Table of Contents
4. Cyberspace security technology based on artificial intelligence
5. Summary
References
Home Technology peripherals AI A review of artificial intelligence technology in cyberspace security

A review of artificial intelligence technology in cyberspace security

Apr 11, 2023 pm 04:10 PM
network Safety space

1. Introduction

# Due to the explosive growth of computer networks, The problem is the rapidly growing number of cyberattacks. Various sectors of our society, from government departments to various critical infrastructures in society, are heavily dependent on computer networks and information technology. Apparently they are also vulnerable to cyberattacks. Typical network attacks disable the target computer, take services offline, or access the target computer's data. The number and impact of cyberattacks has increased significantly since the 1990s.

Network security refers to a series of technologies used to protect network device activities and measures to protect them from all possible threats. In traditional network security technology, most of them are static access management, and the security control system will protect based on preset definitions. But when the number of network attacks increases, more and more attacks will bypass this protection mechanism, and traditional methods are no longer sufficient.

If there is no effective enough network security technology, the security of the company, country, and society will be threatened. Just between 2014 and 2015, there were a large number of cyber crimes that needed to be dealt with across the country, involving Target, Anthem, Blue Shield and many other companies. Attackers will use vulnerabilities in security systems or exploit vulnerabilities in infrastructure to break into computer systems. Traditional methods are no longer sufficient in today's unpredictable environment. Static methods can no longer be used for protection. Attacks need to be prevented from happening in the first place.

The following explores the needs in the development of cybersecurity technology and explains many of the artificial intelligence technologies currently being used in the field of cybersecurity. The second part will give a brief overview of artificial intelligence. The third part introduces the artificial intelligence technology applied in the field of network security. The fourth part introduces some network security methods based on artificial intelligence in detail. The fifth part summarizes the previous article and provides some suggestions for the follow-up. Suggestions for possible related work are given.

2. Overview of Artificial Intelligence

Artificial intelligence has been the A popular concept. After it was first proposed in 1956, it has been described as a method of formalizing events using digital logic, also known as machine intelligence.

Artificial intelligence uses complex digital algorithms to simulate human thinking. Artificial intelligence technology can understand and learn various knowledge based on various information in events. The perspective of thinking can be divided into two perspectives: thinking and reasoning process and behavior.

It can be seen that the artificial intelligence method focuses more on human behavior, focusing on knowledge representation and reasoning methods, and then developing intelligent agents. Agents can interact with various other agents and exchange mutual knowledge. The process of finding solutions to problems is completed in this sharing. Each agent is a decision-making system.

Decision theory has two aspects, diagnosis and perspective. Jean Pomerol[1] and others have studied that artificial intelligence has many relationships with diagnosis, representation and recording of human knowledge. Due to the uncertainty of forward-looking decision-making, artificial intelligence does not pay enough attention and ignores multi-attribute human reasoning. Simon[2] et al. proposed a bounded rationality model to acknowledge that humans use multiple criteria at different moments in the decision-making process. The goal of artificial intelligence has always been to seek a new type of automated intelligence. This kind of only reaction can be like that of humans. In order to achieve this goal, the machine needs to learn accurately, which means the machine must be trained through a learning algorithm. Artificial intelligence methods rely on algorithms. Moreover, even if the algorithm does not improve much, artificial intelligence can still perform brute force learning by using large-scale computing and big data methods.

Artificial Intelligence has three ways of working:

    Assistant Intelligence Improves what people are already doing.
  • Augmented intelligence enables people to do things they cannot do.
  • Autonomous Intelligence This is the characteristic of machines acting autonomously.
Regarding these three categories, it can be concluded that artificial intelligence is designed to solve some of the most difficult problems, and cybersecurity falls into this category because cyber attacks have become very sophisticated and potentially more catastrophic and becoming a complex problem in cyberspace.

3. Artificial Intelligence Technology in Network Security

This section will briefly outline some basic aspects of the field of artificial intelligence. Learning algorithms and a brief introduction to branches of artificial intelligence, such as expert systems, machine learning, deep learning, and biologically inspired computing, which are often used in the field of network security.

Experiential learning and training should be used in machine learning to improve machine performance. According to the definition given by Mitchel [3]: "If the performance of a computer program on tasks of type T (as measured by P) increases with experience E, then it can learn a certain type of task from experience E T and performance measure P." Currently, the training machine has three learning algorithms, which are defined as follows:

Supervised learning: In this type of learning there is a training process with a large number of labeled data sets. The data set can be divided into a training set and a test set. After the training set is completed, the test set data is used for verification. Learning methods usually use classification mechanisms or regression mechanisms. Regression algorithms generate outputs or predicted values ​​based on one or more continuous-valued numbers as input. Classification algorithms classify data. Contrary to regression, classification algorithms generate discrete outputs.

Unsupervised learning: Contrary to supervised learning, unsupervised learning uses unlabeled data for training. Unsupervised learning algorithms are usually used to cluster data, reduce dimensionality, or estimate data density.

Reinforcement learning: This type of algorithm is the third branch of machine learning and is based on a reward and punishment system to learn the best behavior. Reinforcement learning can be thought of as a combination of supervised and unsupervised learning. Suitable for situations where data are limited or no data is given. [4]

Artificial Intelligence technology contains several subfields, which will be described below:

  • Expert System (ES): Also known as a knowledge system. There are two main components: one is a set of knowledge, which is the core of the expert system and contains accumulated experience; the second component is the inference engine, which is used to reason about the predefined knowledge and find the answer to the given question. Depending on the reasoning scheme, the system can solve case-based or rule-based reasoning.
  • Case-based reasoning: This type of reasoning assumes that solutions to past problem cases can be used to solve new problem cases. New solutions will be evaluated by reviewing past cases of similar problems, revised as necessary, and then added to the knowledge base, so that new problems can be continuously learned and the accuracy of reasoning can be continuously increased.
  • Rule-based reasoning: This type of reasoning uses the rules of experts to solve problems. Rules consist of two parts, conditions and actions. Problems are analyzed in two steps, first assessing conditions and then taking appropriate action. Unlike the case-based reasoning described above, rule-based systems do not automatically learn new rules or change current learning rules.

Expert systems can be used for decision-making issues in cyberspace security. Usually, when a process or software attempts to modify the data of a security system, the expert system will evaluate it to check whether it is malicious. Expert systems typically analyze large amounts of modified data within a reasonable period of time. In this way, the expert system can support the above work through real-time monitoring. When a malicious process is detected, the expert system will generate warning information for it, and then security experts can choose corresponding measures based on the warning information.

  • Machine Learning (ML): According to the definition given by Arthur Samuel[5]: "Machine learning is a method that enables computers to learn without being explicitly programmed." Machine learning gives We provide a system that discovers and formalizes data and learns improvements from experience. The learning process starts by observing example data to observe patterns in task data and make better decisions in the future. Armed with this knowledge, the system can see more properties of unseen examples.
  • Machine learning uses statistical data to extract information, discover patterns and draw conclusions. This is true even when working with large amounts of data. Machine learning algorithms can be roughly divided into three categories: supervised learning, unsupervised learning, and reinforcement learning. The most commonly used algorithms in the field of network security include: decision tree algorithm, support vector machine, Bayesian algorithm, K-nearest neighbor algorithm, random forest, association rule algorithm, clustering algorithm, principal component analysis, etc.
  • Deep Learning (DL): Also known as deep neural learning. It uses data to teach computers how to complete tasks that humans are typically capable of. DL includes ML, where machines can actively learn through experience and skills without human intervention.

Deep learning adopts the working mechanism of the human brain and neurons to process signals. By building a more extensive neural network for training, the accuracy and performance of the neural network will continue to improve. Due to the increasing amount of data created daily, deep learning is used more and more frequently. One of the advantages of DL over ML is its superior performance and results in processing training in the face of large amounts of data. Similar to machine learning, deep learning also supports supervised learning, unsupervised learning, and reinforcement learning. Deep learning algorithms commonly used in the field of network security usually include: feedforward neural network, convolutional neural network, recurrent neural network, generative adversarial network, deep belief network, etc.

  • Bio-inspired computing: It is a collection of intelligent algorithms and methods that use biological behavioral characteristics to solve a wide range of complex problems. What traditional artificial intelligence creates is intelligence, which is demonstrated by machines and created by programs. Biologically inspired computing starts with a simple set of rules and simple organisms, and they closely correspond to these rules. In bionic computing, the following technologies are most commonly used in the field of network security: genetic algorithms, evolutionary strategies, ant colony optimization, particle swarm optimization, artificial immune systems, etc.

4. Cyberspace security technology based on artificial intelligence

Artificial intelligence can be used in a short time Analyze large amounts of data efficiently and accurately. Leveraging threat history, AI-based systems can learn about past threats and use this knowledge to predict similar attacks in the future, even if their patterns have changed. For these reasons, AI can be used in cyberspace, AI can detect new and significant changes in attacks, AI can process big data, and AI security systems can continuously learn to better respond to threats.

However, artificial intelligence also has some limitations, such as: artificial intelligence-based systems require a large amount of data, and processing these huge data requires a long time and a lot of resources. Frequent false alarms are a problem for end users, delaying any The required response all affects efficiency. Additionally, attackers can attack AI-based systems by inserting enemy inputs, data poisoning, and model theft. Scientists have recently identified how artificial intelligence technology can be used to detect, prevent and respond to cyberattacks. The most common types of network attacks can be divided into three major categories:

  • Software Exploitation and Malicious Identification:
  • Software Exploitation: There are vulnerabilities in software, and there will always be some exploitable vulnerabilities . Attackers use these software vulnerabilities to attack underlying software applications. The more popular software vulnerabilities include: integer overflow, SQL injection, buffer overflow, cross-site scripting, cross-site request forgery, etc. It would be a complex task for a human to go through the code line by line. But if the computer is taught how to check, it should be possible. Benoit Moral [6] describes ways in which artificial intelligence can help improve application security. Advocates the use of knowledge-based systems, probabilistic reasoning, and Bayesian algorithms to detect software vulnerabilities.
  • Malware identification: This is a common network attack method nowadays. Currently popular malware viruses include viruses, worms, and Trojan horses. Since the impact of malicious viruses on the network and society is huge, a lot of research has been done. Listing some studies, for example, Chowdury[7] et al. define a framework for classifying and detecting malware using data mining and machine learning classification methods; H. Hashemi[8] et al. use K nearest neighbors and support vector machines as Machine learning classifier to detect location malware; Y.Ye[9] et al. built a deep learning architecture to detect intelligent malware; N.McLaughlin[10] et al. used a deep convolutional neural network to identify malware; H.J.Zhu[11] et al. defined a new machine learning algorithm called spin forest to identify malware.
  • Network Intrusion Detection:
  • Denial of Service (DoS): This attack often occurs when authorized users are unable to access information, devices, or other network resources due to the actions of an attacker. Sabah Alzahrani[12] and others proposed an anomaly-based distributed artificial neural network and a feature-based method, applying two different methods for defense.
  • Intrusion Detection System (IDS): This system can protect computer systems from abnormal events or violations. Due to the flexibility and rapid learning capabilities of artificial intelligence technology, it is suitable for application in the development of intrusion detection systems. W.L. Al-Yaseen[13] and others combined the support vector machine and the new version of the K-means algorithm to create a model suitable for IDS; A.H. Hamamoto[14] and others used genetic algorithms and fuzzy logic for network intrusion Detection is used to predict network traffic within a specified time interval.
  • Phishing and Spam Detection:
  • Phishing Attack: This attack attempts to steal a user's identity. For example, we often hear about brute force attacks and dictionary attacks. In response to this kind of attack, S.Smadi[15] et al. introduced a phishing detection system that used neural networks and reinforcement learning methods to detect phishing emails; F.Feng[16] et al. used Monte Carlo algorithms and risk Minimization method,using neural networks to identify calling websites.
  • Spam detection: refers to unsolicited emails that may contain inappropriate content and may cause security issues. Feng et al. combined support vector machines and naive Bayes algorithms to filter spam.

Artificial intelligence can currently be used in various fields of cyberspace security. It can be used to analyze data, attack detection and response, and can also automate processes, helping network security experts analyze and determine network security. Attack methods and defense measures. Some of the popular methods currently are threat detection and classification, cyber risk scoring, automated processes and optimizing manual analysis, among others.

5. Summary

Cyber ​​threats are growing rapidly and cyber attacks are becoming increasingly sophisticated, requiring new, more powerful, and scalable methods. It can be seen that the main purposes of current artificial intelligence-based network security algorithms are focused on malware detection, network intrusion detection, phishing and spam detection, etc. Research has produced good results by combining different artificial intelligence technologies. Although the role of artificial intelligence in solving cyberspace problems is currently inevitable, some issues related to artificial intelligence-based threats and attacks still need to be solved.

References

[1] Jean-Charles Pomerol, “Artificial intelligence and human decision making,”. European Journal of Operation Research, March 1997, DOI: 10.1016/S0377-2217(96)00378-5 · Source: CiteSeer.

[2] Simon, H.A., "Reason in Human Affairs,", Basil Blackwell, Oxford, 1983.

[3] Tom M. Mitchel, "Machine Learning,". McGraw-Hill Science/Engineering/Math; March 1997, ISBN: 0070428077.

[4] Arulkumaran K, Deisenroth MP, Brundage M, et al., “Deep reinforcement learning: a brief survey.,”. IEEE SignalProcess Mag, 34(6):26-38, 2017. https://doi.org/10.1109/MSP.2017. 2743240.

[5] Arthur L. Samuel, “Some Studies in Machine Learning Using the Game of Checkers,”. IBM Journal, November 1967.

[6] Benoit Morel, “Artificial Intelligence a Key to the Future of Cybersecurity,". In Proceeding of Conference AISec'11, October 2011, Chicago, Illinois, USA.

[7] Chowdhury, M., Rahman, A., Islam, R., " Malware analysis and detection using data mining and machine learning classification,". In Proceedings of the International Conference on Applications and Techniques in Cyber ​​Security and Intelligence, Ningbo, China, 16–18 June 2017; pp. 266-274.

[8] H. Hashemi, A. Azmoodeh, A. Hamzeh, S. Hashemi, "Graph embedding as a new approach for unknown malware detection,". J. Comput. Virol. Hacking Tech. 2017, 13, 153- 166.

[9] Y. Ye, L. Chen, S. Hou, W. Hardy, X. Li, "DeepAM: A heterogenous deep learning framework for intelligent malware detection,". Knowledge Information System. 2018, 54, 265-285.

[10] N. McLaughlin, J. Martinez del Rincon, B. Kang, S. Yerima, P. Miller, S. Sezer, Y. Safaei, E. Trickel , Z. Zhao, A. Doupe, “Deep android malware detection,”. In Proc of the Seventh ACM on Conference on Data and application Security and Privacy, Scottsdale, AZ, USA, 22-24 March 2017, pp.301-308 .

[11] H.J. Zhu, Z.H. You, Z.X. Zhu, W.L. Shi, X. Chen, L. Cheng, "Effective and robust detection of android malware using static analysis along with rotation forest model,". Neurocomputing 2018, 272, 638-646.

[12] Sabah Alzahrani, Liang Hong, "Detection of Distributed Denial of Service (DDoS) attacks Using Artificial Intelligence on Cloud,". In Proceedings of 2018 IEEE Conference, San Francisco, CA, USA, July 2018.

[13] W.L. Al-Yaseen, Z.A. Othman, M.Z.A. Nazri, “Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system,". Expert Syst. Appl. 2017, 67, 296-303.

[14] A.H. Hamamoto, L.F. Carvalho, L.D.H. Sampaio, T. Abrao, M.L. Proenca, "Network anomaly detection system using genetic algorithm and fuzzy logic,". Expert System Application. 2018, 92, 390-402.

[15] S. Smadi, N. Aslam, L. Zhang, "Detection of online phishing email using dynamic evolving neural network based on reinforcement learning,". Decision Support System, 2018, 107, 88-102.

[16] F. Feng, Q. Zhou, Z. Shen, X. Yang, L. Han, J. Wang, “The application of a novel neural network in the detection of phishing websites,” Intelligent Humanizing Computation, 2018, 1-15.

The above is the detailed content of A review of artificial intelligence technology in cyberspace security. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
2 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
Hello Kitty Island Adventure: How To Get Giant Seeds
1 months ago By 尊渡假赌尊渡假赌尊渡假赌
Two Point Museum: All Exhibits And Where To Find Them
1 months ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

What's going on when the network can't connect to the wifi? What's going on when the network can't connect to the wifi? Apr 03, 2024 pm 12:11 PM

1. Check the wifi password: Make sure the wifi password you entered is correct and pay attention to case sensitivity. 2. Confirm whether the wifi is working properly: Check whether the wifi router is running normally. You can connect other devices to the same router to determine whether the problem lies with the device. 3. Restart the device and router: Sometimes, there is a malfunction or network problem with the device or router, and restarting the device and router may solve the problem. 4. Check the device settings: Make sure the wireless function of the device is turned on and the wifi function is not disabled.

How should the Java framework security architecture design be balanced with business needs? How should the Java framework security architecture design be balanced with business needs? Jun 04, 2024 pm 02:53 PM

Java framework design enables security by balancing security needs with business needs: identifying key business needs and prioritizing relevant security requirements. Develop flexible security strategies, respond to threats in layers, and make regular adjustments. Consider architectural flexibility, support business evolution, and abstract security functions. Prioritize efficiency and availability, optimize security measures, and improve visibility.

AI's new world challenges: What happened to security and privacy? AI's new world challenges: What happened to security and privacy? Mar 31, 2024 pm 06:46 PM

The rapid development of generative AI has created unprecedented challenges in privacy and security, triggering urgent calls for regulatory intervention. Last week, I had the opportunity to discuss the security-related impacts of AI with some members of Congress and their staff in Washington, D.C. Today's generative AI reminds me of the Internet in the late 1980s, with basic research, latent potential, and academic uses, but it's not yet ready for the public. This time, unchecked vendor ambition, fueled by minor league venture capital and inspired by Twitter echo chambers, is rapidly advancing AI’s “brave new world.” The "public" base model is flawed and unsuitable for consumer and commercial use; privacy abstractions, if present, leak like a sieve; security structures are important because of the attack surface

What's wrong with the network being unavailable? What's wrong with the network being unavailable? Mar 28, 2024 am 09:13 AM

[Device setting issues] 1. The user's device (such as mobile phone, computer, etc.) may not be able to access the network due to improper IP address, DNS settings or firewall restrictions. 2. Users can detect their devices to make sure they are not set to "airplane mode" and that WiFi is turned on. 3. Try to forget the network and reconnect, or manually set the IP address and DNS server. 4. Check your device’s firewall and security software settings to make sure they are not blocking network connections. [Router Problem] 1. The router may be inoperable due to incorrect settings, outdated firmware or hardware failure.

How to implement PHP security best practices How to implement PHP security best practices May 05, 2024 am 10:51 AM

How to Implement PHP Security Best Practices PHP is one of the most popular backend web programming languages ​​used for creating dynamic and interactive websites. However, PHP code can be vulnerable to various security vulnerabilities. Implementing security best practices is critical to protecting your web applications from these threats. Input validation Input validation is a critical first step in validating user input and preventing malicious input such as SQL injection. PHP provides a variety of input validation functions, such as filter_var() and preg_match(). Example: $username=filter_var($_POST['username'],FILTER_SANIT

Security configuration and hardening of Struts 2 framework Security configuration and hardening of Struts 2 framework May 31, 2024 pm 10:53 PM

To protect your Struts2 application, you can use the following security configurations: Disable unused features Enable content type checking Validate input Enable security tokens Prevent CSRF attacks Use RBAC to restrict role-based access

Implementing Machine Learning Algorithms in C++: Security Considerations and Best Practices Implementing Machine Learning Algorithms in C++: Security Considerations and Best Practices Jun 01, 2024 am 09:26 AM

When implementing machine learning algorithms in C++, security considerations are critical, including data privacy, model tampering, and input validation. Best practices include adopting secure libraries, minimizing permissions, using sandboxes, and continuous monitoring. The practical case demonstrates the use of the Botan library to encrypt and decrypt the CNN model to ensure safe training and prediction.

Tips for turning off real-time protection in Windows Security Center Tips for turning off real-time protection in Windows Security Center Mar 27, 2024 pm 10:09 PM

In today's digital society, computers have become an indispensable part of our lives. As one of the most popular operating systems, Windows is widely used around the world. However, as network attack methods continue to escalate, protecting personal computer security has become particularly important. The Windows operating system provides a series of security functions, of which "Windows Security Center" is one of its important components. In Windows systems, "Windows Security Center" can help us

See all articles