Survey of AI in Cybersecurity For Information
Survey of AI in Cybersecurity For Information
Assistant Professor, Computer Science & Engineering, Sunrise University, Alwar, Rajasthan
Abstract:
Cyber security is the practice of protecting computers, servers, mobile devices, electronic systems,
networks, and data from malicious attacks. It's also known as information technology security.
A. Network security is the practice of securing a computer network from hackers and crackers whether
targeted attackers.
B. Application security focuses on keeping software and devices free of threats. A compound
application could provide access to the data its designed to protect.
C. C. Information security protects the integrity and privacy of data, both in storage as well as in transit.
D. Operational security includes the processes and decisions for handling and protecting data edge. The
permissions users have when accessing a network and the procedures that determine how and where
data may be stored or shared .
The means of cyber is the technology that includes system, networks, programs and data.
The means of security is concerned with the protection of system, networks, applications and information.
In such a case we can say that electronic information security or information technology security. In other
words cyber security is set of principles and practices designed to protect or computing resources and
online information against threats.
Types of cyber security
a. Mobile security
b. Identity management
c. Information or
d. Data security
e. Application security
f. Network security
g. Cloud security etc.
Artificial intelligence: artificial intelligence is a set of technology is that enable computers to perform a
variety of advanced functions including the ability to see ,understand and translate spoken and written
language, make recommendations and more.
Types of artificial intelligence:
Artificial intelligence can be divided based on capabilities and functionalities.
There are three types of artificial intelligence based on capabilities
a. Narrow AI
b. General AI
c. Super AI
I. Introduction
Importance of cyber security in the digital world can't be understand. To understand why it is important to
learn about cyber security you must first know how is solid cyber security system helps and products
students, businesses, organisations and the banking sector.
Cyber security is important for students because they often target cyber attacks. In a recent cases, a group
of students from a college in the United States targeted by the hackers who gained access to their personal
information including their social security numbers and credit card information .The hackers then used
the information to frequently charged thousands of dollars to the students credit cards. The students left
with massive debt and had to spend months repairing their credit. If students personal information is
stolen in a cyber attacks it could be used to commit identify theft.
Real life example of importance of cyber security for the banking sector is the 2014 JP Morgan chess data
breach. in this breach hackers gained access to the names, address, phone number, and email address of
76 million households and 7 millions business to the account information including account number send
83 millions JP Morgan Chase customers. This breach highlights importance of cyber security for the
banking sector as hackers were able to gain access to large amount of customer data. If this data had fallen
into the wrong hands, it could have been used for identity theft or other malicious purposes.
In this paper, we propose to research on the following questions: What is the current status of research in
this area? What are the major issues of AI in cybersecurity for business? Currently what kinds of AI
techniques are useful in this area? What are the advantage and disadvantage for applying AI techniques in
this field?
expansion has led to an increase in criminal activity such as identity theft, hacking, pornography,
credit card fraud, and the forged use of official documents.
To curb this growing problem, society needs a body of cyber law. Cybercrime in India increased
by more than 5% from 2019 levels in 2021, as reported by the country’s National Crime Records
Bureau (NCRB). Cyber law is expanding to include virtually every facet of online wrongdoing. A
legal framework for dealing with cybercrime is provided. Cyber law also encompasses any and all
issues involving the internet as a subject of law.
The Information Technology Act of 2000 governs cyber law in India. It also establishes the
definition of a critical information infrastructure. In 2008, the law was revised. India is among the
select group of nations with e-commerce regulations. The government in India has taken measures
to improve cyber security and establish India as a global hub for the coordination of efforts to
combat cybercrime.
B. Drawbacks of AI in cybersecurity
Among the top drawbacks of investing in AI for cybersecurity is the expense of AI adoption efforts. With
LLMs, for example, acquiring applications, integrating them into an organization's IT systems, and then
monitoring and maintaining them will be a very expensive process, Vartanian said. Another significant
drawback is that, at least for the foreseeable future, AI will be resource intensive. In addition to the
underlying infrastructure, AI security models require extensive and diverse training data, as well
as personnel who understand how to operate and maintain those models and software programs. "This is
something to be watched carefully by CIOs, because we have a lack of enough people who really
understand the technology," Vartanian said sufficient data, AI systems can produce incorrect monitoring
results and false positives. And these risks can have real consequences for organizations. "Companies are
being damaged by AI systems that are formally trained on bad data," Vartanian said. "That can lead to
bias in the output, and bias in the output often leads to lawsuits and reputational harm. But most
fundamentally, it can just lead to the wrong answer. "Because of these concerns, CIOs must consider AI
in light of their organization's cybersecurity strategy, the anticipated costs and the potential rewards before
implementation.
a. Deep Learning
A set of Techniques for implementing machine learning that recognize patterns of patterns -• like image
recognition. The systems identify primarily object edges, a structure, an object type, and then an object
itself. The point is that Deep Learning is not exactly Deep Neural Networks. There are other algorithms,
which were improved to learn patterns of patterns, such as Deep Q Learning in Reinforcement task.
to environment changes.
VIII. Algorithm
A. Create Public Key
Select two prime no's. Suppose P = 41 and Q = 57.
Now First part of the Public key : n = P*Q = 2337.
We also need a small exponent say e :
But e Must be
An integer.
Not be a factor of Φ(n).
1 < e < Φ(n) [Φ(n) is discussed below],
Let us now consider it to be equal to 2.
IX. Conclusion
In conclusion, artificial intelligence systems will continue to rise in importance and level of usage. Not
only have the business applications been discussed, but personal use as well. These systems are growing
and advancing past initial expectations, providing us with the inference that they will soon be more widely
applicable and accessible to even the standard consumer. It is already used in our daily lives through the
different organizations and entities that we trust our 2019 IEEE Technology & Engineering Management
Conference (TEMSCON) information to, but we see this technology becoming more of a ‘household”
item regarding personal, unprotected devices we all possess. While artificial intelligence research is
currently taking place every single day, these studies will continue to grow in scope and size. The major
issues regarding loopholes, innovative hackers, and losing that human element of interpretation will
continue to diminish and become less noticeable as these systems become more advanced. Artificial
intelligence is the base of today’s best anomaly detection systems and will expand into different sections
of cyber-security as they develop. This new automation provides us terrific intrusion detection abilities
while identifying false positives and using predictive analysis to keep information more safe online. With
a wide range of neural networks, both ANN’s and DNN’s, and expert systems continuing to be released,
the future for AI within cyber-security looks bright. This means that the future of the safety of our sensitive
information looks bright as well.
Acknowledgement
The work is supported by Dr. S.P. Singh Faculty NIMS University.
References
1 Concanon, K., Williams, R., Feehan, D., Uvin, J., Yudin, M., Foster, D., … Monje, C. (2016). Federal
Partnership regarding career pathways [PDF letter]. Retrieved
from https://careerpathways.workforcegps.org/~/media/WorkforceGPS/careerpathways/Files/Career
%20Pathways%20Joint%20Letter%202016.pdf
2 Conklin, W., Cline, R., & Roosa, T. (2014, March 10). Re-engineering Cybersecurity Education in the
US: An Analysis of the Critical Factors. Retrieved from http://ieeexplore.ieee.org/document/6758852/
Control-Alt-Hack(R). (n.d.). Retrieved from http://www.controlalthack.com/
3 Costanzo, J. (2017). Hampton Roads Cybersecurity Education, Workforce, and Economic
Development Alliance (HRCyber) Mid-Project Report “Bridging the cybersecurity talent gap in
Hampton Roads” [PDF]. Retrieved from http://securitybehavior.com/hrcyber/doc/HRCyber%20Mid-
Project%20Report.pdf
4 Consortium Enabling Cybersecurity Opportunities and Research. (n.d.). K-20 Cybersecurity - CECOR
Project . Retrieved from http://cset.nsu.edu/programs/k20cybersecurityCyberbit Protecting a New
Dimension. (2017). Cyberbit Range The First Hyper-Realistic Simulation Platform for Cyber Security
Experts [PDF]. Retrieved
from https://www.infosecurityeurope.com/__novadocuments/362748?v=636315473978100000