SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1466
IMPLEMENTATION OF ARTIFICIAL INTELLIGENCE METHODS TO CURB
CYBER ASSAULTS: A REVIEW
Kushagra Pal1, Roopam Tiwari2, Shivam Maheshwary3
1,2,3 Department of Information Technology SVKM’S NMIMS MPSTME, Mumbai, Maharashtra, India,
------------------------------------------------------------------------***-------------------------------------------------------------------------
Abstract - With the advancement intechnology, attackersare
making use of cyberspace to perform various cyber attacks.
Cyber frameworks are highly sensitive to intrusion as well as
many other threats. As every workplaces now a days are
connected to some network in one way or another leads to
heavy traffic or network congestion, more security attack
attempts and security breaches. Weneedtohavesecurityfrom
these attacks. The treatment of various attacks is also
accessible, but the approach to find which system is being
attacked is difficult. This paper providesan introductionofthe
Cyber Security techniques and how Artificial Intelligence (AI)
could help in solving the cyber security problems. Italsoshows
the work done in the area of Artificial Intelligence for fighting
against cyber assaults.
Key Words: Artificial Intelligence (AI), Expert System,
Artificial Neural Network (ANN), Intelligent System,
Intrusion Detection System (IDS)
1. INTRODUCTION
Cyber crimes are not limited to a particular area but is
extended over every part of computer network across the
globe. Advancement of technology are making attackers
more advance in cyber crimes as they are also using the
modern techniques to break into the network. The attackers
identify the susceptibility existing in the Operating System,
system application and operate that to damage the system
[1]. Only human involvement cannot curb these threats.
Traditional security methods and algorithms cannot alone
put curb on the cyber-crimes so there is the need of artificial
intelligence techniques to prevent cyber-crimes. Artificial
intelligence is widely used in industries to collect data and
information. With the use of AI techniquesthatdata couldbe
processed into meaningful information which could be used
to prevent cyber assaults [2].
AI provides various techniques such as Expert System,
Intelligent Agents, Neural Networks, Pattern Recognition,
Machine Learning, Artificial Immune Systems, etc.
2. ARTIFICIAL INTELLIGENCE TECHNIQUES FOR CYBER
SECURITY
2.1 Application of Expert System
Expert system has a knowledge base, in which all the factual
and heuristic knowledge is stored. It also has an inference
engine for interpreting answers relevant to the information
and, likely extra information about a scenario. Knowledge
base and inference engine are as one known as expert
system [3].
In (2014) an Expert System was invented which along with
the risk score calculation module helped to analyze,
correspond and determine the threat level related with
current transaction on an Electronic-commerce website [4].
With the help of drool’s tool an expert system known as
OPENSKe was developed. In this input data was given to
system to identify and vulnerability [5].
Kerim Goztepe (2012) developed a Cyber security expert
system based on fuzzy rule. Main segment in this was
collection of data, stating variables i.e. insertion of data,
retrieval of data and then execution [6].
D. Welch proposed attacks on wireless network
classification. This was developed on the safety principles
that infect and their solutions. For instance threat defying
integrity, availability and confidentiality [7].
2.2 Application of Artificial Neural Network
Neural Network also known as deep learning. Frank
Rosenblatt in 1957 lays the foundation of neural network
with the invention of artificial neuroncalledperceptron[15].
These perceptron can combine with other perceptron to
make neural networks. In neural network perceptroncan be
millions in number [8].
It is cited by Shaiqua Jabeen et al. [9] that artificial neural
network simulates the processing of the brain by learning
things on its own, by interpreting logics, devising logics and
by proposing solutions. Artificial neural network has
multilayer architecture in which theoutputproducedby one
layer of perceptron is given to another layer of perceptron.
Host based intrusion detection is proposedbyDevikrishna K
S et. al [10] they have proposed that during training phase
various patterns are fed into the network and their
associated output are recognized by the system. Neural
network works by recognizing patterns that are already fed
into its memory. It interprets logic by recognizing the
patterns and by comparing it with the already learnt logic
and tries to find the similarities in the input and already fed
patterns.
Detecting cyber assaults using neural network is more
advantageous as it is pretty fast in detecting the anomaly or
intrusion .Because protection of computer network means
timely detection of intrusion attempts so that harm to
system could be minimized [10][2].
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1467
Devikrishna K S et.al (2013) introduced A Multi-Layer
Perception for intrusion detection using Knowledge
discovery in Database (KDD) for categorization of attacks
[10].
It is cited by Nabil EL KADHI at el. [11] that the most widely
used application of neural network is Intrusion Detection
and Prevention System (IDPS) in which Neural network
could be uses to detect cyber-crimes. In which ANN will
learn all the possible attack agents and techniques in its
training phase and adjusts its weights accordinglyaccording
to incoming input. Once training phase iscompleted,itistest
by linking ANN to an in use network and corresponding
output is generated which is an estimated estimation
between 0 and 1.
Linda (2009) proposed a IDS based on Neural Network
which uses a certain integration of two artificial neural
network algorithms. Experimental results demonstrating
that IDS-NNM algorithm having capability of catching all
intrusion trials presentedontheintegratednetwork without
generating any incorrect or untrue alerts [12].
Iftikhar (2009) designed a system based on ANN to detect
probing attacks. It adopted a supervised neural network
phenomenon to inspect the viability of an approach to
investigate attacks that could be the basis of further attacks
in network system. The system which is developedisused to
find out different attacks during investigation and while
comparing its performance with different neural networks‟
results indicate that approach based on Multiple Layered
Perceptron (MLP) architecture is more precise and accurate
and it shows most favourable results in contrast to other
methods [13].
Barika (2009) proposed a comprehensive architecture of
intrusion detection system based on ANN architecture for
decision making within IDS with more efficiency [14].
2.3 Application of Intelligent System
Intelligent Agent (IA) are those who recognize movement
with sensors and act on an environment using actuatorsand
direct its activity for completing objectives [15].
The intelligent agent properties like mobility, flexibility in
environments they are executed in, and their cooperative
nature, makes them fit for combating cyber crimes [16].
Rowe (2003) invented a tool to orderly counter plan the
methods to prevent specific cyber attack plans by using
multi-agent planning [17].
Helano (2006) brought in a system implemented in Prolog
which is a combination based on a (MAS) multi-agent
systems approach with a operable case used todefendcyber
attacks and with the capability toverifythecharacteristicsof
cyber attacks [18].
Gou (2006) proposed Multi Agent System for Computer
Worm Detection (MWDCM) and curbing in MANs, which
spontaneously has the generation of worms which disuse a
mass of network transmission capacity and crashes the
router. Researchesillustratedthatthesystem efficientlycurb
worm transmission [19].
Edwards (2007) proposed the potency of intelligent agent
techniques for enhancing the activity of power grids,
thwarting known crimes and rationalize their results. They
proposed a Multi Layered Security Model (MLSM)prototype
that gives defense from invalid input and capability to find
and retrieve from unknown crime techniques [20].
Kotenko et al. (2010) researched multi-agent based
progresses to the examination and protection against
botnets which are increasingly growing across the network
and being use to curb numerous cyber attackslikeexecuting
vulnerability scans, distributedDenial ofServiceattacks,and
sending large number of spam mails. They outlined the
infrastructure and execution attributesofsuchsystems[21].
3. CONCLUSIONS AND FUTURE WORK
As we live in a modernized world, most of our everyday
communications and commercial activitiestakeplacevia the
Internet. However, it also causes issues which are hard to
handle such as the emergence of cyber-attacks on computer
networks. At handacademicresourcesshowthatAImethods
already have various implementation to tackle cybercrimes.
This paper concisely introduced possibilities of AI
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1468
techniques so far in cyber field for combating cyber crimes
and their current limitations [16].
With the enhancement of technology day by day hackersare
also growing smart. May be in futurehackersalsotriesto use
the various ways of artificial intelligence to break into
network or system.
In future we look forward to realize a part of the cyber
defense structure (CDS) with thehelpofprogrammablelogic
arrays. Such means of solving an intrusion detection
problem, unlike the software protection, will enable to
remove the impact of the software intrusions on the Cyber
defense structure [22].
REFERENCES
[1] Cheshta Rani , Shivani Goel. An Expert System for Cyber
Security Attack Awareness, International Conference on
Computing, Communication and Automation (ICCCA2015)
ISBN:978-1-4799-8890-7/15/$31.00 ©2015 IEEE 242
CSAAES.
[2] A. S. Poonia, A. Bhardwaj, G. S. Dangayach, (2011) “Cyber
Crime: Practices and Policies for Its Prevention”, The First
International Conference on Interdisciplinary Research and
Development, Special No. of the International Journal of the
Computer, the Internet and Management, Vol. 19, No. SP1.
[3] Dr. Sunil Bhutada,Preeti Bhutada.ApplicationsofArtificial
Intelligence in Cyber security International Journal of
Engineering Research in Computer Science and Engineering
(IJERCSE) Vol 5, Issue 4, April 2018 All Rights Reserved ©
2018 IJERCSE 214 .
[4] NIKITA RANA, SHIVANI DHAR,PRIYANKA JAGDALE,
NIKHIL JAVALKAR. Implementation of An Expert Systemfor
the Enhancement of E-Commerce Security International
Journal of Advances in Science Engineering and Technology,
ISSN: 2321-9009 Volume- 2, Issue-3, July-2014
[5] M.M. Gamal, B. Hasan, and A.F. Hegazy, “A Security
Analysis Framework Powered by an Expert System,”
International Journal of Computer Science and Security
(IJCSS), Vol. 4, no. 6, pp. 505-527, Feb. 2011.
[6] K. Goztepe, “Designing a Fuzzy Rule BasedExpertSystem
for Cyber Security,” International Journal Of Information
Security Science, vol.1, no.1, 2012 .
[7] D. Welch, “Wireless Security Threat Taxonomy,”
Information Assurance Workshop. IEEE Systems, Man and
Cybernetics Society, pp 76-83, June 2003.
[8] Vidushi Sharma ,Sachin Rai, Anurag Dev” A
Comprehensive Study of Artificial Neural Networks”
International Journal of Advanced Research in Computer
Science and Software Engineering Volume 2, Issue 10,
October 2012.
[9] Shaiqua Jabeen , Shobhana D. Patil, Shubhangi V. Bhosale
, Bharati M. Chaudhari, Prafulla S. Patil” A Study on Basics of
Neural Network” International Journal of Innovative
Research in Computer and Communication Engineering Vol.
5, Issue 4, April 2017.
[10] Devikrishna K S, Ramakrishna B B “An Artificial Neural
Network basedIntrusionDetection SystemandClassification
of Attacks”International Journal ofEngineeringResearchand
Applications (IJERA) Vol. 3, Issue 4, Jul-Aug 2013, pp. 1959-
1964.
[11] Nabil EL KADHI, Karim HADJAR, Nahla EL ZANT ” A
Mobile Agents and Artificial Neural Networks for Intrusion
Detection” JOURNAL OF SOFTWARE,VOL.7,NO.1, JANUARY
2012.
[12] Linda Ondrej, T. Vollmer, M. Manic, (2009) “Neural
Network Based Intrusion Detection System for Critical
Infrastructures”, Proceedings of International Joint
Conference on Neural Networks, pp. 1827 1834.
[13] A. Iftikhar, B.A. Azween, A. S. Alghamdi, (2009)
“Application of artificial neural network in detection of dos
attacks,” Proceedings of the 2nd ACM international
conference on Security of information and networks, pp.
229–234.
[14] F. Barika, K. Hadjar, N. El-Kadhi, (2009) “Artificial
neural network for mobile IDS solution”,Security and
Management, pp. 271–277.
[15] Arockia Panimalar.S, Giri Pai.U, Salman Khan.K
“ARTIFICIAL INTELLIGENCE TECHNIQUES FOR CYBER
SECURITY” International Research Journal of Engineering
and Technology (IRJET)Volume: 05 Issue: 03 | Mar-2018 .
[16] Jyothsna S Mohan, Nilina ,”Prospects of Artificial
Intelligence in Tackling Cyber Crimes” International Journal
of Science and Research (IJSR) Volume 4 Issue 6, June 2015.
[17] IEEE Workshop on Information Assurance,pp.203210.
[18] José Helan and Matos Nogueira, ”Mobile Intelligent
Agents to Fight Cyber Intrusions”, International Journal of
Forensic Computer Science , IJoFCS, pp 28-32,2006.
[19] X. Gou, W. Jin, D. Zhao, (2006) "Multi-agent system for
worm detection and containment in metropolitan area
networks", Journal of Electronics, Vol. 23,No.2,pp.259-265.
[20] D. Edwards, S. Simmons, N. Wilde, (2007) “Prevention,
Detection and Recovery from Cyber-Attacks Using a
Multilevel Agent Architecture”, IEEE International
Conference on SystemofSystemsEngineering(SoSE'07),pp.
1 – 6.
[21] I. Kotenko, A. Konovalov, A.Shorov, (2010) “Agent-
Based modeling and Simulation of Botnets and Botnet
Defence”, Proceeding of Conference on Cyber Conflict (CCD
COE).
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1469
[22] Myroslav Komar,AnatoliySachenko,SergeiBezobrazov,
Vladimir Golovko Intelligent Cyber Defense System
ICTERI,2016.
BIOGRAPHIES
“Kushagra Pal is pursuing
MBA(Tech.) with specialization in
Information Technology from
Mukesh Patel School ofTechnology
Management and Engineering
,Narsee Monjee Institute of
Management Studies , Mumbai ,
Maharashtra , India”
“Roopam Tiwari is pursuing
MBA(Tech.) with specialization in
Information Technology from
Mukesh Patel School ofTechnology
Management and Engineering
,Narsee Monjee Institute of
Management Studies , Mumbai,
Maharashtra , India”
“Shivam Maheshwary is pursuing
MBA(Tech.) with specialization in
Information Technology from
Mukesh Patel School ofTechnology
Management and Engineering
,Narsee Monjee Institute of
Management Studies , Mumbai ,
Maharashtra , India”

More Related Content

What's hot

Integrated Framework for Secure and Energy Efficient Communication System in ...
Integrated Framework for Secure and Energy Efficient Communication System in ...Integrated Framework for Secure and Energy Efficient Communication System in ...
Integrated Framework for Secure and Energy Efficient Communication System in ...
IJECEIAES
 
n-Tier Modelling of Robust Key management for Secure Data Aggregation in Wire...
n-Tier Modelling of Robust Key management for Secure Data Aggregation in Wire...n-Tier Modelling of Robust Key management for Secure Data Aggregation in Wire...
n-Tier Modelling of Robust Key management for Secure Data Aggregation in Wire...
IJECEIAES
 
Constructing a predictive model for an intelligent network intrusion detection
Constructing a predictive model for an intelligent network intrusion detectionConstructing a predictive model for an intelligent network intrusion detection
Constructing a predictive model for an intelligent network intrusion detection
Alebachew Chiche
 
International Journal of Computer Science and Security Volume (2) Issue (1)
International Journal of Computer Science and Security Volume (2) Issue (1)International Journal of Computer Science and Security Volume (2) Issue (1)
International Journal of Computer Science and Security Volume (2) Issue (1)
CSCJournals
 
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATIONNETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
IJITE
 
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
Eswar Publications
 
V 14 15432 8feb 27jan 6sep18 ch
V 14 15432 8feb 27jan 6sep18 chV 14 15432 8feb 27jan 6sep18 ch
V 14 15432 8feb 27jan 6sep18 ch
IJECEIAES
 
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
ijcsa
 
Soft computing and artificial intelligence techniques for intrusion
Soft computing and artificial intelligence techniques for intrusionSoft computing and artificial intelligence techniques for intrusion
Soft computing and artificial intelligence techniques for intrusion
Alexander Decker
 
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
IRJET Journal
 
An approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithmAn approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithm
eSAT Publishing House
 
An approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithmAn approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithm
eSAT Journals
 
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SETCLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
IJNSA Journal
 
A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...
A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...
A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...
Radita Apriana
 
A05510105
A05510105A05510105
A05510105
IOSR-JEN
 
Paper id 212014100
Paper id 212014100Paper id 212014100
Paper id 212014100
IJRAT
 
Wmn06MODERNIZED INTRUSION DETECTION USING ENHANCED APRIORI ALGORITHM
Wmn06MODERNIZED INTRUSION DETECTION USING  ENHANCED APRIORI ALGORITHM Wmn06MODERNIZED INTRUSION DETECTION USING  ENHANCED APRIORI ALGORITHM
Wmn06MODERNIZED INTRUSION DETECTION USING ENHANCED APRIORI ALGORITHM
ijwmn
 
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksMulti-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
IDES Editor
 

What's hot (18)

Integrated Framework for Secure and Energy Efficient Communication System in ...
Integrated Framework for Secure and Energy Efficient Communication System in ...Integrated Framework for Secure and Energy Efficient Communication System in ...
Integrated Framework for Secure and Energy Efficient Communication System in ...
 
n-Tier Modelling of Robust Key management for Secure Data Aggregation in Wire...
n-Tier Modelling of Robust Key management for Secure Data Aggregation in Wire...n-Tier Modelling of Robust Key management for Secure Data Aggregation in Wire...
n-Tier Modelling of Robust Key management for Secure Data Aggregation in Wire...
 
Constructing a predictive model for an intelligent network intrusion detection
Constructing a predictive model for an intelligent network intrusion detectionConstructing a predictive model for an intelligent network intrusion detection
Constructing a predictive model for an intelligent network intrusion detection
 
International Journal of Computer Science and Security Volume (2) Issue (1)
International Journal of Computer Science and Security Volume (2) Issue (1)International Journal of Computer Science and Security Volume (2) Issue (1)
International Journal of Computer Science and Security Volume (2) Issue (1)
 
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATIONNETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
 
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
 
V 14 15432 8feb 27jan 6sep18 ch
V 14 15432 8feb 27jan 6sep18 chV 14 15432 8feb 27jan 6sep18 ch
V 14 15432 8feb 27jan 6sep18 ch
 
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
 
Soft computing and artificial intelligence techniques for intrusion
Soft computing and artificial intelligence techniques for intrusionSoft computing and artificial intelligence techniques for intrusion
Soft computing and artificial intelligence techniques for intrusion
 
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
 
An approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithmAn approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithm
 
An approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithmAn approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithm
 
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SETCLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
 
A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...
A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...
A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...
 
A05510105
A05510105A05510105
A05510105
 
Paper id 212014100
Paper id 212014100Paper id 212014100
Paper id 212014100
 
Wmn06MODERNIZED INTRUSION DETECTION USING ENHANCED APRIORI ALGORITHM
Wmn06MODERNIZED INTRUSION DETECTION USING  ENHANCED APRIORI ALGORITHM Wmn06MODERNIZED INTRUSION DETECTION USING  ENHANCED APRIORI ALGORITHM
Wmn06MODERNIZED INTRUSION DETECTION USING ENHANCED APRIORI ALGORITHM
 
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksMulti-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
 

Similar to IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaults: A Review

FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
IJNSA Journal
 
Detecting network attacks model based on a convolutional neural network
Detecting network attacks model based on a convolutional neural network Detecting network attacks model based on a convolutional neural network
Detecting network attacks model based on a convolutional neural network
IJECEIAES
 
Evaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chainEvaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chain
IJCI JOURNAL
 
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
IJNSA Journal
 
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
IJNSA Journal
 
A honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network securityA honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network security
IAEME Publication
 
Intrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIntrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural Network
IOSR Journals
 
A Back Propagation Neural Network Intrusion Detection System Based on KVM
A Back Propagation Neural Network Intrusion Detection System Based on KVMA Back Propagation Neural Network Intrusion Detection System Based on KVM
A Back Propagation Neural Network Intrusion Detection System Based on KVM
International Journal of Innovation Engineering and Science Research
 
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
IRJET Journal
 
IRJET- Improving Cyber Security using Artificial Intelligence
IRJET- Improving Cyber Security using Artificial IntelligenceIRJET- Improving Cyber Security using Artificial Intelligence
IRJET- Improving Cyber Security using Artificial Intelligence
IRJET Journal
 
An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...
IJECEIAES
 
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIER
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIERATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIER
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIER
CSEIJJournal
 
Attack Detection Availing Feature Discretion using Random Forest Classifier
Attack Detection Availing Feature Discretion using Random Forest ClassifierAttack Detection Availing Feature Discretion using Random Forest Classifier
Attack Detection Availing Feature Discretion using Random Forest Classifier
CSEIJJournal
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
Eswar Publications
 
Implementing a Robust Network-Based Intrusion Detection System
Implementing a Robust Network-Based Intrusion Detection SystemImplementing a Robust Network-Based Intrusion Detection System
Implementing a Robust Network-Based Intrusion Detection System
theijes
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...
eSAT Publishing House
 
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SETCLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
IJNSA Journal
 
Intrusion Detection System Using Face Recognition
Intrusion Detection System Using Face RecognitionIntrusion Detection System Using Face Recognition
Intrusion Detection System Using Face Recognition
IRJET Journal
 
Three level intrusion detection system based on conditional generative advers...
Three level intrusion detection system based on conditional generative advers...Three level intrusion detection system based on conditional generative advers...
Three level intrusion detection system based on conditional generative advers...
IJECEIAES
 
A survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing TechniqueA survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing Technique
ijsrd.com
 

Similar to IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaults: A Review (20)

FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
 
Detecting network attacks model based on a convolutional neural network
Detecting network attacks model based on a convolutional neural network Detecting network attacks model based on a convolutional neural network
Detecting network attacks model based on a convolutional neural network
 
Evaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chainEvaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chain
 
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
 
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
 
A honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network securityA honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network security
 
Intrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIntrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural Network
 
A Back Propagation Neural Network Intrusion Detection System Based on KVM
A Back Propagation Neural Network Intrusion Detection System Based on KVMA Back Propagation Neural Network Intrusion Detection System Based on KVM
A Back Propagation Neural Network Intrusion Detection System Based on KVM
 
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
 
IRJET- Improving Cyber Security using Artificial Intelligence
IRJET- Improving Cyber Security using Artificial IntelligenceIRJET- Improving Cyber Security using Artificial Intelligence
IRJET- Improving Cyber Security using Artificial Intelligence
 
An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...
 
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIER
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIERATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIER
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIER
 
Attack Detection Availing Feature Discretion using Random Forest Classifier
Attack Detection Availing Feature Discretion using Random Forest ClassifierAttack Detection Availing Feature Discretion using Random Forest Classifier
Attack Detection Availing Feature Discretion using Random Forest Classifier
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
 
Implementing a Robust Network-Based Intrusion Detection System
Implementing a Robust Network-Based Intrusion Detection SystemImplementing a Robust Network-Based Intrusion Detection System
Implementing a Robust Network-Based Intrusion Detection System
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...
 
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SETCLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
 
Intrusion Detection System Using Face Recognition
Intrusion Detection System Using Face RecognitionIntrusion Detection System Using Face Recognition
Intrusion Detection System Using Face Recognition
 
Three level intrusion detection system based on conditional generative advers...
Three level intrusion detection system based on conditional generative advers...Three level intrusion detection system based on conditional generative advers...
Three level intrusion detection system based on conditional generative advers...
 
A survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing TechniqueA survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing Technique
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
shahdabdulbaset
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
NazakatAliKhoso2
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
LAXMAREDDY22
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
amsjournal
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
sachin chaurasia
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
MiscAnnoy1
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
mamamaam477
 

Recently uploaded (20)

KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
 

IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaults: A Review

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1466 IMPLEMENTATION OF ARTIFICIAL INTELLIGENCE METHODS TO CURB CYBER ASSAULTS: A REVIEW Kushagra Pal1, Roopam Tiwari2, Shivam Maheshwary3 1,2,3 Department of Information Technology SVKM’S NMIMS MPSTME, Mumbai, Maharashtra, India, ------------------------------------------------------------------------***------------------------------------------------------------------------- Abstract - With the advancement intechnology, attackersare making use of cyberspace to perform various cyber attacks. Cyber frameworks are highly sensitive to intrusion as well as many other threats. As every workplaces now a days are connected to some network in one way or another leads to heavy traffic or network congestion, more security attack attempts and security breaches. Weneedtohavesecurityfrom these attacks. The treatment of various attacks is also accessible, but the approach to find which system is being attacked is difficult. This paper providesan introductionofthe Cyber Security techniques and how Artificial Intelligence (AI) could help in solving the cyber security problems. Italsoshows the work done in the area of Artificial Intelligence for fighting against cyber assaults. Key Words: Artificial Intelligence (AI), Expert System, Artificial Neural Network (ANN), Intelligent System, Intrusion Detection System (IDS) 1. INTRODUCTION Cyber crimes are not limited to a particular area but is extended over every part of computer network across the globe. Advancement of technology are making attackers more advance in cyber crimes as they are also using the modern techniques to break into the network. The attackers identify the susceptibility existing in the Operating System, system application and operate that to damage the system [1]. Only human involvement cannot curb these threats. Traditional security methods and algorithms cannot alone put curb on the cyber-crimes so there is the need of artificial intelligence techniques to prevent cyber-crimes. Artificial intelligence is widely used in industries to collect data and information. With the use of AI techniquesthatdata couldbe processed into meaningful information which could be used to prevent cyber assaults [2]. AI provides various techniques such as Expert System, Intelligent Agents, Neural Networks, Pattern Recognition, Machine Learning, Artificial Immune Systems, etc. 2. ARTIFICIAL INTELLIGENCE TECHNIQUES FOR CYBER SECURITY 2.1 Application of Expert System Expert system has a knowledge base, in which all the factual and heuristic knowledge is stored. It also has an inference engine for interpreting answers relevant to the information and, likely extra information about a scenario. Knowledge base and inference engine are as one known as expert system [3]. In (2014) an Expert System was invented which along with the risk score calculation module helped to analyze, correspond and determine the threat level related with current transaction on an Electronic-commerce website [4]. With the help of drool’s tool an expert system known as OPENSKe was developed. In this input data was given to system to identify and vulnerability [5]. Kerim Goztepe (2012) developed a Cyber security expert system based on fuzzy rule. Main segment in this was collection of data, stating variables i.e. insertion of data, retrieval of data and then execution [6]. D. Welch proposed attacks on wireless network classification. This was developed on the safety principles that infect and their solutions. For instance threat defying integrity, availability and confidentiality [7]. 2.2 Application of Artificial Neural Network Neural Network also known as deep learning. Frank Rosenblatt in 1957 lays the foundation of neural network with the invention of artificial neuroncalledperceptron[15]. These perceptron can combine with other perceptron to make neural networks. In neural network perceptroncan be millions in number [8]. It is cited by Shaiqua Jabeen et al. [9] that artificial neural network simulates the processing of the brain by learning things on its own, by interpreting logics, devising logics and by proposing solutions. Artificial neural network has multilayer architecture in which theoutputproducedby one layer of perceptron is given to another layer of perceptron. Host based intrusion detection is proposedbyDevikrishna K S et. al [10] they have proposed that during training phase various patterns are fed into the network and their associated output are recognized by the system. Neural network works by recognizing patterns that are already fed into its memory. It interprets logic by recognizing the patterns and by comparing it with the already learnt logic and tries to find the similarities in the input and already fed patterns. Detecting cyber assaults using neural network is more advantageous as it is pretty fast in detecting the anomaly or intrusion .Because protection of computer network means timely detection of intrusion attempts so that harm to system could be minimized [10][2].
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1467 Devikrishna K S et.al (2013) introduced A Multi-Layer Perception for intrusion detection using Knowledge discovery in Database (KDD) for categorization of attacks [10]. It is cited by Nabil EL KADHI at el. [11] that the most widely used application of neural network is Intrusion Detection and Prevention System (IDPS) in which Neural network could be uses to detect cyber-crimes. In which ANN will learn all the possible attack agents and techniques in its training phase and adjusts its weights accordinglyaccording to incoming input. Once training phase iscompleted,itistest by linking ANN to an in use network and corresponding output is generated which is an estimated estimation between 0 and 1. Linda (2009) proposed a IDS based on Neural Network which uses a certain integration of two artificial neural network algorithms. Experimental results demonstrating that IDS-NNM algorithm having capability of catching all intrusion trials presentedontheintegratednetwork without generating any incorrect or untrue alerts [12]. Iftikhar (2009) designed a system based on ANN to detect probing attacks. It adopted a supervised neural network phenomenon to inspect the viability of an approach to investigate attacks that could be the basis of further attacks in network system. The system which is developedisused to find out different attacks during investigation and while comparing its performance with different neural networks‟ results indicate that approach based on Multiple Layered Perceptron (MLP) architecture is more precise and accurate and it shows most favourable results in contrast to other methods [13]. Barika (2009) proposed a comprehensive architecture of intrusion detection system based on ANN architecture for decision making within IDS with more efficiency [14]. 2.3 Application of Intelligent System Intelligent Agent (IA) are those who recognize movement with sensors and act on an environment using actuatorsand direct its activity for completing objectives [15]. The intelligent agent properties like mobility, flexibility in environments they are executed in, and their cooperative nature, makes them fit for combating cyber crimes [16]. Rowe (2003) invented a tool to orderly counter plan the methods to prevent specific cyber attack plans by using multi-agent planning [17]. Helano (2006) brought in a system implemented in Prolog which is a combination based on a (MAS) multi-agent systems approach with a operable case used todefendcyber attacks and with the capability toverifythecharacteristicsof cyber attacks [18]. Gou (2006) proposed Multi Agent System for Computer Worm Detection (MWDCM) and curbing in MANs, which spontaneously has the generation of worms which disuse a mass of network transmission capacity and crashes the router. Researchesillustratedthatthesystem efficientlycurb worm transmission [19]. Edwards (2007) proposed the potency of intelligent agent techniques for enhancing the activity of power grids, thwarting known crimes and rationalize their results. They proposed a Multi Layered Security Model (MLSM)prototype that gives defense from invalid input and capability to find and retrieve from unknown crime techniques [20]. Kotenko et al. (2010) researched multi-agent based progresses to the examination and protection against botnets which are increasingly growing across the network and being use to curb numerous cyber attackslikeexecuting vulnerability scans, distributedDenial ofServiceattacks,and sending large number of spam mails. They outlined the infrastructure and execution attributesofsuchsystems[21]. 3. CONCLUSIONS AND FUTURE WORK As we live in a modernized world, most of our everyday communications and commercial activitiestakeplacevia the Internet. However, it also causes issues which are hard to handle such as the emergence of cyber-attacks on computer networks. At handacademicresourcesshowthatAImethods already have various implementation to tackle cybercrimes. This paper concisely introduced possibilities of AI
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1468 techniques so far in cyber field for combating cyber crimes and their current limitations [16]. With the enhancement of technology day by day hackersare also growing smart. May be in futurehackersalsotriesto use the various ways of artificial intelligence to break into network or system. In future we look forward to realize a part of the cyber defense structure (CDS) with thehelpofprogrammablelogic arrays. Such means of solving an intrusion detection problem, unlike the software protection, will enable to remove the impact of the software intrusions on the Cyber defense structure [22]. REFERENCES [1] Cheshta Rani , Shivani Goel. An Expert System for Cyber Security Attack Awareness, International Conference on Computing, Communication and Automation (ICCCA2015) ISBN:978-1-4799-8890-7/15/$31.00 ©2015 IEEE 242 CSAAES. [2] A. S. Poonia, A. Bhardwaj, G. S. Dangayach, (2011) “Cyber Crime: Practices and Policies for Its Prevention”, The First International Conference on Interdisciplinary Research and Development, Special No. of the International Journal of the Computer, the Internet and Management, Vol. 19, No. SP1. [3] Dr. Sunil Bhutada,Preeti Bhutada.ApplicationsofArtificial Intelligence in Cyber security International Journal of Engineering Research in Computer Science and Engineering (IJERCSE) Vol 5, Issue 4, April 2018 All Rights Reserved © 2018 IJERCSE 214 . [4] NIKITA RANA, SHIVANI DHAR,PRIYANKA JAGDALE, NIKHIL JAVALKAR. Implementation of An Expert Systemfor the Enhancement of E-Commerce Security International Journal of Advances in Science Engineering and Technology, ISSN: 2321-9009 Volume- 2, Issue-3, July-2014 [5] M.M. Gamal, B. Hasan, and A.F. Hegazy, “A Security Analysis Framework Powered by an Expert System,” International Journal of Computer Science and Security (IJCSS), Vol. 4, no. 6, pp. 505-527, Feb. 2011. [6] K. Goztepe, “Designing a Fuzzy Rule BasedExpertSystem for Cyber Security,” International Journal Of Information Security Science, vol.1, no.1, 2012 . [7] D. Welch, “Wireless Security Threat Taxonomy,” Information Assurance Workshop. IEEE Systems, Man and Cybernetics Society, pp 76-83, June 2003. [8] Vidushi Sharma ,Sachin Rai, Anurag Dev” A Comprehensive Study of Artificial Neural Networks” International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 10, October 2012. [9] Shaiqua Jabeen , Shobhana D. Patil, Shubhangi V. Bhosale , Bharati M. Chaudhari, Prafulla S. Patil” A Study on Basics of Neural Network” International Journal of Innovative Research in Computer and Communication Engineering Vol. 5, Issue 4, April 2017. [10] Devikrishna K S, Ramakrishna B B “An Artificial Neural Network basedIntrusionDetection SystemandClassification of Attacks”International Journal ofEngineeringResearchand Applications (IJERA) Vol. 3, Issue 4, Jul-Aug 2013, pp. 1959- 1964. [11] Nabil EL KADHI, Karim HADJAR, Nahla EL ZANT ” A Mobile Agents and Artificial Neural Networks for Intrusion Detection” JOURNAL OF SOFTWARE,VOL.7,NO.1, JANUARY 2012. [12] Linda Ondrej, T. Vollmer, M. Manic, (2009) “Neural Network Based Intrusion Detection System for Critical Infrastructures”, Proceedings of International Joint Conference on Neural Networks, pp. 1827 1834. [13] A. Iftikhar, B.A. Azween, A. S. Alghamdi, (2009) “Application of artificial neural network in detection of dos attacks,” Proceedings of the 2nd ACM international conference on Security of information and networks, pp. 229–234. [14] F. Barika, K. Hadjar, N. El-Kadhi, (2009) “Artificial neural network for mobile IDS solution”,Security and Management, pp. 271–277. [15] Arockia Panimalar.S, Giri Pai.U, Salman Khan.K “ARTIFICIAL INTELLIGENCE TECHNIQUES FOR CYBER SECURITY” International Research Journal of Engineering and Technology (IRJET)Volume: 05 Issue: 03 | Mar-2018 . [16] Jyothsna S Mohan, Nilina ,”Prospects of Artificial Intelligence in Tackling Cyber Crimes” International Journal of Science and Research (IJSR) Volume 4 Issue 6, June 2015. [17] IEEE Workshop on Information Assurance,pp.203210. [18] José Helan and Matos Nogueira, ”Mobile Intelligent Agents to Fight Cyber Intrusions”, International Journal of Forensic Computer Science , IJoFCS, pp 28-32,2006. [19] X. Gou, W. Jin, D. Zhao, (2006) "Multi-agent system for worm detection and containment in metropolitan area networks", Journal of Electronics, Vol. 23,No.2,pp.259-265. [20] D. Edwards, S. Simmons, N. Wilde, (2007) “Prevention, Detection and Recovery from Cyber-Attacks Using a Multilevel Agent Architecture”, IEEE International Conference on SystemofSystemsEngineering(SoSE'07),pp. 1 – 6. [21] I. Kotenko, A. Konovalov, A.Shorov, (2010) “Agent- Based modeling and Simulation of Botnets and Botnet Defence”, Proceeding of Conference on Cyber Conflict (CCD COE).
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1469 [22] Myroslav Komar,AnatoliySachenko,SergeiBezobrazov, Vladimir Golovko Intelligent Cyber Defense System ICTERI,2016. BIOGRAPHIES “Kushagra Pal is pursuing MBA(Tech.) with specialization in Information Technology from Mukesh Patel School ofTechnology Management and Engineering ,Narsee Monjee Institute of Management Studies , Mumbai , Maharashtra , India” “Roopam Tiwari is pursuing MBA(Tech.) with specialization in Information Technology from Mukesh Patel School ofTechnology Management and Engineering ,Narsee Monjee Institute of Management Studies , Mumbai, Maharashtra , India” “Shivam Maheshwary is pursuing MBA(Tech.) with specialization in Information Technology from Mukesh Patel School ofTechnology Management and Engineering ,Narsee Monjee Institute of Management Studies , Mumbai , Maharashtra , India”