SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2638
Intervention of Artificial Intelligence in Cyber Security
K. Sindhu1,D. Chaitanya2
1Department of Cyber Security, Andhra Pradesh, India.
2SAS Analyst, Integra Technologies, California, USA.
-----------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Data has become the major aid in many of
the organizations and securing the data from wrong hands
is the main aim of cyber security experts. They go through
a great scuffle to deal with the attacks as even a small loop
hole in the network could cause the attackers to
penetrate into the systems data ,which would down the
organizations reputation and lead to its downfall. Using
lots of rich data, Artificial intelligence involvement along
with machine learning in Cyber security could minimal the
cyber attacks. With the use of Artificial intelligence the
process of securing data could me automated with a
minimal or no human intervention. This paper depicts the
use of Artificial intelligence in cyber security , how it
defends the cyber attacks and protects the data from
unauthorized users.
Key Words: Artificial Intelligence(AI), Machine
Learning, Cyber security, Cyber attacks, automation,
data sets.
1. INTRODUCTION
With the progression of internet, the phase of crime has
completely deviated. Cyber attacks have become more
prevailing what we call as cyber crimes. Though cyber
experts are coping-up with advanced technologies and
methods to defend these crimes, still attackers are nearing
with unique and unfamiliar virus codes to break the
system security and penetrate into it unilaterally. It has
become a perpetual process. So there is an immediate
compulsion to enhance the security more and more to
protect data from illegal approach.
Artificial intelligence is the trending technology
being used by many organizations to safe-guard
themselves from intruders. Dark trace, cylance like
companies are already using advanced techniques to
ensure high end security to the systems using Artificial
Intelligence to provide security tools. With the use of AI
for cyber security, cyber attacks can be detected even
before they occur and could be defended at earliest as
possible.
2. The approach to AI in Cyber Security
Cyber AI is the self learning technology like the human
immune system. It learns from the data and activity that it
scrutinize on the premises. This self learning ability
empower cyber AI to divulge rare and formerly unnoticed
patterns in cyber attacks. AI functioning is a mimic of
human mind and it works on the basis of data sets that is
already fed to it. Taking into count the previously
happened cyber crimes, information on malware and the
counter work done by the experts to defend them, all this
data is collected and given as a historic data to AI in the
knowledge base.
Fig-1. Artificial intelligence in Cyber Security
AI when it finds abnormal activities in the
system it notifies an issue to the network admin on the
dash board and finds for appropriate measures to defend
the attacks by going through the data sets available in the
knowledge base. If the attack is previously seen and the
defend techniques for that attack is already stored in the
data set AI acts the same like the information given in data
sets to oppose the attacks. If the attack is new to AI it then
implements machine learning. As like the human immune
system that fights against the new bacteria, machine
learning which is a sub-domain of Artificial intelligence,
fights against new attacks that never been seen before.
Machine learning has the ability to automatically learn and
improve unsupervised data from supervised data. It uses
mathematical and statistical ways to extract information
from data and with that information machine learning tries
to guess the unknown. Once the attack is prevented AI
updates the knowledge base and searches for any new
attacks and system abnormalities.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2639
3. Algorithm
Step1:
Analyse the network traffic, system logs and user
activities to see if there are any abnormal activities.
Step2:
If there are any system abnormalities find the defend
mechanisms in the historic data.
Step3:
In case of already seen attack follow the same measures
as per the data in knowledge base
Step4:
For new attacks use machine learning techniques to self
defend the attacks.
Step5:
Once the attacks are detected and defended issue a
notification on dashboard, update the knowledge base and
check for new attacks and abnormalities.
Step6:
If the attacks couldn't be solved notify the network
administrator on the dash board and check for new
attacks and abnormalities.
4. Is AI a solution for Cyber security or it's
another threat?
Artificial Intelligence if not used properly could definitely
create a massive destruction. When proper and sufficient
data is not given to the knowledge base false positives and
false negatives could be happen which is again a hassle to
the security experts. As everyone are running towards AI
and machine learning, for most of the solutions they should
be very careful while dealing the above mentioned
subjects. When AI used by wrong hands, the same
technology which secures the data can be a threat to data.
Attackers can create advanced AI proof virus to hide the
presence of attacks in the system. When these viruses are
spread into system, even AI couldn't detect these attacks
and these AI proof attacks could slowly penetrate into all
the systems of the network causing to data theft, data
manipulation or could also lead to ransomware.
In order to build and keep AI systems ready, companies
need humongous amount of hardware and software
supplies. AI has the equal advantages and disadvantages
when used in Cyber Security. But when it is properly used
it is a great boon for cyber security experts as it is a
automated process i.e. once the proper and relevant data
regarding attacks and its defense mechanisms is given, AI
automatically monitors the system for any abnormalities
and defends the attacks. AI could even detect any minor
system changes which humans cant and works effectively
and efficiently. As AI can give automated response it could
work with no man power and also it consumes very less
time to do its work saving the time, resources and cost.
4.1 Solutions to use AI effectively
A good AI solution requires lots of rich data and AI domain
expertise's. Update the data sets thoroughly with the latest
cyber risks and techniques to eradicate the attacks. Having
cyber security teams testing the systems and networks for
potential gaps and fixing them at the earliest could
minimize the risk of cyber threat. Give loads and loads of
information on how people do their works in investigating
cyber attacks to AI. Track everything a human do with
their consent and record every click they do, every website
they go to every step they do in that journey of
investigation. Capture all the data regarding how they find
new attacks and the steps they take to find solutions to
new attacks and feed this in data set. Replicate it in a
machine learning platform to teach it how to respond to
new attacks.. This is the data what ethical hackers do when
they are investigating for attacks. Through this we can
build systems that are very effective at replicating that
process, taking the leads from weird things happening
somewhere inside an organization and responding quickly
to safeguard the systems data from black hackers. AI
should be trained such that it has a potential of changing
the permissions of the user according to the place of
accessing data.
5. CONCLUSION
AI have potential to act much earlier than humans. Cyber
AI's work well with machine learning to automatically
detect and defend cyber crimes with minimal human
intervention. The more data given to AI, the best effective
results it produce. The working of AI is completely
dependent on the data sets given to it. AI could also be used
by attackers to develop AI proof attacks. To enhance
security and safeguard the systems data against anomalies
use firewalls and malware scanners to protect systems and
constantly get updated to redesigned hardware and
software's. Use data protection techniques like
pseudonymization and data encryption. To get maximum
good harvest from AI. It should be taken care by good cyber
security farmers who have sound knowledge relating AI.
6. REFERENCES
[1] Alex Mathew "Cyber security and security automation",
Advanced computing: An International Journal (ACIJ),
vol.10, No.6, November 2019.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2640
[2] Arockia panimalar.s, Giri Pai.U, Salman Khan.K,
"Artificial intelligence techniques for Cyber security",
International Research Journal Of Engineering and
Technology (IRJET) vol.05, Issue: 03, March 2018.
[3] IBM. "Artificial Intelligence for smarter kind of Cyber
Security" IBM, 16 August 2018,
"https://www.ibm.com/security/artificial-
intelligence"
[4] Aimee Laurence "The impact of Artificial Intelligence
on cyber Security" August 22, 2019,
"https://www.cpomagazine.com/cyber-security/the-
impact-of-artificial-intelligence-on-cyber-security/"
[5] Vahakainu, Petri and Lehto,Martti. Artificial
Intelligence in Cyber Security environment, Academic
conferences International limited, Reading 2019.
[6] Siddiqui zeeshan, Yadav sonali, Hussain md.,
"Application of Artificial Intelligence in fight against
Cyber Crimes: A review", International Journal of
advanced Research in Computer Science, vol.9, No.2,
pp. 118-121. 2018.
[7] Andrew Tsonchey "What will the impact of AI be on
Cyber attacks", December 4, 2019.
"https://www.youtube.com/watch?v=hUwBzCOEF14
"

More Related Content

What's hot

Role of artificial intelligence in cyber security | The Cyber Security Review
Role of artificial intelligence in cyber security | The Cyber Security ReviewRole of artificial intelligence in cyber security | The Cyber Security Review
Role of artificial intelligence in cyber security | The Cyber Security ReviewFreelancing
 
HOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITYHOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITYPriyanshu Ratnakar
 
Cloudbrew 2019 - Threat hunting with the Microsoft Cloud
Cloudbrew 2019 - Threat hunting with the Microsoft CloudCloudbrew 2019 - Threat hunting with the Microsoft Cloud
Cloudbrew 2019 - Threat hunting with the Microsoft CloudTom Janetscheck
 
Application of Machine Learning in Cyber Security
Application of Machine Learning in Cyber SecurityApplication of Machine Learning in Cyber Security
Application of Machine Learning in Cyber SecurityDr. Umesh Rao.Hodeghatta
 
Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016Janghyuck Choi
 
Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain BGA Cyber Security
 
CYBERSECURITY INFRASTRUCTURE AND SECURITY AUTOMATION
CYBERSECURITY INFRASTRUCTURE AND SECURITY AUTOMATIONCYBERSECURITY INFRASTRUCTURE AND SECURITY AUTOMATION
CYBERSECURITY INFRASTRUCTURE AND SECURITY AUTOMATIONacijjournal
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityOlivier Busolini
 
Machine learning in Cyber Security
Machine learning in Cyber SecurityMachine learning in Cyber Security
Machine learning in Cyber SecurityRajathV2
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with aiBurhan Ahmed
 
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)Enterprise Management Associates
 
Chapter-2.docx
Chapter-2.docxChapter-2.docx
Chapter-2.docxAmir Khan
 
OA_Cyber security course with AI
OA_Cyber security course with AIOA_Cyber security course with AI
OA_Cyber security course with AIObject Automation
 
Artificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber SecurityArtificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber SecurityIRJET Journal
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistMatthew Rosenquist
 
Cybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith BarthurCybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith BarthurSri Ambati
 
The good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurityThe good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurityMohammad Khreesha
 

What's hot (19)

Role of artificial intelligence in cyber security | The Cyber Security Review
Role of artificial intelligence in cyber security | The Cyber Security ReviewRole of artificial intelligence in cyber security | The Cyber Security Review
Role of artificial intelligence in cyber security | The Cyber Security Review
 
HOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITYHOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITY
 
Cloudbrew 2019 - Threat hunting with the Microsoft Cloud
Cloudbrew 2019 - Threat hunting with the Microsoft CloudCloudbrew 2019 - Threat hunting with the Microsoft Cloud
Cloudbrew 2019 - Threat hunting with the Microsoft Cloud
 
Application of Machine Learning in Cyber Security
Application of Machine Learning in Cyber SecurityApplication of Machine Learning in Cyber Security
Application of Machine Learning in Cyber Security
 
Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016
 
2019 Cybersecurity Predictions
2019 Cybersecurity Predictions2019 Cybersecurity Predictions
2019 Cybersecurity Predictions
 
Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain
 
CYBERSECURITY INFRASTRUCTURE AND SECURITY AUTOMATION
CYBERSECURITY INFRASTRUCTURE AND SECURITY AUTOMATIONCYBERSECURITY INFRASTRUCTURE AND SECURITY AUTOMATION
CYBERSECURITY INFRASTRUCTURE AND SECURITY AUTOMATION
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
 
Machine learning in Cyber Security
Machine learning in Cyber SecurityMachine learning in Cyber Security
Machine learning in Cyber Security
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
 
Data Safety And Security
Data Safety And SecurityData Safety And Security
Data Safety And Security
 
Chapter-2.docx
Chapter-2.docxChapter-2.docx
Chapter-2.docx
 
OA_Cyber security course with AI
OA_Cyber security course with AIOA_Cyber security course with AI
OA_Cyber security course with AI
 
Artificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber SecurityArtificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber Security
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
 
Cybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith BarthurCybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith Barthur
 
The good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurityThe good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurity
 

Similar to IRJET- Intervention of Artificial Intelligence in Cyber Security

IRJET- Use of Artificial Intelligence in Cyber Defence
IRJET- Use of Artificial Intelligence in Cyber DefenceIRJET- Use of Artificial Intelligence in Cyber Defence
IRJET- Use of Artificial Intelligence in Cyber DefenceIRJET Journal
 
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdfIRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdfIRJET Journal
 
Artificial Intelligence.pptx
Artificial Intelligence.pptxArtificial Intelligence.pptx
Artificial Intelligence.pptxKantaShakkarwal
 
A review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber securityA review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber securitybijejournal
 
Harnessing Artificial Intelligence in Cybersecurity: Safeguarding Digital Fro...
Harnessing Artificial Intelligence in Cybersecurity: Safeguarding Digital Fro...Harnessing Artificial Intelligence in Cybersecurity: Safeguarding Digital Fro...
Harnessing Artificial Intelligence in Cybersecurity: Safeguarding Digital Fro...cyberprosocial
 
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITYARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITYCynthia King
 
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...IRJET Journal
 
How AI is Changing the World of Cybersecurity.pdf
How AI is Changing the World of Cybersecurity.pdfHow AI is Changing the World of Cybersecurity.pdf
How AI is Changing the World of Cybersecurity.pdfMobibizIndia1
 
Artificial-Intelligence-in-Cyber-Security.pptx
Artificial-Intelligence-in-Cyber-Security.pptxArtificial-Intelligence-in-Cyber-Security.pptx
Artificial-Intelligence-in-Cyber-Security.pptxKarthik Sarma
 
[DSC Europe 23][AI:CSI] Aleksa Stojanovic - Applying AI for Threat Detection ...
[DSC Europe 23][AI:CSI] Aleksa Stojanovic - Applying AI for Threat Detection ...[DSC Europe 23][AI:CSI] Aleksa Stojanovic - Applying AI for Threat Detection ...
[DSC Europe 23][AI:CSI] Aleksa Stojanovic - Applying AI for Threat Detection ...DataScienceConferenc1
 
The Role Of Artificial Intelligence In Cybersecurity.pdf
The Role Of Artificial Intelligence In Cybersecurity.pdfThe Role Of Artificial Intelligence In Cybersecurity.pdf
The Role Of Artificial Intelligence In Cybersecurity.pdfCiente
 
How is ai important to the future of cyber security
How is ai important to the future of cyber security How is ai important to the future of cyber security
How is ai important to the future of cyber security Robert Smith
 
Securing Tomorrow _ Exploring the Future of AI in Cyber Security.pdf
Securing Tomorrow _ Exploring the Future of AI in Cyber Security.pdfSecuring Tomorrow _ Exploring the Future of AI in Cyber Security.pdf
Securing Tomorrow _ Exploring the Future of AI in Cyber Security.pdfFlyWly
 
An Analysis of Benefits and Risks of Artificial Intelligence
An Analysis of Benefits and Risks of Artificial IntelligenceAn Analysis of Benefits and Risks of Artificial Intelligence
An Analysis of Benefits and Risks of Artificial Intelligenceijtsrd
 
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”IRJET Journal
 
The Transformative Role of Artificial Intelligence in Cybersecurity
The Transformative Role of Artificial Intelligence in CybersecurityThe Transformative Role of Artificial Intelligence in Cybersecurity
The Transformative Role of Artificial Intelligence in Cybersecuritycyberprosocial
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?Cognizant
 
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningan efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningVenkat Projects
 
A Study On Recent Trends And Developments In Intrusion Detection System
A Study On Recent Trends And Developments In Intrusion Detection SystemA Study On Recent Trends And Developments In Intrusion Detection System
A Study On Recent Trends And Developments In Intrusion Detection SystemLindsey Sais
 

Similar to IRJET- Intervention of Artificial Intelligence in Cyber Security (20)

IRJET- Use of Artificial Intelligence in Cyber Defence
IRJET- Use of Artificial Intelligence in Cyber DefenceIRJET- Use of Artificial Intelligence in Cyber Defence
IRJET- Use of Artificial Intelligence in Cyber Defence
 
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdfIRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
 
Artificial Intelligence.pptx
Artificial Intelligence.pptxArtificial Intelligence.pptx
Artificial Intelligence.pptx
 
A review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber securityA review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber security
 
Harnessing Artificial Intelligence in Cybersecurity: Safeguarding Digital Fro...
Harnessing Artificial Intelligence in Cybersecurity: Safeguarding Digital Fro...Harnessing Artificial Intelligence in Cybersecurity: Safeguarding Digital Fro...
Harnessing Artificial Intelligence in Cybersecurity: Safeguarding Digital Fro...
 
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITYARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
 
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
 
How AI can help with cybersecurity
How AI can help with cybersecurityHow AI can help with cybersecurity
How AI can help with cybersecurity
 
How AI is Changing the World of Cybersecurity.pdf
How AI is Changing the World of Cybersecurity.pdfHow AI is Changing the World of Cybersecurity.pdf
How AI is Changing the World of Cybersecurity.pdf
 
Artificial-Intelligence-in-Cyber-Security.pptx
Artificial-Intelligence-in-Cyber-Security.pptxArtificial-Intelligence-in-Cyber-Security.pptx
Artificial-Intelligence-in-Cyber-Security.pptx
 
[DSC Europe 23][AI:CSI] Aleksa Stojanovic - Applying AI for Threat Detection ...
[DSC Europe 23][AI:CSI] Aleksa Stojanovic - Applying AI for Threat Detection ...[DSC Europe 23][AI:CSI] Aleksa Stojanovic - Applying AI for Threat Detection ...
[DSC Europe 23][AI:CSI] Aleksa Stojanovic - Applying AI for Threat Detection ...
 
The Role Of Artificial Intelligence In Cybersecurity.pdf
The Role Of Artificial Intelligence In Cybersecurity.pdfThe Role Of Artificial Intelligence In Cybersecurity.pdf
The Role Of Artificial Intelligence In Cybersecurity.pdf
 
How is ai important to the future of cyber security
How is ai important to the future of cyber security How is ai important to the future of cyber security
How is ai important to the future of cyber security
 
Securing Tomorrow _ Exploring the Future of AI in Cyber Security.pdf
Securing Tomorrow _ Exploring the Future of AI in Cyber Security.pdfSecuring Tomorrow _ Exploring the Future of AI in Cyber Security.pdf
Securing Tomorrow _ Exploring the Future of AI in Cyber Security.pdf
 
An Analysis of Benefits and Risks of Artificial Intelligence
An Analysis of Benefits and Risks of Artificial IntelligenceAn Analysis of Benefits and Risks of Artificial Intelligence
An Analysis of Benefits and Risks of Artificial Intelligence
 
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
 
The Transformative Role of Artificial Intelligence in Cybersecurity
The Transformative Role of Artificial Intelligence in CybersecurityThe Transformative Role of Artificial Intelligence in Cybersecurity
The Transformative Role of Artificial Intelligence in Cybersecurity
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningan efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learning
 
A Study On Recent Trends And Developments In Intrusion Detection System
A Study On Recent Trends And Developments In Intrusion Detection SystemA Study On Recent Trends And Developments In Intrusion Detection System
A Study On Recent Trends And Developments In Intrusion Detection System
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Recently uploaded (20)

chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 

IRJET- Intervention of Artificial Intelligence in Cyber Security

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2638 Intervention of Artificial Intelligence in Cyber Security K. Sindhu1,D. Chaitanya2 1Department of Cyber Security, Andhra Pradesh, India. 2SAS Analyst, Integra Technologies, California, USA. -----------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Data has become the major aid in many of the organizations and securing the data from wrong hands is the main aim of cyber security experts. They go through a great scuffle to deal with the attacks as even a small loop hole in the network could cause the attackers to penetrate into the systems data ,which would down the organizations reputation and lead to its downfall. Using lots of rich data, Artificial intelligence involvement along with machine learning in Cyber security could minimal the cyber attacks. With the use of Artificial intelligence the process of securing data could me automated with a minimal or no human intervention. This paper depicts the use of Artificial intelligence in cyber security , how it defends the cyber attacks and protects the data from unauthorized users. Key Words: Artificial Intelligence(AI), Machine Learning, Cyber security, Cyber attacks, automation, data sets. 1. INTRODUCTION With the progression of internet, the phase of crime has completely deviated. Cyber attacks have become more prevailing what we call as cyber crimes. Though cyber experts are coping-up with advanced technologies and methods to defend these crimes, still attackers are nearing with unique and unfamiliar virus codes to break the system security and penetrate into it unilaterally. It has become a perpetual process. So there is an immediate compulsion to enhance the security more and more to protect data from illegal approach. Artificial intelligence is the trending technology being used by many organizations to safe-guard themselves from intruders. Dark trace, cylance like companies are already using advanced techniques to ensure high end security to the systems using Artificial Intelligence to provide security tools. With the use of AI for cyber security, cyber attacks can be detected even before they occur and could be defended at earliest as possible. 2. The approach to AI in Cyber Security Cyber AI is the self learning technology like the human immune system. It learns from the data and activity that it scrutinize on the premises. This self learning ability empower cyber AI to divulge rare and formerly unnoticed patterns in cyber attacks. AI functioning is a mimic of human mind and it works on the basis of data sets that is already fed to it. Taking into count the previously happened cyber crimes, information on malware and the counter work done by the experts to defend them, all this data is collected and given as a historic data to AI in the knowledge base. Fig-1. Artificial intelligence in Cyber Security AI when it finds abnormal activities in the system it notifies an issue to the network admin on the dash board and finds for appropriate measures to defend the attacks by going through the data sets available in the knowledge base. If the attack is previously seen and the defend techniques for that attack is already stored in the data set AI acts the same like the information given in data sets to oppose the attacks. If the attack is new to AI it then implements machine learning. As like the human immune system that fights against the new bacteria, machine learning which is a sub-domain of Artificial intelligence, fights against new attacks that never been seen before. Machine learning has the ability to automatically learn and improve unsupervised data from supervised data. It uses mathematical and statistical ways to extract information from data and with that information machine learning tries to guess the unknown. Once the attack is prevented AI updates the knowledge base and searches for any new attacks and system abnormalities.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2639 3. Algorithm Step1: Analyse the network traffic, system logs and user activities to see if there are any abnormal activities. Step2: If there are any system abnormalities find the defend mechanisms in the historic data. Step3: In case of already seen attack follow the same measures as per the data in knowledge base Step4: For new attacks use machine learning techniques to self defend the attacks. Step5: Once the attacks are detected and defended issue a notification on dashboard, update the knowledge base and check for new attacks and abnormalities. Step6: If the attacks couldn't be solved notify the network administrator on the dash board and check for new attacks and abnormalities. 4. Is AI a solution for Cyber security or it's another threat? Artificial Intelligence if not used properly could definitely create a massive destruction. When proper and sufficient data is not given to the knowledge base false positives and false negatives could be happen which is again a hassle to the security experts. As everyone are running towards AI and machine learning, for most of the solutions they should be very careful while dealing the above mentioned subjects. When AI used by wrong hands, the same technology which secures the data can be a threat to data. Attackers can create advanced AI proof virus to hide the presence of attacks in the system. When these viruses are spread into system, even AI couldn't detect these attacks and these AI proof attacks could slowly penetrate into all the systems of the network causing to data theft, data manipulation or could also lead to ransomware. In order to build and keep AI systems ready, companies need humongous amount of hardware and software supplies. AI has the equal advantages and disadvantages when used in Cyber Security. But when it is properly used it is a great boon for cyber security experts as it is a automated process i.e. once the proper and relevant data regarding attacks and its defense mechanisms is given, AI automatically monitors the system for any abnormalities and defends the attacks. AI could even detect any minor system changes which humans cant and works effectively and efficiently. As AI can give automated response it could work with no man power and also it consumes very less time to do its work saving the time, resources and cost. 4.1 Solutions to use AI effectively A good AI solution requires lots of rich data and AI domain expertise's. Update the data sets thoroughly with the latest cyber risks and techniques to eradicate the attacks. Having cyber security teams testing the systems and networks for potential gaps and fixing them at the earliest could minimize the risk of cyber threat. Give loads and loads of information on how people do their works in investigating cyber attacks to AI. Track everything a human do with their consent and record every click they do, every website they go to every step they do in that journey of investigation. Capture all the data regarding how they find new attacks and the steps they take to find solutions to new attacks and feed this in data set. Replicate it in a machine learning platform to teach it how to respond to new attacks.. This is the data what ethical hackers do when they are investigating for attacks. Through this we can build systems that are very effective at replicating that process, taking the leads from weird things happening somewhere inside an organization and responding quickly to safeguard the systems data from black hackers. AI should be trained such that it has a potential of changing the permissions of the user according to the place of accessing data. 5. CONCLUSION AI have potential to act much earlier than humans. Cyber AI's work well with machine learning to automatically detect and defend cyber crimes with minimal human intervention. The more data given to AI, the best effective results it produce. The working of AI is completely dependent on the data sets given to it. AI could also be used by attackers to develop AI proof attacks. To enhance security and safeguard the systems data against anomalies use firewalls and malware scanners to protect systems and constantly get updated to redesigned hardware and software's. Use data protection techniques like pseudonymization and data encryption. To get maximum good harvest from AI. It should be taken care by good cyber security farmers who have sound knowledge relating AI. 6. REFERENCES [1] Alex Mathew "Cyber security and security automation", Advanced computing: An International Journal (ACIJ), vol.10, No.6, November 2019.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2640 [2] Arockia panimalar.s, Giri Pai.U, Salman Khan.K, "Artificial intelligence techniques for Cyber security", International Research Journal Of Engineering and Technology (IRJET) vol.05, Issue: 03, March 2018. [3] IBM. "Artificial Intelligence for smarter kind of Cyber Security" IBM, 16 August 2018, "https://www.ibm.com/security/artificial- intelligence" [4] Aimee Laurence "The impact of Artificial Intelligence on cyber Security" August 22, 2019, "https://www.cpomagazine.com/cyber-security/the- impact-of-artificial-intelligence-on-cyber-security/" [5] Vahakainu, Petri and Lehto,Martti. Artificial Intelligence in Cyber Security environment, Academic conferences International limited, Reading 2019. [6] Siddiqui zeeshan, Yadav sonali, Hussain md., "Application of Artificial Intelligence in fight against Cyber Crimes: A review", International Journal of advanced Research in Computer Science, vol.9, No.2, pp. 118-121. 2018. [7] Andrew Tsonchey "What will the impact of AI be on Cyber attacks", December 4, 2019. "https://www.youtube.com/watch?v=hUwBzCOEF14 "