APPLICATION OF ARTIFICIAL INTELLIGENCE IN FIGHTING AGAINST CYBER CRIMES: A REVIEW
Main Article Content
Abstract
Cybercrimes have become a daily menace with the unprecedented progress made in the Information Technology (IT). Cyber infrastructures are exposed to serious Cybercrimes and attacksevery day. Physical devicesand human intervention have not been fully successful in monitoring and protection of these infrastructures; hence, there comes a need of highly effectivedefense systems that need to be flexible, adaptable and robust, which must be able to defend the IT infrastructure against innumerable and highly potential cyber-attacks. Umpteen techniques of artificial intelligence have been playing a key role in cybercrime detection and prevention. This study aims at putting forth the progress made in Artificial Intelligence in fighting against the numerous cybercrimes and shows the effectiveness of various AI techniques in detecting and preventing cyber-attacks, as well as to give the scope for future work.
Â
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
M. R. Stytz, D. E. Lichtblau, S. B. Banks, (2005) “Toward using intelligent agents to detect, assess,and counter cyber-attacks in a network-centric environmentâ€, Ft. Belvoir Defense Technical Information Center, 1.Edition, Alexandria, VA.
E. Tyugu, (2011) “Artificial intelligence in cyber defenseâ€, 3rd International Conference on Cyber Conflict (ICCC 2011), pp. 1–11.
X. B. Wang, G. Y. Yang, Y. C. Li, D. Liu, (2008) â€Review on the application of Artificial
Intelligence in Antivirus Detection Systemâ€, IEEE Conference on Cybernetics and IntelligentSystems, pp. 506 509.
D. Dasgupta, (2006) “Computational Intelligence in Cyber Securityâ€, IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety (CIHSPS 2006), pp. 2–3
X. B. Wang, G. Y. Yang, Y. C. Li, D. Liu, (2008) â€Review on the application of Artificial
Intelligence in Antivirus Detection Systemâ€, IEEE Conference on Cybernetics and IntelligentSystems, pp. 506 509.
ttps://en.wikipedia.org/wiki/Artificial_neural_network
Y. Chen, (2008) “NeuroNet: Towards an Intelligent Internet Infrastructureâ€, 5th IEEE Consumer Communications and Networking Conference (CCNC 2008), pp. 543 547.
A. Iftikhar, B.A. Azween, A. S. Alghamdi, (2009) “Application of artificial neural network indetection of dos attacks,†Proceedings of the 2nd ACM international conference on Security ofinformation and networks, pp. 229–234.
L. Ondrej, T. Vollmer, M. Manic, (2009) “Neural Network Based Intrusion Detection System for Critical Infrastructuresâ€, Proceedings of International Joint Conference on Neural Networks, pp. 1827 -1834.
F. Barika, K. Hadjar, N. El-Kadhi, (2009) “Artificial neural network for mobile IDS solutionâ€,
Security and Management, pp. 271–277.
P. Salvador, A. Nogueira, U. Franca, R. Valadas, (2009) “Framework for Zombie Detection using Neural Networksâ€, Fourth International Conference on Internet Monitoring and Protection (ICIMP'09), pp.14 – 20.
N. C. Rowe, “Counterplanning Deceptions To Foil Cyber-Attack Plansâ€, Proceedings of the 2003 IEEE Workshop on Information Assurance, United States Military Academy, West Point, Information Assurance Workshop, pp. 203 210.
X. Gou, W. Jin, D. Zhao, (2006) "Multi-agent system for worm detection and containment inmetropolitan area networks", Journal of Electronics, Vol. 23, No. 2, pp. 259-265.
F. Doelitzscher, C. Reich, M. Knahl, N. Clarke, (2011) "An Autonomous Agent Based Incident Detection System for Cloud Environments," IEEE Third International Conference on Cloud Computing Technology and Science (CloudComputing), pp.197-204.
L. Rui, L. Wanbo, (2010) “Intrusion Response Model based on AISâ€, International Forum on
Information Technology and Applications (IFITA), Vol. 1, pp. 86 – 90.
B. Sirisanyalak, O. Sornil, (2007) “An artificial immunity-based spam detection system“, IEEE Congress on Evolutionary Computation (CEC 2007), pp. 3392 3398.
R. Chao, Y. Tan, (2009)â€A Virus Detection System Based on Artificial Immune Systemâ€,
International Conference on Computational Intelligence and Security, Vol. 1, pp. 6 – 10.
M. Danforth, (2009) “Towards a Classifying Artificial Immune System for Web Server Attacksâ€, International Conference on Machine Learning and Applications, pp. 523 – 527.
Y. A. Mohamed, A. B. Abdullah, (2009) “Immune Inspired Framework for Ad Hoc Network
Securityâ€, IEEE International Conference on Control and Automation, pp. 297 – 302.
B. Stahl, D. Elizondo, M. C. Mayer, Y. Zheng, K. Wakunuma, (2010) “Ethical and Legal Issues of the Use of Computational Intelligence Techniques in Computer Security and Computer Forensicsâ€, International Joint Conference on Neural Networks (IJCNN), pp. 1 8