APPLICATION OF ARTIFICIAL INTELLIGENCE IN FIGHTING AGAINST CYBER CRIMES: A REVIEW

Main Article Content

Md. Zeeshan Siddiqui
Sonali Yadav
Mohd. Shahid Husain

Abstract

Cybercrimes have become a daily menace with the unprecedented progress made in the Information Technology (IT). Cyber infrastructures are exposed to serious Cybercrimes and attacksevery day. Physical devicesand human intervention have not been fully successful in monitoring and protection of these infrastructures; hence, there comes a need of highly effectivedefense systems that need to be flexible, adaptable and robust, which must be able to defend the IT infrastructure against innumerable and highly potential cyber-attacks. Umpteen techniques of artificial intelligence have been playing a key role in cybercrime detection and prevention. This study aims at putting forth the progress made in Artificial Intelligence in fighting against the numerous cybercrimes and shows the effectiveness of various AI techniques in detecting and preventing cyber-attacks, as well as to give the scope for future work.

 

Downloads

Download data is not yet available.

Article Details

Section
Articles

References

M. R. Stytz, D. E. Lichtblau, S. B. Banks, (2005) “Toward using intelligent agents to detect, assess,and counter cyber-attacks in a network-centric environmentâ€, Ft. Belvoir Defense Technical Information Center, 1.Edition, Alexandria, VA.

E. Tyugu, (2011) “Artificial intelligence in cyber defenseâ€, 3rd International Conference on Cyber Conflict (ICCC 2011), pp. 1–11.

X. B. Wang, G. Y. Yang, Y. C. Li, D. Liu, (2008) â€Review on the application of Artificial

Intelligence in Antivirus Detection Systemâ€, IEEE Conference on Cybernetics and IntelligentSystems, pp. 506 509.

D. Dasgupta, (2006) “Computational Intelligence in Cyber Securityâ€, IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety (CIHSPS 2006), pp. 2–3

X. B. Wang, G. Y. Yang, Y. C. Li, D. Liu, (2008) â€Review on the application of Artificial

Intelligence in Antivirus Detection Systemâ€, IEEE Conference on Cybernetics and IntelligentSystems, pp. 506 509.

ttps://en.wikipedia.org/wiki/Artificial_neural_network

Y. Chen, (2008) “NeuroNet: Towards an Intelligent Internet Infrastructureâ€, 5th IEEE Consumer Communications and Networking Conference (CCNC 2008), pp. 543 547.

A. Iftikhar, B.A. Azween, A. S. Alghamdi, (2009) “Application of artificial neural network indetection of dos attacks,†Proceedings of the 2nd ACM international conference on Security ofinformation and networks, pp. 229–234.

L. Ondrej, T. Vollmer, M. Manic, (2009) “Neural Network Based Intrusion Detection System for Critical Infrastructuresâ€, Proceedings of International Joint Conference on Neural Networks, pp. 1827 -1834.

F. Barika, K. Hadjar, N. El-Kadhi, (2009) “Artificial neural network for mobile IDS solutionâ€,

Security and Management, pp. 271–277.

P. Salvador, A. Nogueira, U. Franca, R. Valadas, (2009) “Framework for Zombie Detection using Neural Networksâ€, Fourth International Conference on Internet Monitoring and Protection (ICIMP'09), pp.14 – 20.

N. C. Rowe, “Counterplanning Deceptions To Foil Cyber-Attack Plansâ€, Proceedings of the 2003 IEEE Workshop on Information Assurance, United States Military Academy, West Point, Information Assurance Workshop, pp. 203 210.

X. Gou, W. Jin, D. Zhao, (2006) "Multi-agent system for worm detection and containment inmetropolitan area networks", Journal of Electronics, Vol. 23, No. 2, pp. 259-265.

F. Doelitzscher, C. Reich, M. Knahl, N. Clarke, (2011) "An Autonomous Agent Based Incident Detection System for Cloud Environments," IEEE Third International Conference on Cloud Computing Technology and Science (CloudComputing), pp.197-204.

L. Rui, L. Wanbo, (2010) “Intrusion Response Model based on AISâ€, International Forum on

Information Technology and Applications (IFITA), Vol. 1, pp. 86 – 90.

B. Sirisanyalak, O. Sornil, (2007) “An artificial immunity-based spam detection system“, IEEE Congress on Evolutionary Computation (CEC 2007), pp. 3392 3398.

R. Chao, Y. Tan, (2009)â€A Virus Detection System Based on Artificial Immune Systemâ€,

International Conference on Computational Intelligence and Security, Vol. 1, pp. 6 – 10.

M. Danforth, (2009) “Towards a Classifying Artificial Immune System for Web Server Attacksâ€, International Conference on Machine Learning and Applications, pp. 523 – 527.

Y. A. Mohamed, A. B. Abdullah, (2009) “Immune Inspired Framework for Ad Hoc Network

Securityâ€, IEEE International Conference on Control and Automation, pp. 297 – 302.

B. Stahl, D. Elizondo, M. C. Mayer, Y. Zheng, K. Wakunuma, (2010) “Ethical and Legal Issues of the Use of Computational Intelligence Techniques in Computer Security and Computer Forensicsâ€, International Joint Conference on Neural Networks (IJCNN), pp. 1 8