INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 9, ISSUE 10, OCTOBER 2020
ISSN 2277-8616
Survey On The Applications Of Artificial
Intelligence In Cyber Security
Shidawa Baba Atiku, Achi Unimke Aaron, Goteng Kuwunidi Job, Fatima Shittu, Ismail Zahraddeen Yakubu
Abstract: the rise in cyber attacks has overwhelmed the monetary resources and human ability to analyze and combat every new form of cyber threat in
the cyber security industry. With the increasing digital presence, there is a large amount of personal and financial information that should be protected
from cyber attacks. In fact, cyber attacks can ruin the reputation of an organization or letdown the organization completely. This research examines the
use of AI in the enhancement of cyber security. Recent developments in artificial intelligence are transformational and have exceeded the level of human
performance in tasks such as data analytics. The study adopted the thematic literature review method, and data were sourced from Google scholar,
science direct, research gates, academia, and others. The investigation revealed that application of AI in controlling cyber attack has advantages and
disadvantages; however, the advantages outweigh the disadvantages. This researcher discovers that with the speedy and efficient technology required
to operate AI systems, they are likely to improve the protection of customers and businesses in the cyberspace. This is proven by the increasing
deployment of AI engines rather than conventional scanning engines in cyber security.
Index Terms: Artificial Intelligence (AI), AI Engines, Cyber Attacks, Cyber Security, Deep Learning (DL), Machine Learning (ML), Scanning Engine
————————————————————
1. INTRODUCTION
Cyber security is concerned with devising shield methods that
safeguard computing infrastructures, networks, applications
and data against illegitimate access, modification or
vandalism [5]. It also involves a collection of methods applied
to safe guard the integrity of system networks, applications,
and stored information against damage, illegitimate access
and assault by cyberpunk [12]. As information and
communication technology (ICT) advances, new threats are
emerging and changing rapidly. AI, which concerns the
science and engineering of making machines intelligent [13],
has continued to grow significantly, and it is influencing all
aspects of business and life [5]. AI is bringing gains to areas
like gaming, manufacturing, health industries, education,
natural language processing, and many more. These gains
are experienced in cyber security as AI is used for both attack
and defense in the cyberspace. The fields of cyber security
and AI, which were thought of as separate fields, are
increasingly being developed to relate in areas like programs
creation which attempts to fix data leakage and improve
systems security as attackers focus on mimicking the
legitimate processing at human client level among others [1].
Cyber-attacks are growing in amount and complexity;
however, what is more worrisome to companies and
organizations is their lack of readiness especially from
business perspective [2]. It is estimated that the solutions
employed at the endpoint like advanced heuristics and
signature based can provide 85% - 95% protections against
cyber attack [3]. Cybercrime has transited from what was
mostly seen as digital scribbles designed to cause mayhem in
the past to a multibillion dollar universal industry focusing on
peak ranked brands, governments, monetary institutions, and
individuals. Latest research shows that malicious software
————————————————
Corresponding Author: Ismail Zahraddeen Yakubu, Federal Polytechnic,
Bauchi, Bauchi Nigeria, ysbfamily2010@gmail.com
Shidawa Baba Atiku, Directorate of Research, National Institute for
Policy and Strategic Studies, Kuru, Nigeria atikushidawa@gmail.com
Achi Unimke Aaron, Computer Science Department, University of
Nigeria, Nsukka, aaron.achi.pg02692@unn.edu.ng
Goteng Kuwunidi Job, Computer Science Department, Bogoro College of
Education, Bogoro, Bauchi State, kunygoteng@gmail.com
Fatima Shittu, Department of Computer Science, Federal Polytechnic
Damaturu, fsbinta1234@gmail.com
writers see about 1,425% return on investment (ROI) [3]. With
such a profitable trade, it is no shock that these perpetrators
will consistently explore novel techniques to compromise
systems; hence, pressure the cyber security industry to
unfold rapidly to forecast and contravene novel threats. The
scope of cyber security and AI usage continues to expand
largely due to the proliferation of the internet. Hackers get
smarter and innovative in creating malicious software to
exploit individuals, organizations and governments. These
attacks can be in the form of phishing, passwords attacks,
virus attacks etc. where conventional security methods may
be inadequate. The introduction of AI tends to promote cyber
security [4]. AI systems can help, not only in threats
detection, but also in taking proactive actions against cyber
attacks like to sort and categorize events and threats which
eventually relief technicians from repetitive tasks [6]. This
investigation captures a brief background of AI in the field of
cyber security and its application in cyber security, with
narrative literature reviews on the different threats handled by
different AI methods. The subsequent sections of this paper
are arranged as follows: Section 2 presents the research
methodology used at the conduct of the study. Section 3
presents the recent trends of AI in cyber security. Section 4
highlights some AI methods used for cyber security. Section 5
provides some of the benefits and challenges of AI
application in the field of cyber security. In Section 6, the
discussion of the study is presented. Section 7 presents new
perspective for future research. Finally section 8 is the
conclusion.
2. RESEARCH METHODOLOGY
This study adopted the thematic literature review
methodology. The literature search was guided by using
keywords and keywords mix related to the topic to retrieve
relevant materials from the following databases: Google
scholar, Science Direct, Research Gates and Academia.
Secondly, only related literatures published within the last five
years were considered because this paper aims to present an
overview of recent developments of Artificial Intelligence
applications in the area of cyber security. Manuscripts
published later than five years but had novel approaches
were selected. Manuscripts with more than five citations were
selected also. The following sets of materials were ruled out:
165
IJSTR©2020
www.ijstr.org
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 9, ISSUE 10, OCTOBER 2020
papers with subject title not within the scope of this study,
papers not written in English, books and patent documents.
We scrutinize the abstract as well as the conclusion sections
of the consulted materials for pertinent information. According
to this step, a confirmation check was done from classified
papers against the key phrase in the topic of the paper which
is AI application in cyber security. Thus, papers adjudged
most relevant to this study were selected.
3. AI IN CYBER SECURITY
The concept of AI was proposed in the year 1956 by John
McCarthy as the science and engineering of producing
intelligent automata, particularly intelligent computer
applications. It is concerned with how to make computers
think, work, learn and behave intelligently like humans [5].
The application of AI now affects several aspects of human
experience such as expert systems, computer vision, pattern
recognition, speech recognition, language translation,
robotics, biometric systems, and internet of things (IoT)
among others [12]. Despite the wide application of AI, human
inference is still needed for monitoring its activities, largely
because it can also be used for destruction [12]. Cybercrime
is now more common, and it threatens the progress of
governments, banks, and multinational companies on a daily
basis through online hacking. AI systems adopt techniques
that can help overcome short comings of traditional cyber
security tools through their flexibility and adaptability [7].
Though AI is already improving cyber security [8], but there
are some critical considerations. Some consider artificial
intelligence as an emergent threat to humanity [9]. This has
raised the concerns of scientists and legal experts about the
growing role self-contained AI applications play in cyberspace
and their ethical justifiability [10]. AI-systems can be altered,
bypassed, and fooled to generate security issues for
applications like network monitoring systems, monetary
systems, as well as self controlled vehicles. Hence, Safe and
resilient methods and robust practices are crucial. In cyber
security, Artificial Intelligence has being applied so far to
promote defenses. According to its strong automation and
data analysis potentiality, AI can be employed to examine
huge volume of data efficiently, accurately, and speedily. An
Artificial Intelligence system detects analogous attacks that
occur in future based on its knowledge and understanding
from past threats, even if the mode of attacks changes [5].
Furthermore, AI systems can ascertain novel and complex
modifications in attack changeability, contend huge amount of
data effectively, and learn to identify threat according to
applications‘ behavior and the entire network activities among
other several advantages [5]. AI practices do well in
interference detection, and they facilitate response to
anonymous threats as they are expected to learn and adapt
to conditions, and are proficient in identifying even the tiniest
changes in network settings; hence they have the potential to
be more prompt than humans when it comes to analyzing
unusual types of cyber-attacks.
4. AI METHODS USED FOR CYBER SECURITY
A huge number of methods were introduced in the field of
Artificial Intelligence to address issues that need intelligence
from human perspective. Some of these methods have
developed and accurate steps based on the existing
methods. These methods are broadly known in application
ISSN 2277-8616
areas such as data mining which surfaced from subfield of
Artificial Intelligence. An overview of this sort may not present
a full study of all practically useful Artificial Intelligence
techniques; instead, the methods and architectures have
been grouped into several divisions: machine learning, neural
networks, intelligent agents, data mining and constraint
solving, expert systems, search. We describe these divisions
and provide references to the applications of individual
approach in cyber security.
4.1 Artificial Neural Networks (ANN)
ANN is a statistical learning model mimicking the structural
and functional behavior of the human brain, first created as a
perception in 1957 by Frank Rosenblatt. ANN has the ability
to learn and solve problems in different complex domains. It
can learn from data in any domain and address absorbing
concerns by merging with disparate nerves.
In cyber
security, ANNs have been used within all four stages of
integrated security approach (a holistic categorization of
cyber defense framework), consisting of early warning phase,
prevention phase, detection phase and reactive/response
phase [14]. ANN can be used to monitor traffic flow in
computer networks when integrated in cyber security, thereby
detecting malicious intrusions before an actual attack [15] and
hindering cyber attacks eventually through perimeter defense
[16]. ANN can learn from previous network activities and
assaults so as to avoid later attacks. When deep learning
(DL) - an advanced form of ANN- is applied to cyber security,
the system can recognize suspicious as well as legal files
with no human intervention. This method produce better
outcome in identifying threats than the conventional methods
applied in cyber defense. The general form of an ANN is
depicted in fig 1 below.
Fig. 1. Artificial Neural Network
ANN‘s main advantages are its capability to identify patterns
in highly non-linear problems and its high speed classification
time [18] unlike manual methods used by security experts
with experience. Artificial Neural Networks are capable of
detecting normal and abnormal network patterns
automatically by using previously transferred data over the
network. ANNs are employed by network security tools like
Firewalls, network hubs and intrusion detection systems to
scan network traffic. Deep neural network (DNN) or deep
learning, which is a more advanced form of ANN with high
computation cost [19], has shown greater advantages as it
does not only protect against cyber attacks, but it also
predicts the occurrence of these attacks. Hardware
improvements have resulted to progressions in data
166
IJSTR©2020
www.ijstr.org
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 9, ISSUE 10, OCTOBER 2020
processing among network resources and improved storage
capacities; hence, making DNN more suitable. New
developments in DNN technology, such as spiking neural
networks that emulate living neurons, provide high application
chances; for example, the usage of field programmable gate
arrays (FPGAs) allows quick development of neural networks
and their adjustments to change threats [16]. A study
demonstrated [20] where a committed Artificial Intelligence
based security program employ DNN methods to predict
cyber attacks, and it showed 85 percent success rate. This
success recorded in DNN is opening up new phase of cyber
security known as cyber attack prediction. The conventional
DL algorithms often used in the field of cyber security [5]
includes: generative adversarial networks (GAN), feed
forward neural networks (FNN), deep belief networks (DBN),
convolution neural networks (CNN), restricted Boltzmann
machines (RBM), stacked autoencoder‘s (SAE), recurrent
neural networks (RNN), and ensemble of DL networks
(EDLN).
4.2 Security Expert Systems
Expert systems are computer software‘s developed to enable
decision support for sophisticated problems within a specific
domain. It consists of a knowledge base which holds
knowledge related to the domain under consideration and an
inference engine for reasoning and finding answers to given
problems [16]. Application areas of expert systems include
medical diagnosis, finances or cyberspace. Expert systems
vary greatly from small to large technical diagnostic systems
and complex hybrid systems in addressing sophisticated
issues. Theoretically, an expert system consists of a
knowledge base where the knowledge about the domain
under consideration is stored and an inference engine for
obtaining response from the knowledge base, and probably,
added knowledge concerning the situation. Expert systems
are used in different problems classes guided by the way
reasoning is done. In a case-based reasoning (CBR)
approach, problem solving is done by recollecting prior like
cases; then a solution is provided by adapting the past
solution to a new problem case. The new solutions are then
evaluated and revised where needed, thereby improving the
accuracy and learning ability of the system. Rule-based
systems (RBS) solve problems by applying rules defined by
experts. Rules consist of the condition part and the action.
Problems are analyzed by first evaluating the condition part;
then the action to be taken is determined. Security expert
system follows a set of guidelines to combat cyber attacks. It
checks the process against the knowledge base; if it is a
good and known process then the security system considers
it safe; otherwise, the system would flag it as a threat or
harmful, and then terminate the process. If there is no such
process in knowledge base, then, the system determines the
state of the machine by applying the sets of rules in inference
engine. The machine state can be severe, moderate or safe.
According to the state of the machine, the system notifies the
manager or the user regarding the status, and then the
inference as detected by the knowledge base.
4.3 Intelligent Agents
Intelligent agent (IA) is a self controlled entity with separate
internal decision-making mechanism and a personal
objective. It observes via sensors and monitors the domain
using actuators and controls its actions towards the
ISSN 2277-8616
achievement of the objectives. Intelligent agents may also
learn or use information to achieve their objectives [17]. They
may
have
responsive
characteristics,
and
when
communicating with other autonomous agents they may
understand and respond to changes in their domain. This
enables them to adopt themselves as they attain experience
over time [21] through learning and communicating with their
environment. IA is created to avoid Distributed Denial of
Service (DDoS) attacks. A potent way to use agents against
distributed cyber attacks is through construction of artificial
"Digital police‖ which should consist of mobile intelligent
agents; hence, requiring implementation of infrastructure to
support mobility and communication of cyber agents [16].
4.4 Search
Search is a pervasive approach for critical thinking which may
be linked to a wide array of situations in the absence of
alternate approach for critical thinking to be applied. It is an
everyday problem-solving strategy applied subconsciously by
individuals. When applying the search strategy, little
knowledge about it is required before a general search
algorithm in its formal setting is performed. Some form of
search algorithm is built into almost every intelligent program,
and its efficiency greatly impacts the performance of the
whole program. A wide variety of search methods were
developed which takes into account the specific information
relevant to issues of inquiry. Although various search
methods were developed in AI such as the αβ-search
estimation which is employed as a part of various projects,
they are rarely used in AI. The αβ-search estimation was
originally developed for PC chess. It adopts the ―isolate and
vanquish‖ strategy in critical thinking, and it is specifically
useful in primitive leadership when two foes are picking their
most ideal activities [1].
4.5 Bio-Inspired Computation Methods
Bio-inspired computing is a sub-field of Artificial Intelligence
more studied in recent times. It consists of smart algorithms
and techniques that mimic the bio-inspired behaviors and
attributes to address a broad range of sophisticated
academic, as well as real environment problems. Techniques
like Ant Colony Optimization (ACO), Evolution Strategies
(ES), Artificial Immune System (AIS), Particle Swamp
Optimization (PSO), and Genetic Algorithms (GA) are
biologically inspired techniques commonly employed in the
field of cyber security.
The application of bio-inspired
techniques in the classification of computer malwares is
gaining more acceptances among scientists. These
techniques were primarily applied to optimize features and
parameters for the classifiers. For instance, PSO was
employed in [23] and GA in [24] to improve the efficiency of
malware detection system. Again, in a study [25], GA and
fuzzy logic was used for intrusion detection. A digital
signature of a network segment using glow analysis was
created using the GA to predict traffic behavior of a network
for a specific time period. In addition, the fuzzy logic method
was employed to determine the anomaly or otherwise of an
instance on the network. Network traffic from a university was
used to conduct the evaluation, 96.53% accuracy and 0.56%
false notification were obtained.
167
IJSTR©2020
www.ijstr.org
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 9, ISSUE 10, OCTOBER 2020
5 BENEFITS AND CHALLENGES
APPLICATION IN CYBER SECURITY
OF
AI
The numerous gains and application areas of AI in cyber
security have undoubtedly come with some challenges.
These challenges can be referred to as the dark side of AI for
cyber security. Some of the benefits are discussed below
5.1 Benefits of AI in Cyber Security
A review [26] on the advantages of Artificial Intelligence in the
field of cyber security reveals that institutions that
implemented AI in cyber security realize significant benefits.
This is evident as ROI of two out of three organizations
increased on cyber security tools. For example, Siemens AG,
leader of Global electrification, automation, and digitalization
used Amazon Web Services (AWS) to create AI based, highspeed, self-controlled, and extremely elastic platform for its
Siemens Cyber Defense Center (CDC). The AI deployed was
able to estimate 60,000 potential assaults per unit time. As a
result of the AI deployed, this capability was managed with a
team consisting of less than dozen members without any
negative impact on system performance. Employing AI in
cyber security permit institutions to comprehend and reapply
prior threat patterns in identification of novel threats [26]. This
results to preservation of time and effort in identifying and
investigating incidents, and remediate threats. About 64% of
administrators reveal that AI cut down the cost to identify and
react to breaches. Fast response is essential in evading
cyber attacks. Cost reduction for organizations is within an
average of 12%. AI offers opportunities for cyber security
largely because the cyber security landscape is rapidly
moving from identification, manual response and mitigation
towards automated mitigation. AI can identify novel and
complex modifications in attack extensibility. Conventional
technology focuses on proven intruder and intrusion; and it
permit blind spots when identifying unusual activities in novel
intrusion. The drawbacks of the early security technology
were resolved via smart technology. For instance, activities of
the privileged intranet can be watched, and any expressive
changes in privileged access operations may represent a
potential threat. Predictive Artificial Intelligence offer the
security teams an edge required to prevent threats before
they cause any mishap. In the UK, Dark trace employs
machine learning techniques to mark patterns and detect
potential cyber crime in various sectors like manufacturing
industries, retails and energy and transportation firm. This is
functional as cyber attacks are getting more complex and
intruders are developing novel tactics. AI has the ability to
handle huge volume of data, improve network security
through building of self controlled security systems to identify
various attacks and react to breaches. The number of daily
security alerts may highly overturn the security groups.
Automatic detection and response to intrusion has reduced
the efforts required by security experts, and it can be more
effective in identifying threats than other techniques. When
huge volume of security data is generated and transferred
over the network on daily basis, it becomes very difficult to
rapidly and reliably track and identify them by the network
security experts. Therefore, Artificial Intelligence may assist
to expand the monitoring and identification of dubious
activities. This can assist network security experts to respond
to novel situations; thereby substituting the time consuming
manual method of analysis. AI security systems are capable
ISSN 2277-8616
of learning, with time, to react better to attacks: AI assists in
identification
of
attacks
according
to
application
characteristics and the entire network‘s activity. Over time, AI
security system understands the regular traffic behavior, and
set a threshold for normal activities. Therefore, any deviations
from the norm can be termed an attack.
5.2 Challenges of AI Application in Cyber Security
Large number of input samples is required to build an
Artificial Intelligence system. It is highly time consuming to
obtain and process the samples and require lot of resources.
Large number of resources such as memory, processing
power and data are required to build and maintain the
fundamental system. Skilful resources essential to execute
this technology are costly. Frequent false alarm is a challenge
for end client. It disrupts businesses by procrastinating
essential responses which entirely affects the business
efficiency. The process of fine-tuning is a trade-off between
minimizing false alarms and sustaining the level of security.
Various techniques like adversarial inputs, model theft and
data poisoning maybe used by Attackers to target the AI
system. Integrated AI systems consist of four main elements:
perception, learning, decisions and actions. These systems
run in sophisticated environment that needs the elements to
interact and be mutually dependent (e.g. misperception may
lead to inconsistent decision). Furthermore, each element has
a peculiar vulnerability (e.g. perception is liable to training
attacks while decisions are exposed to classic cyber exploits)
[11]. Lastly, the idea of consistency is not a purely logical
matter: additives and lack of certainty need bounds for every
element to prevent the system from misbehaving. A formal
method is required to independently verify the logical
correctness, decision theory and risk analysis of both AI and
ML elements. Novel techniques are required to define the
system expectations and how to reacts to attacks. Artificial
intelligence in cyber security generates a novel threat to
digital security. The ability for AI technology to consistently
detect and prevent cyber attacks has made attackers to
launch more complex attacks. This is, in part, because the
cost of developing and adopting the technology reduces as
the access to improved AI solutions and ML tools increases.
This shows that more sophisticated and adaptive vicious
programs can be developed at lesser cost to illegitimate
users. These factors have resulted to increase in the task of
cybercrime control. One of the less-acknowledged risks of
artificial intelligence in cyber security concerns the human
element of complacency. Employees may be less conscious
of prevention, when an institution adopts AI and ML strategy
in its cyber security. We do not need to make emphasis on
the high risk of complacent and uninformed employees as the
significance of cyber security awareness was already
discussed.
6 DISCUSSIONS
This study reports an overview of AI application in cyber
security. The use of Artificial Intelligence in cyber security is
opening up new borders of investigations in the security
landscape. AI is continually proving to be the most effective
tool against cyber threats especially in terms of complexity
and number. From the literatures reviewed, it is clear that
Artificial Intelligence based methods can be employed in the
168
IJSTR©2020
www.ijstr.org
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 9, ISSUE 10, OCTOBER 2020
cyber domain where a diverse methods currently in use are
proven ineffective. Research‘s are conducted in the area of AI
application in cyber security and published yearly. Figure 2
below shows the publications of the research output in the
domain which this study covers within the time frame
mentioned in the methodology section which is 2.0. Figure 2
also shows the trend of papers published on the application
of AI in the field of cyber security, especially in recent times.
The chart in figure 2 shows that researchers are dwelling on
AI application in cyber security and the trend is expected to
grow faster in future as the cumulative frequency of
publications after 2015 outpaced publications before 2015 in
the research domain been considered in this paper.
ISSN 2277-8616
8 CONCLUSIONS
Advances in ICT have resulted to the emergence of novel
challenges for cyber security. Security threats have become
so complex such that traditional techniques based on
inferences from prior attacks don‘t seem to help anymore.
The computational complexity of cyber attacks requires novel
techniques that are more ideal, scalable, and elastic. This
paper presents an overview of AI application in cyber
security. Some AI methods applied in cyber security were
discussed such as DL or DNN, security expert systems,
search and some bio-inspired techniques for cyber security.
Some areas where AI is impacting on cyber security are
malware prediction and detection; intrusion prediction
detection and prevention; protection against DDoS, where
digital police are employed; and many others. Some benefits
and challenges of AI application in cyber security were also
discussed. The benefit ranges from speed and accuracy in
handling large volumes of data, which is humanly impossible
to handle; overall reduction in the cost of securing
organizations‘ valuable data and resources; and increased
ROI on AI powered cyber security tools amongst others. The
challenges of AI applications for cyber security include the
risk of adversarial AI attacks and complacency of the human
factor. Despite the drawbacks of the increase in the
application of AI in cyber security, it is still believed that its
benefits outweigh the challenges. The human element is still
integral to cyber security. This is why more industry experts
are arguing that AI should be integrated into the systems
within each business‘s cyber security operation center.
REFERENCES
[1]
Fig. 2. Distribution of literatures by year of publication
[2]
Figure 3 shows the distribution of sourced literatures in the
domain of enquiry covered in this work by the databases
searched. As earlier mentioned in section 2.0 above, the
literatures used in this work were sourced from the following
databases: googlescholar, sciencedirect, research gates and
academia.
[3]
[4]
Fig 3: Distribution of Literatures by database search
7
NEW PERSPECTIVES
RESEARCH
FOR
FURTHER
The findings on the degree of vulnerability of AI elements to
adversarial actions have raised a lot of concerns about the
security of data processing environments. AI elements
disregard the conventional software analysis and introduced
novel attack vectors in AI algorithms operational
environments. As a result of hidden dependencies, many
applications may be affected. A lot of researches are required
to develop theories, engineering principles and practices
when employing Artificial Intelligence as system element.
This [11] should include modeling of threats, safety tools,
environment vulnerabilities, and preventing human machine
collaboration. These models should be designed based on AI
expertise and should abstract and refine attacks iteratively.
Also, it should take into account of data availability, data
integrity, data access control, network operation, privacy and
a dynamic policy environment.
[5]
[6]
[7]
S. Bhutada and P. Bhutada, Application of Artificial
Intelligence in Cyber Security: in
IJERCSE, 2018,
5(4): 214-219
P.V. Alberto, lecture, Topic: Application of Artificial
Intelligence (AI) to Network Security‖, ITEC 625,
University of Maryland, University College, Maryland,
Mar. 2018.
Avira, The Application of AI to Cybersecurity – An Avira
White Paper, Germany, Avira Operation, 2017.
S. A Panimalar, U.G. Pai and K.S. Khan, ―AI Techniques
for Cyber Security‖, International Research Journal of
Engineering and Technology, vol. 5, 3, pp. 122-124, Mar.
2018. Available: https://www.irjet.net [assessed May. 29,
2020]
T.S. Tuang. Diep.Q. B, and Zelinka. I, Artificial
Intelligence in the Cyber Domain: Offense and
Defense: Symmetry, 2020, 12,410 available:
www.mdp.com/journal/symmetry on [assessed Apr. 20,
2020]
E. Kanal, Machine Learning in Cybersecurity: Carnegie
Mellon University Software Engineering Institute,
available
onhttp://insights.sei.cnu.edu./sei_blog/2017/06/machine
_learning_in_cybersecurity.html
D. Selma, C. Huseyin and A. Mustafa, Application of
Artificial Intelligence Techniques to Combating Cyber
Crimes: A Review, International Journal of Artificial
Intelligence &Applications, vol. 6, issue 1, pp. 21-39,
January 2015.
169
IJSTR©2020
www.ijstr.org
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 9, ISSUE 10, OCTOBER 2020
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
[23]
[24]
T. Enn, ―Artificial Intelligence in Cyber Defense‖, in
Proceedings of 3rd International Conference on Cyber
Conflicts [ICCC], 7-10 June, 2011 Tallin Estonia.
P. Dennis, A. Stuart, ―Global Challenges: Twelve risks
that threaten human civilization, Global Challenges
Foundation‖: 2015,Available: http://globalchallenges.org
/wp-content/
uploads/12-Risks-with-infinite-impact.pdf
[accessed Jun. 3, 2020]
R. Stuart, D. Daniel, T. Max, ‗‗Research Priorities for
Robust and Beneficial Artificial Intelligence‘‘, AI
Magazine, vol. 36, issue 4, pp. 105-114, Winter 2015
National Science & Technology Council, ―Artificial
Intelligence and Cybersecurity: Opportunities and
Challenges‖ Net. & Info.Tech R&D Sub-comtt and the
ML & AI Sub-comtt, 2020.
A. M. Shamiulla, Role of Artificial Intelligence in Cyber
Security, International Journal of
Innovative
Technology and Exploring Engineering, vol. 9 issue 1
pp. 4628-4630, November 2019
P. Pranav, ―Artificial Intelligence in cyber security‖,
International Journal of Research in Computer
Applications & Robotics, vol 4, 1, pp.1-5, May 2016
J. Kivimaa, A. Ojamaa, E. Tyugu. Graded Security
Expert System. Lecture Notes in Computer Science, v.
5508. Springer, 2009, 279-286.
B. Christain, D.A. Elizondo and T. Watson, ―Application
of artificial neural networks and related techniques to
intrusion detection‖, World Congress on Computation
Intelligence, pp 949-954, 2010
E. Tyugu, ―Artificial Intelligence in Cyber Defense‖,
International conference on Cyber Conflict, vol. 3, pp.
95-105, Tallinn, Estonia, Jan. 2011
W. Nadine and K. Hadas, ―Artificial Intelligence in
Cybersecurity‖, Cyber, Intelligence, and Security, vol. 1,
1, pp. 103-119, Jan. 2017
S. Dima, M. Robert, B. Zvi, S. Shahar and E. Yuval,
―Using Artificial Neural Network to Detect Unknown
Computer Worms‖, Neural Computing and Applications,
vol.18, 7, pp. 663-674, Oct. 2009
E. H. Geoffrey, O. Simon and T. Yee-Whye, ―A Fast
Learning Algorithm for Deep Belief Nets‖, Neural
Computation, vol. 18, no. 7, pp. 1527-1554, 2006
V. Thomson, ―Cyber Attacks Could be Predicted with
Artificial
Intelligence‖,
7/cyberiTechPost,www.itechpost.com/articles/1734
attacks-predicted-artificial-intelligen ce-help.htm, Apr.
21, 2016 [Jun. 2, 2020]
S. Franklin and A. Graesser, ―Is It an Agent, or Just a
Program? A Taxonomy for Autonomous Agents‖, Third
International
Workshop
on
Agent
Theories,
Architectures, and Languages, no. 3, pp. 21-35, 1997
Y. Xia and L. Junshan, ―A Security Architecture Based
on Immune Agents for MANET‖, International
Conference on Wireless Communication and Sensor
Computing, no. , pp. 1-5, 2010
M. F. AbRazak, etal, ―Bio-inspired for features
optimization and malware detection.Arabian Journal of
Science and Engineering, no. 43, pp. 6963–6979. 2018
A. Fatima, etal, ―Android Malware Detection Using
Genetic Algorithm based Optimized Feature Selection
and Machine Learning‖, In Proceedings of the 42nd
International Conference on Telecommunications and
ISSN 2277-8616
Signal Processing (TSP), Budapest, Hungary, 1–3 July
2019; pp. 220–223.
[25] R.A.R Ashfaq, etal, ―Fuzziness based semi-supervised
learning approach for intrusion detection system‖. Inf.
Sci. 2017, 378, 484–497.
[26] L. Lazic, ―Benefits from AI in Cyber Security‖, The 11th
international Conference on Business Information
Security, 18th Oct. 2019, Belgrade, Serbia, pp. 1-9
170
IJSTR©2020
www.ijstr.org