Submit Search
Upload
IRJET- Intervention of Artificial Intelligence in Cyber Security
•
0 likes
•
15 views
IRJET Journal
Follow
https://www.irjet.net/archives/V6/i12/IRJET-V6I12384.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 3
Download now
Download to read offline
Recommended
Use of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika University
Avantika University
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
venkatvajradhar1
“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19
Francesco Flammini
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)
Harsh Bhanushali
Cyber Defense Automation
Cyber Defense Automation
♟Sergej Epp
Artificial Intelligence for Cyber Security
Artificial Intelligence for Cyber Security
Priyanshu Ratnakar
The Business Of Information Security In India - Testbytes
The Business Of Information Security In India - Testbytes
Testbytes
The Business Of Information Security In India - Testbytes
The Business Of Information Security In India - Testbytes
Testbytes
Recommended
Use of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika University
Avantika University
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
venkatvajradhar1
“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19
Francesco Flammini
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)
Harsh Bhanushali
Cyber Defense Automation
Cyber Defense Automation
♟Sergej Epp
Artificial Intelligence for Cyber Security
Artificial Intelligence for Cyber Security
Priyanshu Ratnakar
The Business Of Information Security In India - Testbytes
The Business Of Information Security In India - Testbytes
Testbytes
The Business Of Information Security In India - Testbytes
The Business Of Information Security In India - Testbytes
Testbytes
Role of artificial intelligence in cyber security | The Cyber Security Review
Role of artificial intelligence in cyber security | The Cyber Security Review
Freelancing
HOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITY
Priyanshu Ratnakar
Cloudbrew 2019 - Threat hunting with the Microsoft Cloud
Cloudbrew 2019 - Threat hunting with the Microsoft Cloud
Tom Janetscheck
Application of Machine Learning in Cyber Security
Application of Machine Learning in Cyber Security
Dr. Umesh Rao.Hodeghatta
Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016
Janghyuck Choi
2019 Cybersecurity Predictions
2019 Cybersecurity Predictions
Nuance Communications
Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain
BGA Cyber Security
CYBERSECURITY INFRASTRUCTURE AND SECURITY AUTOMATION
CYBERSECURITY INFRASTRUCTURE AND SECURITY AUTOMATION
acijjournal
Artificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
Olivier Busolini
Machine learning in Cyber Security
Machine learning in Cyber Security
RajathV2
Cyber security with ai
Cyber security with ai
Burhan Ahmed
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
Enterprise Management Associates
Data Safety And Security
Data Safety And Security
Constantine Karbaliotis
Chapter-2.docx
Chapter-2.docx
Amir Khan
OA_Cyber security course with AI
OA_Cyber security course with AI
Object Automation
Artificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber Security
IRJET Journal
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Matthew Rosenquist
Cybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith Barthur
Sri Ambati
The good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurity
Mohammad Khreesha
IRJET- Use of Artificial Intelligence in Cyber Defence
IRJET- Use of Artificial Intelligence in Cyber Defence
IRJET Journal
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET Journal
Artificial Intelligence.pptx
Artificial Intelligence.pptx
KantaShakkarwal
More Related Content
What's hot
Role of artificial intelligence in cyber security | The Cyber Security Review
Role of artificial intelligence in cyber security | The Cyber Security Review
Freelancing
HOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITY
Priyanshu Ratnakar
Cloudbrew 2019 - Threat hunting with the Microsoft Cloud
Cloudbrew 2019 - Threat hunting with the Microsoft Cloud
Tom Janetscheck
Application of Machine Learning in Cyber Security
Application of Machine Learning in Cyber Security
Dr. Umesh Rao.Hodeghatta
Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016
Janghyuck Choi
2019 Cybersecurity Predictions
2019 Cybersecurity Predictions
Nuance Communications
Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain
BGA Cyber Security
CYBERSECURITY INFRASTRUCTURE AND SECURITY AUTOMATION
CYBERSECURITY INFRASTRUCTURE AND SECURITY AUTOMATION
acijjournal
Artificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
Olivier Busolini
Machine learning in Cyber Security
Machine learning in Cyber Security
RajathV2
Cyber security with ai
Cyber security with ai
Burhan Ahmed
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
Enterprise Management Associates
Data Safety And Security
Data Safety And Security
Constantine Karbaliotis
Chapter-2.docx
Chapter-2.docx
Amir Khan
OA_Cyber security course with AI
OA_Cyber security course with AI
Object Automation
Artificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber Security
IRJET Journal
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Matthew Rosenquist
Cybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith Barthur
Sri Ambati
The good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurity
Mohammad Khreesha
What's hot
(19)
Role of artificial intelligence in cyber security | The Cyber Security Review
Role of artificial intelligence in cyber security | The Cyber Security Review
HOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITY
Cloudbrew 2019 - Threat hunting with the Microsoft Cloud
Cloudbrew 2019 - Threat hunting with the Microsoft Cloud
Application of Machine Learning in Cyber Security
Application of Machine Learning in Cyber Security
Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016
2019 Cybersecurity Predictions
2019 Cybersecurity Predictions
Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain
CYBERSECURITY INFRASTRUCTURE AND SECURITY AUTOMATION
CYBERSECURITY INFRASTRUCTURE AND SECURITY AUTOMATION
Artificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
Machine learning in Cyber Security
Machine learning in Cyber Security
Cyber security with ai
Cyber security with ai
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
Data Safety And Security
Data Safety And Security
Chapter-2.docx
Chapter-2.docx
OA_Cyber security course with AI
OA_Cyber security course with AI
Artificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber Security
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Cybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith Barthur
The good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurity
Similar to IRJET- Intervention of Artificial Intelligence in Cyber Security
IRJET- Use of Artificial Intelligence in Cyber Defence
IRJET- Use of Artificial Intelligence in Cyber Defence
IRJET Journal
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET Journal
Artificial Intelligence.pptx
Artificial Intelligence.pptx
KantaShakkarwal
A review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber security
bijejournal
Harnessing Artificial Intelligence in Cybersecurity: Safeguarding Digital Fro...
Harnessing Artificial Intelligence in Cybersecurity: Safeguarding Digital Fro...
cyberprosocial
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
Cynthia King
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET Journal
How AI can help with cybersecurity
How AI can help with cybersecurity
The Gulf Entrepreneur
How AI is Changing the World of Cybersecurity.pdf
How AI is Changing the World of Cybersecurity.pdf
MobibizIndia1
Artificial-Intelligence-in-Cyber-Security.pptx
Artificial-Intelligence-in-Cyber-Security.pptx
Karthik Sarma
[DSC Europe 23][AI:CSI] Aleksa Stojanovic - Applying AI for Threat Detection ...
[DSC Europe 23][AI:CSI] Aleksa Stojanovic - Applying AI for Threat Detection ...
DataScienceConferenc1
The Role Of Artificial Intelligence In Cybersecurity.pdf
The Role Of Artificial Intelligence In Cybersecurity.pdf
Ciente
How is ai important to the future of cyber security
How is ai important to the future of cyber security
Robert Smith
Securing Tomorrow _ Exploring the Future of AI in Cyber Security.pdf
Securing Tomorrow _ Exploring the Future of AI in Cyber Security.pdf
FlyWly
An Analysis of Benefits and Risks of Artificial Intelligence
An Analysis of Benefits and Risks of Artificial Intelligence
ijtsrd
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET Journal
The Transformative Role of Artificial Intelligence in Cybersecurity
The Transformative Role of Artificial Intelligence in Cybersecurity
cyberprosocial
The Security Challenge: What's Next?
The Security Challenge: What's Next?
Cognizant
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learning
Venkat Projects
A Study On Recent Trends And Developments In Intrusion Detection System
A Study On Recent Trends And Developments In Intrusion Detection System
Lindsey Sais
Similar to IRJET- Intervention of Artificial Intelligence in Cyber Security
(20)
IRJET- Use of Artificial Intelligence in Cyber Defence
IRJET- Use of Artificial Intelligence in Cyber Defence
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
Artificial Intelligence.pptx
Artificial Intelligence.pptx
A review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber security
Harnessing Artificial Intelligence in Cybersecurity: Safeguarding Digital Fro...
Harnessing Artificial Intelligence in Cybersecurity: Safeguarding Digital Fro...
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
How AI can help with cybersecurity
How AI can help with cybersecurity
How AI is Changing the World of Cybersecurity.pdf
How AI is Changing the World of Cybersecurity.pdf
Artificial-Intelligence-in-Cyber-Security.pptx
Artificial-Intelligence-in-Cyber-Security.pptx
[DSC Europe 23][AI:CSI] Aleksa Stojanovic - Applying AI for Threat Detection ...
[DSC Europe 23][AI:CSI] Aleksa Stojanovic - Applying AI for Threat Detection ...
The Role Of Artificial Intelligence In Cybersecurity.pdf
The Role Of Artificial Intelligence In Cybersecurity.pdf
How is ai important to the future of cyber security
How is ai important to the future of cyber security
Securing Tomorrow _ Exploring the Future of AI in Cyber Security.pdf
Securing Tomorrow _ Exploring the Future of AI in Cyber Security.pdf
An Analysis of Benefits and Risks of Artificial Intelligence
An Analysis of Benefits and Risks of Artificial Intelligence
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
The Transformative Role of Artificial Intelligence in Cybersecurity
The Transformative Role of Artificial Intelligence in Cybersecurity
The Security Challenge: What's Next?
The Security Challenge: What's Next?
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learning
A Study On Recent Trends And Developments In Intrusion Detection System
A Study On Recent Trends And Developments In Intrusion Detection System
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
misbanausheenparvam
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
upamatechverse
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
M Maged Hegazy, LLM, MBA, CCP, P3O
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
SIVASHANKAR N
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
slot gacor bisa pakai pulsa
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
AbhinavSharma374939
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
humanexperienceaaa
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
120cr0395
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Recently uploaded
(20)
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
IRJET- Intervention of Artificial Intelligence in Cyber Security
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2638 Intervention of Artificial Intelligence in Cyber Security K. Sindhu1,D. Chaitanya2 1Department of Cyber Security, Andhra Pradesh, India. 2SAS Analyst, Integra Technologies, California, USA. -----------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Data has become the major aid in many of the organizations and securing the data from wrong hands is the main aim of cyber security experts. They go through a great scuffle to deal with the attacks as even a small loop hole in the network could cause the attackers to penetrate into the systems data ,which would down the organizations reputation and lead to its downfall. Using lots of rich data, Artificial intelligence involvement along with machine learning in Cyber security could minimal the cyber attacks. With the use of Artificial intelligence the process of securing data could me automated with a minimal or no human intervention. This paper depicts the use of Artificial intelligence in cyber security , how it defends the cyber attacks and protects the data from unauthorized users. Key Words: Artificial Intelligence(AI), Machine Learning, Cyber security, Cyber attacks, automation, data sets. 1. INTRODUCTION With the progression of internet, the phase of crime has completely deviated. Cyber attacks have become more prevailing what we call as cyber crimes. Though cyber experts are coping-up with advanced technologies and methods to defend these crimes, still attackers are nearing with unique and unfamiliar virus codes to break the system security and penetrate into it unilaterally. It has become a perpetual process. So there is an immediate compulsion to enhance the security more and more to protect data from illegal approach. Artificial intelligence is the trending technology being used by many organizations to safe-guard themselves from intruders. Dark trace, cylance like companies are already using advanced techniques to ensure high end security to the systems using Artificial Intelligence to provide security tools. With the use of AI for cyber security, cyber attacks can be detected even before they occur and could be defended at earliest as possible. 2. The approach to AI in Cyber Security Cyber AI is the self learning technology like the human immune system. It learns from the data and activity that it scrutinize on the premises. This self learning ability empower cyber AI to divulge rare and formerly unnoticed patterns in cyber attacks. AI functioning is a mimic of human mind and it works on the basis of data sets that is already fed to it. Taking into count the previously happened cyber crimes, information on malware and the counter work done by the experts to defend them, all this data is collected and given as a historic data to AI in the knowledge base. Fig-1. Artificial intelligence in Cyber Security AI when it finds abnormal activities in the system it notifies an issue to the network admin on the dash board and finds for appropriate measures to defend the attacks by going through the data sets available in the knowledge base. If the attack is previously seen and the defend techniques for that attack is already stored in the data set AI acts the same like the information given in data sets to oppose the attacks. If the attack is new to AI it then implements machine learning. As like the human immune system that fights against the new bacteria, machine learning which is a sub-domain of Artificial intelligence, fights against new attacks that never been seen before. Machine learning has the ability to automatically learn and improve unsupervised data from supervised data. It uses mathematical and statistical ways to extract information from data and with that information machine learning tries to guess the unknown. Once the attack is prevented AI updates the knowledge base and searches for any new attacks and system abnormalities.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2639 3. Algorithm Step1: Analyse the network traffic, system logs and user activities to see if there are any abnormal activities. Step2: If there are any system abnormalities find the defend mechanisms in the historic data. Step3: In case of already seen attack follow the same measures as per the data in knowledge base Step4: For new attacks use machine learning techniques to self defend the attacks. Step5: Once the attacks are detected and defended issue a notification on dashboard, update the knowledge base and check for new attacks and abnormalities. Step6: If the attacks couldn't be solved notify the network administrator on the dash board and check for new attacks and abnormalities. 4. Is AI a solution for Cyber security or it's another threat? Artificial Intelligence if not used properly could definitely create a massive destruction. When proper and sufficient data is not given to the knowledge base false positives and false negatives could be happen which is again a hassle to the security experts. As everyone are running towards AI and machine learning, for most of the solutions they should be very careful while dealing the above mentioned subjects. When AI used by wrong hands, the same technology which secures the data can be a threat to data. Attackers can create advanced AI proof virus to hide the presence of attacks in the system. When these viruses are spread into system, even AI couldn't detect these attacks and these AI proof attacks could slowly penetrate into all the systems of the network causing to data theft, data manipulation or could also lead to ransomware. In order to build and keep AI systems ready, companies need humongous amount of hardware and software supplies. AI has the equal advantages and disadvantages when used in Cyber Security. But when it is properly used it is a great boon for cyber security experts as it is a automated process i.e. once the proper and relevant data regarding attacks and its defense mechanisms is given, AI automatically monitors the system for any abnormalities and defends the attacks. AI could even detect any minor system changes which humans cant and works effectively and efficiently. As AI can give automated response it could work with no man power and also it consumes very less time to do its work saving the time, resources and cost. 4.1 Solutions to use AI effectively A good AI solution requires lots of rich data and AI domain expertise's. Update the data sets thoroughly with the latest cyber risks and techniques to eradicate the attacks. Having cyber security teams testing the systems and networks for potential gaps and fixing them at the earliest could minimize the risk of cyber threat. Give loads and loads of information on how people do their works in investigating cyber attacks to AI. Track everything a human do with their consent and record every click they do, every website they go to every step they do in that journey of investigation. Capture all the data regarding how they find new attacks and the steps they take to find solutions to new attacks and feed this in data set. Replicate it in a machine learning platform to teach it how to respond to new attacks.. This is the data what ethical hackers do when they are investigating for attacks. Through this we can build systems that are very effective at replicating that process, taking the leads from weird things happening somewhere inside an organization and responding quickly to safeguard the systems data from black hackers. AI should be trained such that it has a potential of changing the permissions of the user according to the place of accessing data. 5. CONCLUSION AI have potential to act much earlier than humans. Cyber AI's work well with machine learning to automatically detect and defend cyber crimes with minimal human intervention. The more data given to AI, the best effective results it produce. The working of AI is completely dependent on the data sets given to it. AI could also be used by attackers to develop AI proof attacks. To enhance security and safeguard the systems data against anomalies use firewalls and malware scanners to protect systems and constantly get updated to redesigned hardware and software's. Use data protection techniques like pseudonymization and data encryption. To get maximum good harvest from AI. It should be taken care by good cyber security farmers who have sound knowledge relating AI. 6. REFERENCES [1] Alex Mathew "Cyber security and security automation", Advanced computing: An International Journal (ACIJ), vol.10, No.6, November 2019.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2640 [2] Arockia panimalar.s, Giri Pai.U, Salman Khan.K, "Artificial intelligence techniques for Cyber security", International Research Journal Of Engineering and Technology (IRJET) vol.05, Issue: 03, March 2018. [3] IBM. "Artificial Intelligence for smarter kind of Cyber Security" IBM, 16 August 2018, "https://www.ibm.com/security/artificial- intelligence" [4] Aimee Laurence "The impact of Artificial Intelligence on cyber Security" August 22, 2019, "https://www.cpomagazine.com/cyber-security/the- impact-of-artificial-intelligence-on-cyber-security/" [5] Vahakainu, Petri and Lehto,Martti. Artificial Intelligence in Cyber Security environment, Academic conferences International limited, Reading 2019. [6] Siddiqui zeeshan, Yadav sonali, Hussain md., "Application of Artificial Intelligence in fight against Cyber Crimes: A review", International Journal of advanced Research in Computer Science, vol.9, No.2, pp. 118-121. 2018. [7] Andrew Tsonchey "What will the impact of AI be on Cyber attacks", December 4, 2019. "https://www.youtube.com/watch?v=hUwBzCOEF14 "
Download now