervised algorithms are thus used to create new options in AI-driven security systems. Reinforcement learning algorithms are used to select the most suitable option based on the results of a cost-benefit analysis. Various AI-driven security solutions used different types of algorithms. The algorithms can be proprietary or publicly available. For example, Deep Instinct utilizes static file analysis and threat prediction modeling to detect and eliminate threats autonomously. The application uses deep learning algorithms to learn to anticipate new attacks7 . Its developers built a neural network in the laboratory then trained it with a large dataset of malicious codes6 . Deep Instinct, therefore, uses predictive algorithms to determine whether an application is malicious or not. The security solution is capable of continuous learning as it comes across new data sets. When Deep Instinct accesses a suspicious application, its algorithm breaks the software into small snippets for analysis11 . The security system operates similarly as genomic sequencing where small sequences are used to teach neural networks so that they can identify unique patterns. To support the required complex computations, Deep Instinct uses GPU clusters.
  • 4. Advanced Computing: An International Journal (ACIJ), Vol.10, No.6, November 2019 4 Figure 2: AI-Driven security system processes Figure two above shows a flow chart depicting common processes used by AI-drive security system. The flow chart begins with the analysis of data from various sources. The collected data is then checked for malicious applications or activities. If something abnormal is identified, the system issues an alert and remediates the issue. Afterward, it continues monitoring new information to detect threats and learn. When a security operation is complete, the system creates a final report and updates its real-time dashboard.
  • 5. Advanced Computing: An International Journal (ACIJ), Vol.10, No.6, November 2019 5 5. RESULTS ANALYSIS Table one below shows the result of tests performed by a third party security company called AV- Comparatives on popular AI-driven endpoint security solutions. The goal of the tests was to gauge the automatic prevention and detection capabilities of some popular AI-driven cyber security solutions. Proactive, real-world protection and ransomware tests were conducted 11. During the real-world protection testing that was based on 300 live test cases such as malicious URL and email vector, Deep Instinct and Bitdefender were capable of offering 100% protection rate. Cylance and Symantec both recorded a 99.7% protection rate during real-world testing. The proactive testing framework was used to gauge the ability of security solutions to detect unknown and evolving threats. The products' definitions were frozen before the test. 1000 new and verified malware samples were tested against each of the applications. The results show that Deep Instinct returned 100% protection rate while Bitdefender recorded a 99.9% protection rate. On the other hand, Cylance and Symantec registered 99.5% and 95.5% protection rates respectively. The ransomware test gauged the effectiveness of the security systems at detecting and blocking ransomware. A sample consisting of a variety of new ransomware was used. Bitdefender and Deep Instinct each recorded 100% protection rate. Cylance and Symantec recorded 99.3% and 97.3% protection rates respectively during the test. The false alarm test was conducted to verify that the applications do not block legitimate applications. Out of 1000 clean files, Deep Instinct and Symantec did not issue any false alarm. Bitdefender issued 8 false alarms while Cylance issued 9. Table 1: Test results for selected AI-driven systems
  • 6. Advanced Computing: An International Journal (ACIJ), Vol.10, No.6, November 2019 6 The results show that all the four AI-driven products are very good at detecting and blocking common threats including malicious scripts, applications, and ransomware. The security systems are also capable of detecting and responding to unknown and evolving threats with accuracy. This is because they utilize machine learning techniques to learn about unknown threats. This is in contrast with traditional security systems that depend entirely on set rules, known signatures, behavioral analysis and prior knowledge to detect malicious applications. The AI-enabled solutions are therefore capable of recognizing emerging threats that circumvent traditional security systems. They are therefore ideal in setting up automated security in organizations. Once deployed, the security team will hardly ever need to manually configure or update the tools. The tools will run without fail and will keep updating their threat knowledge to incrementally become more effective at sealing any IT security loopholes. 6. CONCLUSION AI-based cyber security solutions have unmatched performance when compared to signature- based tools. The AI-based systems use artificial intelligence to detect significant deviations that are then correlated to identify genuine threats with minimum floods of false positives. The security systems are also capable of monitoring, detecting and remediating threats autonomously. The examination of AI-based security solutions shows that they leverage patented machine learning technologies to improve their effectiveness. Moreover, the solutions use a mixture of approaches including behavioral analysis and signature-based threat detection. While machine learning is used to train the systems and support automation, behavioral analysis is used to combat modern-day malware. Security tools based entirely on behavioral analysis are prone to a high number of false positives. This is why AI-based tools do not solely depend on the increasingly defective conventional threat detection technologies. As advancements are made in computing, AI-based tools will become more efficient at ensuring the security of organizations without human assistance. REFERENCES [1] AV-Comparatives, Advanced Endpoint Protection Test, AV-Comparatives, 23 March 2018, https://www.av-comparatives.org/tests/advanced-endpoint-protection-test/ [2] IBM. “Artificial intelligence for a smarter kind of cybersecurity.” IBM, 16 August 2018, https://www.ibm.com/security/artificial-intelligence [3] Joshi, Naveen, “Can AI Become Our New Cybersecurity Sheriff?” Forbes, Feb. 4 2019, https://www.forbes.com/sites/cognitiveworld/2019/02/04/can-ai-become-our-new-cybersecurity- sheriff/#6d981a6f36a8 [4] Mandt, Ej. “Integrating Cyber-Intelligence Analysis and Active Cyber-Defence Operations", Journal of Information Warfare, vol. 16, no. 1, pp. 31-48. 2017. [5] Mitkovskiy Alexey, Ponomarev Andrey and Proletarskiy Andrey. “SIEM-Platform for Research and Educational Tasks on Processing of Security Information Events.” The International Scientific Conference eLearning and Software for Education Bucharest. Vol. 3, pp 48-56. 2019.
  • 7. Advanced Computing: An International Journal (ACIJ), Vol.10, No.6, November 2019 7 [6] Powell, Matt. “Artificial Intelligence: A Cybersecurity Solution or the Greatest Risk of All?” CPO Magazine, April 15, 2019, https://www.cpomagazine.com/cyber-security/artificial-intelligence-a- cybersecurity-solution-or-the-greatest-risk-of-all/ [7] Panimalar Arockia, Pai Giri and Khan Salman, Artificial intelligence techniques for cyber security. International Research Journal of Engineering and Technology, Vol. 5, no. 3. pp. 122-124. 2018. [8] Siddiqui Zeeshan, Yadav Sonali and Husain Mohd. Application of Articicial Intelligence in fight against cyber crimes: A review. International Journal of Advanced Research in Computer Science, Vol. 9, no. 2, pp. 118-121. 2018. [9] Starman, Adrijana. “The case study as a type of qualitative research.” Journal of contemporary educational studies vol. 1. pp.28-43. 2013. [10] Veeramachaneni, Kalyan and Arnaldo, Ignacio. “AI2: Training a big data machine to defend.” MIT, [10] July 2016, https://people.csail.mit.edu/kalyan/AI2_Paper.pdf [11] Vahakainu, Petri and Lehto, Martti. Artificial Intelligence in the Cyber Security Environment, Academic Conferences International Limited, Reading. 2019. AUTHOR: Alex Mathew Ph.D., CISSP, CEH, CHFI, ECSA, MCSE, CCNA. Security+