scispace - formally typeset
Open AccessJournal ArticleDOI

Crossing Point of Artificial Intelligence in Cybersecurity

Praveen Kumar Donepudi
- Vol. 2, Iss: 3, pp 121-128
Reads0
Chats0
TLDR
In this paper, a cross-point between Artificial Intelligence (AI) and Cybersecurity is examined and a central question is raised: "By what means can artificial intelligence applications be utilized to upgrade cybersecurity?" From this question rises the accompanying set of sub-questions: What is the idea of artificial intelligence and what are its fields? What are the main areas of AI that can uphold cybersecurity? What is data mining and how might it be utilized for improving cybersecurity?
Abstract
There is a wide scope of interdisciplinary crossing points between Artificial Intelligence (AI) and Cybersecurity. On one hand, AI advancements, for example, deep learning, can be introduced into cybersecurity to develop smart models for executing malware classification and intrusion detection and threatening intelligent detecting. Then again, AI models will confront different cyber threats, which will affect their sample, learning, and decision making. Along these lines, AI models need specific cybersecurity defense and assurance advances to battle ill-disposed machine learning, preserve protection in AI, secure united learning, and so forth. Because of the above two angles, we audit the crossing point of AI and Cybersecurity. To begin with, we sum up existing research methodologies regarding fighting cyber threats utilizing artificial intelligence, including receiving customary AI techniques and existing deep learning solutions. At that point, we analyze the counterattacks from which AI itself may endure, divide their qualities, and characterize the relating protection techniques. And finally, from the aspects of developing encrypted neural networks and understanding safe deep learning, we expand the current analysis on the most proficient method to develop a secure AI framework. This paper centers mainly around a central question: "By what means can artificial intelligence applications be utilized to upgrade cybersecurity?" From this question rises the accompanying set of sub-questions: What is the idea of artificial intelligence and what are its fields? What are the main areas of artificial intelligence that can uphold cybersecurity? What is the idea of data mining and how might it be utilized to upgrade cybersecurity? Hence, this paper is planned to reveal insight into the idea of artificial intelligence and its fields, and how it can profit by applications of AI brainpower to upgrade and improve cybersecurity. Using an analytical distinct approach of past writing on the matter, the significance of the need to utilize AI strategies to improve cybersecurity was featured and the main fields of application of artificial intelligence that upgrade cybersecurity, for example, machine learning, data mining, deep learning, and expert systems.

read more

Citations
More filters
Journal Article

Do Internals of Neural Networks Make Sense in the Context of Hydrology

TL;DR: In this paper, the authors explore the internals of the learned networks for different basin sets from the sundrily obtainable dataset known as CAMELS, and showcase that internally, LSTMs learned to interpret patterns that align with our comprehension of the hydrological system.

Biclustering of Omics Data using Rectified Factor Networks

TL;DR: In this article, Rectified Factor Networks (RFNs) were proposed to circumvent the limitations of existing biclustering approaches, using their posterior means to efficiently build exceedingly sparse, non-linear, high-dimensional representations of the input.

P-SVM Gene Selection for Automated Microarray Categorization

TL;DR: In this paper, a Mass-Conserving Long Short-Term Memory (MC-LSTM) is proposed to preserve raw data over a stretched period of time. But it is not suitable for computer vision tasks.
Journal Article

Using Fuzzy Equivalence Relations to Model Position Specificity in Sequence Kernels

TL;DR: This article used fuzzy equivalence relations to model position specificity to develop a generalization of position-specific sequence kernels, leading to the creation of new kernels, such as the Elin kernel.

Government by Algorithm: Artificial Intelligence in Federal Administrative Agencies, a Case of USA

Rubina Shaheen, +1 more
TL;DR: The report gives a presents use of artificial intelligence in few administrative agencies and in-depth thematic analysis of some institution, have been conducted to review the current trends.
References
More filters
Journal ArticleDOI

Datafication, dataism and dataveillance: Big Data between scientific paradigm and ideology

TL;DR: This article deconstructs the ideological grounds of datafication, a ideology rooted in problematic ontological and epistemological claims that shows characteristics of a widespread secular belief in the context of a larger social media logic.
Journal ArticleDOI

A Characterization of the Utility of Using Artificial Intelligence to Test Two Artificial Intelligence Systems

Jeremy Straub, +1 more
- 31 May 2013 - 
TL;DR: An approach to validating the performance of an artificial intelligence system using a simple artificial intelligence test case producer (AITCP) is presented, which allows the creation and simulation of prospective operating scenarios at a rate far exceeding that possible by human testers.
Journal ArticleDOI

Artificial Intelligence in a historical perspective

TL;DR: The paper tells the story of the beginnings of Artificial Intelligence AI as a scientific venture from a European perspective, assuming AI's due role in this process would mean a change in its long-term goal: enhancing rather than simulating human intelligence.
Journal ArticleDOI

Policing cybercrime or militarizing cybersecurity? Security mindsets and the regulation of threats from cyberspace

TL;DR: The idea of different ‘security mindsets’ as distinct approaches to security and how these play a role in regulating cyberspace and influencing legal regulations is presented.
Related Papers (5)