BE-EEE-8th sem-Presentation Artificial intelligence in security managenent
1. By,
MOHAMMED SAQIB
1GC11EE018
Dept of EEE
GCE,Ramanagaram
AN OVERVIEW ON USE OF
ARTIFICIAL INTELLIGENCE
TECHNIQUES
IN
EFFECTIVE SECURITY MANAGEMENT
Under The Guidance of
Mr.Aejaz Ahmed KR
Asst. Professor
2. What is
Artificial Intelligence[AI]…???
The artificial intelligence is the process in which
machine can act like a human
AI techniques gives rise to important applications
where human processing ability weakens
Some of the field where AI is massively used are
Military, Antiterrorism, Automobile Industry,
Internet Search Engines and Robotics, Speech
recognition, Expert & fuzzy system etc.,
The central goals of AI research
include reasoning, knowledge, planning, learning,
natural language processing
(communication),perception and the ability to
move and manipulate objects.
General intelligence is still among the field's long-
term goals.
3. Artificial Intelligence & Security
Nowadays Security is the important issue for Human,
Company Environment, Organization, Community and
Country in accordance to maintain growth and stability
Security threat gives rise to several problems such as
instability, economical setbacks, terror attacks causes loss of
human lives, creates Un-safety feelings.
As a human being, the security is challenging task because
human has several restriction on analyzing and processing
several information at a time. This is big drawback is
identified in current security system.
This drawback can overcome on more practical manner with
the help of artificial intelligence techniques integration. The
security system includes Homeland security, Intrusion
detection system, DOS attack, Cryptography, Video vigilance
System etc. Human Processing ability integrated with AI
certainly raise the security at high extend.
4. Formal Security System
Security System based on Artificial
Intelligence
5. Different AI techniques used in
Security Management System
Artificial Neural Networks.
Data Mining Tools.
Pattern Recognition.
Image Processing/Analysis.
Fuzzy Logic.
Expert System.
6. Artificial Neural Networks
Artificial Neural Networks is an effective
technique which has the ability to implement
security using back-propagation algorithm.
Simple combinational logic and sequential
machine can be well implemented using back-
propagation algorithm.
They are programs designed to solve any
problem by trying to mimic the structure and
the function of our nervous system
They are based on simulated neurons which
are joined together in variety of ways to form
networks
7. A Simple Biological neuron
The fundamental processing
element of a neural network is
a neuron. Basically, a
biological neuron receives
inputs from other sources,
combines them in some way,
performs a generally nonlinear
operation on the result, and
then outputs the final result
Inputs
w2
w1
w3
wn
wn-1
.
.
.
x1
x2
x3
…
xn-1
xn
y
)(;
1
zHyxwz
n
i
ii
Artificial Neuron
8. ANN-Applications
It involves Human like thinking
They can handle noisy or missing data
They can work with large number of variables
or parameters
They deal with the non-linearity of the world
which we live in.
9. Fuzzy Rule Based Expert System
for Cyber Security
Stage 1: Defining
Cyber Security Expert
System Variables
Stage 2: Data
Collection for Cyber
Terrorism
Stage 3: System
Design
Stage 4:Fuzzy Rule
Based Model
Implementation
Steps Involved
10. Advantages & Disadvantages of various AI
TechniquesAI Techniques Advantages Disadvantages
Artificial Neural Networks •Adapt to unknown
situations
•Robust, able to model complex
functions.
•Easy to use.
•Training of neural network
•Not exact
•Complexity of the network
structure
Data Mining •Help with decision
making
•find out exact information from
vast amount of data
•User privacy/security
is critical issue
•Misuse of information
•Accuracy of data
Pattern Recognition •Quick and Accurate
•Recognize & Classify
unfamiliar objects
•Reliability of result depends
on input
Fuzzy Logic •The algorithms can be
described with little data, so
little memory is required.
•Fuzzy algorithms are often
robust.
•They are not very sensitive
to changing environments
and erroneous or forgotten
rules
Expert System •Provides consistent
answers for repetitive decisions,
processes and tasks
•Can work round the clock
•Cannot adapt to
changing environments,
unless knowledge base is
changed
11. INTELLIGENT SYSTEM FOR
INFORMATION SECURITY
MANAGEMENT
ISISM ARCHITECTURE AI techniques can be used in building intelligent
models to improve the information security
management, intrusion detection and prevention
capabilities, efficiency of security event
management, and decision making
Efficient information security management
requires an intelligent system that supports
security event management approach with
enhanced real-time capabilities, adaptation, and
generalization to predict possible attacks and to
support human’s actions.
ISISM ARCHITECTURE IS USED FOR THIS
PURPOSE
12. ISISM Architecture
Proposed Meystel & Albus
Intelligent system has 2 parts
Internal or Computational
Sensory processing
world modeling
Decision making module
value judgment module
External or Interfacing
13. Other Fields where AI is used
1. Engineering
2. Artificial life
3. Automated reasoning
4. Automation
5. Biologically inspired computing
6. Concept mining
7. Data mining
8. Knowledge representation
9. Semantic Web
10. E-mail spam filtering
11. Artificial Creativity
12. Game theory and Strategic planning
And Many more………..
14. Conclusion
As Security is key important issues, the integration
Artificial Intelligence Techniques certainly improve the
performance of the existing security system
System alerts the user before unwanted hazards are
yet to happen
The system constructs an intelligent image processing
technology which can identify the license plate and
human face. This is the essential as far as the terror
attacks are concerned
Reduces human effort
Man power required for the security purpose can be
reduced, as once the successful security system with
AI is designed, it can be used for longer duration.
Drawback-Some are Expensive