Role of Artificial Intelligence on Cybersecurity and Its Control

Role of Artificial Intelligence on Cybersecurity and Its Control

Ramesh Chandra Rath, Sukanta Kumar Baral, Richa Goel
Copyright: © 2022 |Pages: 21
DOI: 10.4018/978-1-6684-3448-2.ch002
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Cyber security is paramount in all aspects of life, particularly in digital technology. Stories of artificial intelligence and data breaches, ID theft, cracking the security code, operating machines with remote sensors, and other such incidents abound, affecting millions of individuals and organizations. The problems in developing appropriate controls and processes and applying them with utmost precision to combat cyber-attacks and crimes have always been unending. With recent advances in artificial intelligence, the ever-increasing danger of cyber-attacks and crimes has grown tremendously. It has been used in nearly every branch of research and engineering. AI has sparked a revolution in everything from healthcare to robotics. This ball of fire could not be kept away from cyber thieves, and therefore, “normal” cyber-attacks have evolved into “intelligent” cyber-attacks. The authors of this chapter attempt to discuss prospective artificial intelligence approaches to use such strategies in cyber security for expecting outcome-based conclusions related to future research work.
Chapter Preview
Top

Literature Review

In the literature review segment, we researchers used both fact-gathering methods, but collected most facts from published resources and target 10 companies of India through an online Google forms survey to complete the above survey. Images were collected from 300 respondents from companies and workplaces. Cyber security is difficult with existing challenges that require the pursuit of integration and utilization of software and contemporary solutions through the deployment of related security measures. This was referenced by Mathew, 2021 in terms of artificial intelligence crime regarding the ability of cybercriminals to use intelligence to improve their attacks. Cyber security and AI can produce fruitful results when run in parallel. ML's current approach seems to be best suited to resolve violations of previous rule-based security structures. AI collects, sorts, and researches vast amounts of data, enabling businesses to add value from their data. These attributes are used in the field of cyber security.

The purpose of this study is to uncover ongoing trends and applications for achieving organizational-level cyber security using AI (Juneja, 2021), these attributes are used in the industry. The purpose of this study is to clarify current trends and applications to address cyber security is an ever-evolving industry that evolves and evolves to protect people and businesses from cyber- attacks. The Web of Things (Zeng, Song, and Cheng, 2011), faculty of computer science and engineering, affiliated with the University of Aizu conducted extensive research on cyber security and its control. It has also been published in another journal entitled “Restoring Decentralized Adaptive Cyber ​​Defense Using Block-chain, Game Theory and Machine Learning in Cyber ​​Security.” and their book (Cybenko and Hallman, 2016) multi-component systems operating in competing environments are for learning while maintaining the same retention capabilities, found that and needed to use redundancy. This overview paper cites this paper, explaining visions, concepts, technologies, challenges, innovation directions, and different Internet applications.

According to the research paper of Misra, Kumar, and Agarwal, 2016, “Internet of Things (IoT) – Technical Analysis and Research on Vision” and is a wireless sensor network that supports energy management using web services and uses cyber security protection to fully manage security codes while avoiding the use of unauthorized calls (WSN) found to be a case study and fraudulent activity from a survey report on cloud computing research: an architecture (Dinh, 2013), enrolled in the Faculty of Computer Engineering. Gain basic knowledge of cyber security and its applications accepted in wireless communications and mobile computing and controlled by the use of cloud computing software created (Gubbi, 2013).

Complete Chapter List

Search this Book:
Reset