69-Article Text-98-1-10-20240220
69-Article Text-98-1-10-20240220
1
Research Scholar, Karnavati University, Gandhinagar
2
Assistant Professor, Unitedworld School of Law, Karnavati University
Email:202303003@karnavatiuniversity.edu.in, pranay@karnavatiuniversity.edu.in
ABSTRACT
Information technology (IT) advances have led to an increase in the amount of cybercrimes
that criminals are committing through the usage of cyberspace. Cyber infrastructures are very
susceptible to hacking and attacks. For the purpose of monitoring and safeguarding these
facilities, human interaction and physical tools are inadequate. We need more advanced cyber
protection systems that are resilient, adaptable, and long-lasting. Artificial intelligence
computing techniques are becoming more and more significant in cyberdetection and
prevention of crime. In order to combat cybercrimes, this paper will examine the state of the
art in this area, suggest future directions for research, and demonstrate how these techniques
could be helpful in identifying and averting cyberattacks.
1|Page
INTRODUCTION
Since information technology (IT) has advanced, criminals are utilising cyberspace to carry out
a growing number of cybercrimes. Important concerns regarding privacy and information
security are brought up by the growing trends in complicated distributed and Internet
computing. Cyber infrastructures are incredibly vulnerable to attacks and hacking. More
advanced IT that can detect abnormal behaviors and imitate typical ones is required for the
monitoring and defence of these infrastructures, as physical tools like sensors and detectors are
insufficient. These cyber defence systems must be strong, versatile, and adaptive in order to
identify a wide range of threats and make wise judgements in real time [1, 2]. Human connection
is just insufficient for a timely analysis of the attack and an appropriate reaction due to the
volume and velocity of cyberattacks. Computer-generated forces must be able to manage the
entire assault response process, including quickly and effectively identifying targets,
determining the nature of the attack, and determining the best course of action. They also need
to know how to prioritise and stop follow-up attacks [3].
Moreover, cyberattacks are global in nature. They are an international threat that is becoming
more and more dangerous for all computer systems worldwide.Previously, only highly
educated experts could commit cybercrimes, but as the Internet has grown, almost anybody can
now obtain the knowledge and tools required to commit these crimes. The hard-wired logic
used by traditional fixed algorithms to make decisions is no longer sufficient to defend against
dynamic cyberattacks.Because of this, we need innovative approaches to combat cybercrimes,
such applying Artificial Intelligence (AI) technologies, which give software flexibility and
learning capabilities. (4),(5)
AI offers all of these choices in addition to many more.It has been demonstrated that the
application of artificial intelligence (AI) computer techniques, such as fuzzy logic, heuristics,
machine learning, neural networks, intelligent agents, artificial immune systems, and
computational intelligence, significantly aids in the detection and prevention of
cybercrime.Artificial intelligence (AI) can be used to create autonomous computing systems
that can self-manage, self-tune, self-configure, self-diagnose, and self-heal in accordance with
the requirements of their specific use cases. AI techniques appear to be a particularly promising
field of research for information security in the future, since they aim to improve cyberspace
security measures [2, 6, 7].
2|Page
The objectives of this study are to demonstrate how these tactics could be useful in detecting
and preventing cyberattacks, to highlight the improvements made in the application of AI
approaches to combat cybercrimes, and to lay out the framework for future research.
Our quality of life has greatly improved and many new conveniences have been added thanks
to the quick development of internet and computer technology.However, it also raised
challenging issues, such as the emergence of novel forms of criminal activity. For instance,
due of information technology, common crimes like theft and fraud have given rise to new
categories of crimes called "Cyber Crimes".Additionally, when this technology advances,
criminal situations also change. Since technology makes it simple for thieves to carry out their
schemes, we are dealing with an increasing quantity and diversity of cybercrimes every day.
Information technology also makes it easier to monitor, identify, stop, or apprehend
cybercriminals by eliminating national borders and facilitating the globalisation of these crimes
[8, 9, 10]
.
Criminals are using information technology more and more, both as a tool and as a target. The
use of electronics and other high-tech equipment by criminals makes crimes simple and
inexpensive. All information systems created for the good of humanity, including phones,
computers, and the Internet, are vulnerable to criminal activities.Information technology
system crimes frequently target computers, servers, websites, email accounts, bank accounts,
personal information, and digital records of both public and private institutions. These offenses
are also known as "computer crimes," "Internet crimes," "crimes of information technologies,"
"digital crimes," and "network crimes." Even though the term "cybercrime" is now widely
used, its exact definition is unclear.
The majority of definitions in use today were created through experimentation. "Any crime
that is facilitated or committed using a computer, network, or hardware device" is what Gordon
and Ford (2006) define as cybercrime. A computer or device "may be the agent of the crime,
[12]
the facilitator of the crime, or the target of the crime." Reference . "Criminal activity or a
crime that involves the Internet, a computer system, or computer technology" is how
Dictionary.com defines cybercrime [13]. Cybercrime is "crime that occurs when computers or
3|Page
computer networks are involved as tools, locations, or targets of crime," according to Fisher
and Lab (2010) [14].
People are utilizing computers and the Internet for socializing, working, sharing, buying, and
other activities, which is causing an exponential increase in the volume of digital data that is
recorded on a daily basis. The boundaries of language and country have disappeared, and there
is now more traffic in the virtual world than ever before. Since the idea of crime is there
whenever one deals with people, cyberspace has also become associated with the idea of crime
and criminals [11]. According to Brenner (2010), the majority of cybercrimes that occur
nowadays are merely the result of real-world crimes moving online, where they are used as a
weapon by criminals to carry out traditional crimes in novel ways. [15]
At Dartmouth College's Summer Research Project, the field of artificial intelligence (AI),
originally known as machine intelligence, was founded in July 1956. Artificial intelligence
(AI) can be defined as (i) a science that aims to build intelligent computers and comprehend
the nature of intelligence, or (ii) a science that finds intelligent solutions to complex problems.
(such choosing the right course of action after analyzing a lot of data).
When it comes to leveraging AI for cyber defense, we are more intrigued by the second idea.
Making machines (computers) mimic intelligent human behaviour, such as thinking, learning,
reasoning, planning, etc., is a topic of research interest in artificial intelligence (AI) [5, 7, 16].
The more general problem of duplicating intelligence has been subdivided into more
manageable, targeted problems, each with specific traits or capabilities that a sophisticated
system ought to possess. The qualities that have drawn the greatest attention are as follows [17,
18, 19]
:
a) Deduction, reasoning, and problem solving (including embodied agents, neural networks,
and statistical approaches to artificial intelligence);
4|Page
d) Learning (machine learning);
In distributed resolution problems, the process of solving the problem depends on agent
cooperation and information exchange. These notions gave rise to the idea of intelligent multi-
agent technology. A self-contained cognitive being that is conscious of its environment is
called an agent. It possesses an internal decision-making process that collaborates with other
agents and can operate autonomously. A collection of mobile autonomous agents collaborates
intelligently and pro-actively to solve a particular problem or class of problems in multi-agent
systems. They are able to make decisions, interact with other agents, and comprehend their
environment to some extent. Although multi-agent technology has various uses, this study will
solely look at its use in cyber intrusion security.
Inspired by biological immunity systems that can continuously and dynamically learn in
changing surroundings, artificial intelligence systems, or AISs, are computational models. The
immune system is in charge of identifying and eliminating invaders in living things. In
applications for computer security in general and intrusion detection systems (IDSs) in
particular, artificial intelligence systems (AISs) are made to resemble natural immune systems
[20]
.
5|Page
Based on the idea of evolutionary computation, genetic algorithms are machine learning
techniques that mimic the course of natural selection. They are another example of artificial
intelligence (AI) technology. They offer optimum, flexible, and resilient solutions, even for
intricate computational issues. They can be employed to create rules for the categorization of
security assaults and to create customised rules for various security attacks within intrusion
detection systems [21, 22].
Despite the development of numerous techniques (as safe protocols, firewalls, antivirus
programs, and encryption.) for data security across networks and the Internet, hackers are
continually coming up with new ways to breach network systems.
An intrusion detection and prevention system (IDPS) is a hardware or software device that is
installed inside the network and has the ability to both detect and attempt to prevent possible
intrusions (see Fig. 1). IDPSs offer four essential security features:
keeping an eye out for, identifying, evaluating, and reacting to unauthorised activity [23, 24].
6|Page
7|Page
When artificial neurons are paired together, they may learn and solve problems, forming
Artificial Neural Networks (ANNs). When solving problems involving conditionality,
imprecision, and ambiguity all at once, neural networks come in handy. These networks are
capable of self-organization, learning, interpretation of dispersed data, and adaptation.
Neural networks with a huge number of artificial neurons have the capacity to learn in
massively parallel and make decisions quickly, which makes them ideal for learning patterns,
classifying information, and choosing attack responses [5, 7].
To effectively defend against major threats, an IDPS needs to include a few specific features.
Among these traits are the following [25]:
Scholarly resources that are currently available demonstrate the wide range of uses of AI
approaches in the fight against cybercrimes. Neural networks, for example, are being used in
intrusion detection and prevention, but they are also proposed to be used in malware
categorization, forensic investigations, computer worm detection, spam detection, zombie
detection, Denial of Service (DoS) detection, and spam detection [5]. Modern anti-virus
software has also incorporated AI techniques as AISs, Heuristics, Data Mining, and Neural
Networks [7].
Intelligent agent technology is used by many IDSs, occasionally even in tandem with mobile
agent technology. To find questionable cyber activity, mobile intelligent agents can move
between collection stations [2].
8|Page
According to Wang et al. (2008), heuristic technology—defined as "the knowledge and skills
that use some methods to determine and intelligently analyse codes to detect the unknown virus
by some rules while scanning"—will play a major role in anti-virus detection in the future [7].
This section will provide a quick overview of pertinent studies in addition to a few current uses
of artificial intelligence methods for cyber defense.
An artificial neural network (ANN) is a computer process that mimics the functional and
structural traits of neural networks seen in biological nervous systems. They work well in
scenarios requiring control, categorization, or prediction in dynamic, intricate computer
settings [26].
Chen (2008) developed NeuroNet, a neural network system that gathers and analyzes dispersed
data, synchronizes critical network device functions, searches for anomalies, generates alarms,
and starts remedial action. NeuroNet is effective against distributed DoS attacks that target
low-rate TCP, according to experiments [27].
Linda et al. (2009) gave the initial presentation of the Neural Network-based Intrusion
Detection System.
modelling (IDS-NNM), which has demonstrated the ability to identify every attempt at
intrusion in network communication while preventing false alarms [28].
For improved intrusion detection in networks, Barika et al. (2009) provided a thorough
architecture of a distributed IDS based on an artificial neural network [29].
Itikhar et al. (2009) employed neural network analysis to examine denial-of-service attacks.
Their research shown that, compared to alternative methods, their neural network methodology
detects DoS attacks more precisely and accurately [30].
9|Page
In 2009, Salvador et al. presented a unique neural network-based zombie PC detection
technique.
In 2010, Bitter et al. introduced a range of host-based and network-based intrusion detection
systems, with a particular emphasis on artificial neural network-based systems that identify
potentially hostile and suspicious traffic [26].
The neural network-based intrusion detection system (IDS) created by Al-Janabi and Saeed
(2011) can quickly identify and categorise a variety of threats [33].
Barman and Khataniar (2012) have investigated the creation of neural network-based IDSs.
According to their testing, the system they suggested has intrusion detection rates that are
comparable to those of other IDSs on the market, but it can detect DoS attacks at least 20.5
times faster [34].
Autonomous computer-generated entities known as intelligent agents interact with one another
to exchange information and work together to organise and carry out suitable actionsin the face
of unanticipated events. It makes sense to use intelligent agent technologies to stop
cyberattacks because of its collaborative nature, mobility, and adaptability in the situations in
which they are used.
Rowe (2003) created a "counterplan" system that uses multi-agent planning and a few cutting-
edge inference techniques to stop specific cyberattack strategies [35].
A multi-agent system called MWDCM is used in metropolitan area networks to detect and
contain computer worms, was created by Gou et al. (2006). Worms that crash routers and use
a lot of network bandwidth are immediately stopped from spreading.
The results of the studies shown that, even at high worm infection rates, their method
successfully prevents worm propagation [36].
A distributed agent coalition system was introduced by Phillips et al. (2006) to safeguard
distributed electric power grids from attacks, mistakes, and hostile insiders while maintaining
regular operations and implementing operational and security strategies [37].
10 | P a g e
system, which they then used to automatically and manually tackle distributed denial-of-
service (DoS) attacks [4].
A system for cooperative and adaptive defence measures against Internet threats was presented
by Kotenko and Ulanov in 2007. They use intelligent multi-agent modeling and simulation as
the foundation for their approach, where groups of intelligent agents communicate with one
another and modify their configuration and behaviour in response to the strength of assaults
and the state of the network. They looked into distributed DoS assaults and defences to test
their methodology. The findings demonstrated that intelligence agent groups' capacity for
cooperation and adaptation significantly increases defence effectiveness [38].
A flexible and adaptable Connectionist for mobile visualization An intrusion detection system
based on agents was proposed by Herrero et al. (2007). It helps with intrusion detection in
dynamic networks. Artificial neural networks are the method that intelligent agents utilise to
find network intrusions [39].
An abstract model based on multi-agent technology and inspired by the biological immune
system was presented by Fu et al. (2007) for anomaly identification in networks. In order to
respond to intrusions and lessen the harm and infection, they applied it to the host and network
layer [40].
According to Edwards et al.'s 2007 research, intelligent agent technology has the ability to
enhance power grid response and operation while thwarting known threats and lessening or
eliminating their effects.
They demonstrated a prototype of the Multi-Layered Security Model (MLSM), which offers
defence against erroneous input as well as the capacity to identify and counteract unidentified
attack tactics (such as hostile input from the Internet or local agent disruption) [41].
Kotenko et al. (2010) investigated multi-agent based methods for analyzing and countering
botnets, which are expanding quickly on the Internet and are utilized in a range of cyberattacks,
including distributed denial-of-service attacks, vulnerability scanning, and massive spam e-
mail campaigns. They offered a framework description and implementation for these systems
[42]
.
an AIS-based ad hoc network security architecture that makes use of several agents, divided
into two categories: counterattack and detection agents.was made available by Ye and Li in
2010. Their design integrates the advantages of intelligent agent technology and AIS,
11 | P a g e
improving mobile ad hoc network security and protection. Its characteristics include dispersion,
expandability, self-adaptation, and self-learning [43]. In order to defend power grid automation
systems against cyberattacks, which can originate from internal networked sources or the
Internet,In 2010, Wei and colleagues introduced a theoretically layered approach. A constituent
of their structure comprises security agents, a subset of which have intelligence and may
identify invasive occurrences and actions within the controllers.
Testing a prototype of the suggested method produced findings that demonstrated the system's
potential to control and lessen a few prevalent power grid automation system security issues
[44]
. Security Audit as a Service is the name of a cloud-based incident detection system (SaaS),
that was first developed by Doelitzscher et al. (2011). Their technology is built on intelligent
autonomous agents that understand the underlying business processes of deployed cloud
instances; this allows for cross-customer event monitoring of a cloud infrastructure to be
supported and flexible [45].
A distributed intrusion detection system (IDS) was proposed by Shosha et al. (2011) to detect
cyber intrusions in Supervisory Control and Data Acquisition (SCADA) networks. The system
is built on community collaboration among several agents.The suggested design includes the
SCADA network topology as well as connection limitations [46].
Ionita and Ionita (2013) proposed employing data mining to detect network intrusions using a
multi-intelligent agent-based technique [47]
Maintaining stability in a dynamic environment is their function, just like that of biological
immune systems, which form the basis of adaptive immune systems (AISs). Antigens and
immuneocytes (self-tolerance, clone, variation, etc.) are simultaneously identified in immune-
based intrusion detection. The immune system produces antibodies to fight diseases, and
differences in the amount of these antibodies can be used to gauge the extent of invasion. AISs
are therefore essential in the study of cyber security [48]
An strategy for spam identification based on AIS-based email feature extraction was presented
by Sirisanyalak and Sornil (2007). The results of the performance evaluation revealed that the
suggested method is significantly more efficient in spam detection than other current systems,
with very low false positive and false negative rates (0.91% and 1.95%, respectively) [49].
12 | P a g e
As a reaction to threats in wireless mesh networks, Lebbe et al. (2007) proposed using hazard
theory (DT) in AIS during their examination of various intrusion detection system (IDS)
models. They classified network hazards using Self-organizing Maps (SOMs) as
classifiers.Their experiments verified their suggestion to apply DT to wireless mesh network
security [50].
Hong (2008) presented a hybrid learning technique based on AIS for anomaly detection in
computer systems [20].
Gianini et al. (2009) argued that ambient intelligence should be included in the AIS paradigm
for computer system security. Their extended model can give perceptual functions and
detecting capabilities in conjunction with device intelligence (for example, multimodal sensor
system interpretation) [51].
EshghiShargh (2009) investigated alternative IDS designs based on AISs to investigate the
advantages of AISs in particular and AI in general for enhancing IDSs .The findings
demonstrated how the AIS approach to IDS design would be beneficial for future applications
[52]
.
An antivirus system based on AIS was introduced by Chao and Tan (2009). "Strong detection
ability and good generalisation performance" are attributes of the recommended viral detection
system, according to the trial results [53].
Danforth (2009) studied the idea of expanding AISs for web server attack classification, which
might provide system administrators with a warning about the severity of the assault and aid in
the mitigation of direct attacks [54].
An AIS-based security framework with distributability, robustness, second response, and self-
recovery features was presented by Mohamed and Abdullah (2009) for mobile ad hoc
networks. Their method addressed a number of issues, including scalability and bandwidth
conservation, that were found in earlier pertinent studies [55].
Qiang and Yiqian (2010) presented a network security situation evaluation methodology based
on AIS. This model can both quantitatively and in real time assess the security state of the
system and provide the necessary assistance for real-time defence measure changes.
Theoretical study and testing demonstrated the model's efficiency in real-time anomaly
detection for network security [56].
13 | P a g e
A self-learning intrusion response mechanism based on AIS that can identify and categorise
unknown threats was proposed by Rui and Wanbo (2010). A dynamic reaction decision-making
mechanism is part of their approach, which may adjust defensive methods in response to
environmental changes and maintain system safety at the lowest possible cost.The trials
demonstrated that their model possesses traits such as self-adaptation, rationality, quantitative
computation, and efficient intrusion response [48].
Endy et al. (2010) employed SOMs to visualise data topology in order to do cluster analysis on
cyber terrorism textual texts [57].
Yang et al. (2011) introduced a network security evaluation model based on AIS theory for
quantitative analysis of the degree of intrusion risk level, and demonstrated its advantages over
existing network security evaluation models [58].
Liu et al. (2011) created an AIS-based intrusion detection system in an Internet of Things (IoT)
environment by mimicking self-adaptation and self-learning mechanisms through dynamic
environment adaptation..According to the study of their proposal, their model provides a novel
effective intrusion detection method for the Internet of Things [59].
To enhance smart grid cyber security, Zhang et al. (2011) presented SGDIDS, a novel
hierarchical distributed intrusion detection system. Among the features of their system is an
intelligent module that employs AIS to identify and categorise malicious data and possible
cyberthreats. The simulation results demonstrated that their technique is useful for detecting
malicious network traffic and increasing system security [60].
Ansari and Inamullah (2011) suggested an AIS-based upgrade for anomaly detection and
demonstrated how their model improves AIS performance in applications such as anomaly
detection, security, error detection, and data mining in mobile ad hoc networks [61].
Fang et al. (2012) suggested a phishing detection AIS based on memory and mature detectors.
According to the analysis, their approach is unique, more versatile, and adaptive than other
[62]
existing phishing detection systems .IISGP is a novel AIS-based approach for Smart Grid
protection presented by Mavee and Ehlers (2012).
They wanted to create a bio-inspired AIS model for intrusion detection, access control, and
anomaly detection in critical infrastructures that are increasingly reliant on cyber technology
14 | P a g e
[63]
. A unique agent-based intrusion detection solution for wireless networks was created by
Kumar and Reddy in 2014 to identify and prevent intrusions by preventing or delaying
transmission across the intrusive channels. Information is collected by the system from multiple
nodes and combined using an evolutionary artificial intelligence system (AIS). According to
the experimental results, the system is highly suited for intrusion detection and prevention in
wireless networks [64].
A genetic algorithm-based learning technique for anomaly detectors to detect possible threats
was presented by Kim et al. in 2004. They demonstrated the efficiency of their approach in
intrusion detection using an artificial computer security system [65].
A fuzzy host-based intrusion detection system utilizing data mining techniques and the
underlying operating system capacity was proposed by Sekeh and Bin Maarof (2009). The
simulation results revealed that the suggested system enhances performance while decreasing
database size, time complexity, and false alarm rate [66].
The suggested method may manage heterogeneous databases with both discrete and continuous
features, potentially mining significant class-association rules for improved intrusion detection.
It is also flexible and effective for anomaly and misuse detection in networks. Experiments and
evaluation of the suggested method showed that it gives competitively high detection rates
when compared to other machine-learning techniques [67].
GAIDS, a Genetic Algorithm Rule-Based Intrusion Detection System, was presented by Ojugo
et al. (2012) with the intention of improving system integrity, security, availability, and
confidentiality in networked contexts. The proposed system employs a set of classification
rules derived from network audit data, as well as the support-confidence framework, which is
employed as a fitness function to assess the quality of each rule [68].
Hassan (2013) created an intrusion detection system (IDS) that uses fuzzy logic and a genetic
algorithm to efficiently identify various forms of intrusive activity taking place within a
network. Because it may update rules in response to the discovery of new invasive actions, the
system is both adaptable and economical. The results of the experiments and evaluations
revealed that the suggested system obtained a reasonable intrusion detection rate [69].
15 | P a g e
A fuzzy genetic algorithm-based network intrusion detection system was presented by
Jongsuebsuk et al. (2013). Data related to network attacks is classified using fuzzy rules, and
the process of choosing the optimal fuzzy rule is optimised via evolutionary algorithms.
According to the evaluation results, the suggested IDS can detect network attacks in real-time
(or within 2-3 seconds) when data arrives to the detection system, with a detection rate of more
than 97.5% [70].
A fuzzy intrusion detection system based on anomalies was developed by Chaudhary et al.
(2014) to identify packet dropping attacks in mobile ad hoc networks. The simulation results
indicated that the proposed system can identify packet dropping attacks with high positive and
low false positive rates across all mobile node speed levels [71].
Benaicha et al. (2014) expanded the genetic algorithm-based network intrusion detection model
by including an upgraded initial population and a selection operator. In a manageable period
of processing time, this model generated a subset of potential assaults by optimizing the search
for attack scenarios in audit files. They used a genetic algorithm technique because it improves
performance and lowers false positives [72].
Further Applications of AI
Machado and colleagues introduced a unique mobile intelligent agent and AIS-based network
intrusion detection model in 2005. They also showed that their method can differentiate
between different types of attacks, breaches in security, and other security lapses. The
experimental results demonstrated that their model is a major improvement over earlier work
in the field [74].
Pei and Song (2008) presented a hybrid technique that combines fuzzy-detectors with immune
algorithms' searching power to improve intrusion detector performance in intrusion detection
systems. The studies demonstrated the immune algorithm's superior searching capacity.
16 | P a g e
Fuzzy detection algorithms were also shown to reduce detector frangibility and enhance
detection precision [75].
Zhou (2009) created a way to create an intrusion detection model that can identify abuse as
well as abnormalities by fusing AIS methods with neural networks. The evaluation and testing
findings revealed that intrusion detection accuracy was high with a low false alarm rate [76].
Neural networks and AISs are recommended for computer system threat detection (Golovko
et al., 2010).They detailed the ideas and architecture of such a system [77].
Elsadig et al. (2010) presented a revolutionary method for bio-inspired intrusion prevention
and self-healing systems. They presented a unique AIS-based intrusion prevention system
(IPS) that employs an intelligent multi-agent system for non-linear classification to detect,
prevent, and cure detrimental or dangerous events in a network system [78].
AIS-based intrusion detection system (IDS) was introduced by Zhou et al. (2011) to fight
viruses with "virus." They implanted "virus" and cloned variations of "virus" into immune IDSs
using e-learning to strengthen system immunity and reduce invasion or attack behaviours [79].
Ou et al. (2011) proposed ABAIS, a multi-agent based AIS for IDSs with memory and learning
capabilities. Either the computer host or the security operating centre activates the immune
response to harmful activities. The experimental findings demonstrated that ABAIS can detect
malicious intrusions successfully [80].
Meng (2011) developed a security-coordination model for artificial homeostasis based on his
research on the Neuro-Endocrine-Immune system's holistic intelligence. A prototype of the
model was used to create an e-governance system. According to the findings, an artificial
homeostatic model can combine many security solutions to coordinate intrusion detection,
security management, and the prevention of possible assaults or system security vulnerabilities
[81]
.
Dove (2011) examined the drawbacks of merely searching the cyber world for well-known
attack patterns and the identification of anomalous behavior. He proposed that these problems
may be handled by creating a model that uses a sense-making hierarchy to reduce false positive
rates and continuously learns and re-profiles typical behavior. The architecture is built on
biological immune system-inspired process patterns mixed with hierarchical sense-making [82].
17 | P a g e
A host-based, multilayered intrusion detection system including biological influences was
proposed by Jiang et al. (2011). Sequential pattern recognition and several detection engines
serve as its foundation. The outcomes showed that, in comparison to other current methods,
their model can accurately identify the location where anomalies are likely to occur and can
discern between damaging attacks and unfamiliar actions with ease. They also claimed that
their research lays the groundwork for a smart and computationally simple real-time strategy
to detecting unknown malware and harmful attacks in large-scale complicated networks [83].
Ferreira et al. (2011) introduced an intrusion detection system (IDS) that utilizes the widely
used Knowledge Discovery and Data Mining (KDD) framework in conjunction with wavelet
and artificial neural networks (ANN). Their experiment demonstrated a high rate of intrusion
detection [84].
A basic network-based intrusion detection and prevention system (IDPS) that employs a variety
of machine learning methods to identify and categorize network threats was first presented by
Wattanapongsakorn et al. (2012). They tested it in an online network environment, and the
findings shown that the suggested IDPS quickly and accurately detects the two main types of
attacks: probing attacks and denial-of-service (DoS) attacks, in addition to automatically
defending the computer network against attacks. Additionally, it worked well against
unidentified types of network intrusions [85].
Aziz et al. (2012) created a network intrusion detection system with inspiration from AIS. using
deterministic-crowding niching and genetic algorithm-generated detectors. Their overall
average detection rate was 81.74% [86].
An innovative IDPS that may provide solutions for cloud computing intrusion detection and
prevention–a prime target for potential cyberattacks—was introduced by Patel et al. (2013).
They defined the following needs for an ideal cloud-based IDPS: self-management of
autonomic computing, ontology, risk management, and fuzzy theory [24].
GAAIS, a dynamic intrusion detection technique for mobile ad hoc networks based on genetic
algorithms and artificial intelligence, was introduced by Barani (2014). GAAIS can adjust to
changes in network topology on its own. The suggested system's performance was examined
for detecting a number of routing attack types, including wormhole, blackhole, neighbour,
surging attacks and flooding. The experimental findings showed that it is more efficient than
similar approaches [87].
18 | P a g e
AI Applications' Advantages for IDPSs.
Superiority over complicated and difficult differential equations; Resistance to noise and
inadequate data; Versatility and flexibility with learning models Intuitiveness - since they are
based on biological neural networks [26].
Intelligent Agents Mobility; Helpfulness - they always try to complete activities with opposing
goals; Rationality - in attaining their goals; Adaptability - to the surroundings and the
preferences of the user; Collaboration entails being aware that a human user can make mistakes
and present ambiguous or omitted information; consequently, they should not accept
instructions without first considering and verifying for inconsistencies with the user [4].
Distributed learning and parallelism relate to the use of parallelism and data network
connectivity injobs that need removal and detection. self-adaptability and self-organization—
updating invasion markers on their own without help from humans; worldwide stability; The
goal of selective response is to eliminate hostile activity in the most efficient manner possible.
A detector node must produce a statistically distinct collection of non-self-detectors in order to
be deemed varied. reduction in the utilization of resources Multi-layered structure: Since
numerous tiers of diverse structures are in charge of keeping an eye on a given area, attackers
are unable to successfully carry out their destructive activities by neglecting a single layer.
Disposability entails not relying on a single component that can be easily replaced by another
[52, 56, 88]
.
19 | P a g e
Current Anomaly Detection/Prevention System Limitations
Though they have significant flaws that need to be corrected, anomaly detection systems are
able to discover attacks that were previously unreported. The main issue is that it is challenging
to develop an accurate model of appropriate behavior and attack levels. Normal behavior is
subject to quick and easy alteration, which may result in a high rate of false positive alarms.
These alerts may be the consequence of unusual behavior that is both acceptable and typical.
Other constraints are as follows [25, 26, 29]:
• A wide-ranging training set of typical system operations is required for the anomaly detection
system to be able to characterise normal patterns and develop a model of normal behaviour.
•If a lawful action is mistakenly categorized as harmful by the detection and prevention system,
it might have serious consequences as it will attempt to change or stop it.
•No matter how good an intrusion detection system is, if an attacker figures out how to work
it, they can turn it off.
• There is also the difficulty of integrating information from diverse sources in heterogeneous
contexts.No matter how good an intrusion detection system is, if an attacker figures out how to
work it, they can turn it off.
Cyber security should be given far more attention. Given human limits and the intelligence of
agents such as computer viruses and worms, network-centric environments necessitate
intelligent cyber sensor agents (or computer-generated forces) that detect, evaluate, and
respond to cyber-attacks in real time [3].
Thinking forward and doing more research will be necessary when using AI techniques for
cyber defence.Since network-centric warfare poses a challenge to knowledge management,
research on the use of modular and hierarchical information architecture in decision-making
software seems promising. Automated knowledge management is the only approach to
guarantee superior decision-making and quick scenario analysis.
It's also feasible that the Singularity—the ultimate goal of AI research—will be reached in the
not-too-distant future when artificial general intelligence is produced, which is defined as "the
technological creation of smarter-than-human intelligence." Nonetheless, it is critical that we
20 | P a g e
have the ability to deploy stronger AI technologies in cyber defence than the perpetrators do
[5]
.
Furthermore, much more study is required before we can build trustworthy, deployable
intelligent agent systems capable of managing distributed infrastructures. Future research
should look for a theory of group utility function that will allow groups of agents to make
decisions [37].
Future work on improving IDPSs will make advantage of new techniques and unsupervised
learning algorithms, be evaluated jointly in order to construct hybrid IDPS, which will increase
anomalous performance detection of intrusions [85].
There are various ethical and legal issues that develop as a result of computer security and
forensics.
Technology is rapidly evolving. Online power struggles and privacy concerns are a couple of
these issues.
Due process issues from an ethical or legal perspective. Numerous moral and legal concerns
The questions such as "to what extent can an artificial neural network replace human
judgement", "to what degree do we want to allow technology to take human roles" and "what
legal precedent can be applied to machines" need to be addressed [91].
Conclusion
Our lives have been greatly improved by the tremendous progress of information technology,
which has brought us several conveniences, but it also introduced uncontrollable problems, like
the increase in cybercrime. The evolution of criminal proceedings keeps pace with
technological advancements. The quantity and variety of cybercrimes are rising daily as a result
of new technology that makes it easier for thieves to accomplish their goals. Particularly at risk
is critical infrastructure.
Since artificial intelligence (AI) approaches allow IDPS software flexibility and learning
capabilities, they are already being utilized to support humans in the battle against cybercrime.
21 | P a g e
It's clear that decision-making procedures involving a large amount of knowledge consumption
require intelligent decision assistance when it comes to cyber defense, and AI technology may
successfully give this support.
Scholarly research indicates that AI techniques can be used in many different contexts to stop
cybercrime. The use of AI approaches to fight cybercrime has advanced recently, and this paper
has evaluated those developments, along with their desired features and current limits, as well
as the potential for further research.
REFERENCES
22 | P a g e
• X. B. Wang, G. Y. Yang, Y. C. Li, D. Liu, (2008)” Review on the application of
Artificial Intelligence in Antivirus Detection System”, IEEE Conference on
Cybernetics and Intelligent Systems, pp. 506 509.
• N. Doğan, (2008) “Türkiye’de Bilişim Suçlarına Bakış”, Popüler Bilim, Vol. 8, No. 3,
pp. 14-17.
23 | P a g e
• Artificial Intelligence, Wikipedia, http://en.wikipedia.org/wiki/Artificial_intelligence,
(24/11/2014)
24 | P a g e
• L. Ondrej, T. Vollmer, M. Manic, (2009) “Neural Network Based Intrusion Detection
System for Critical Infrastructures”, Proceedings of International Joint Conference on
Neural Networks, pp. 1827 1834.
• F. Barika, K. Hadjar, N. El-Kadhi, (2009) “Artificial neural network for mobile IDS
solution”, Security and Management, pp. 271–277.
• X. Gou, W. Jin, D. Zhao, (2006) "Multiagent system for worm detection and
containment in metropolitan area networks", Journal of Electronics, Vol. 23, No. 2, pp.
259-265.
25 | P a g e
Autonomous Intelligent Systems: Agents and Data Mining (AIS-ADM 2007), Springer-
Verlag, Berlin Heidelberg, vol. 4476, pp. 212– 228.
• D. Wei, Y. Lu, M. Jafari, P. Skare, K. Rohde, (2010) “An Integrated Security System
of Protecting Smart Grid against Cyber Attacks”, Innovative Smart Grid Technologies
(ISGT), pp. 1 7.
• I. Ionita, L. Ionita, (2013) "An agent-based approach for building an intrusion detection
system," 12th International Conference on Networking in Education and Research
26 | P a g e
(RoEduNet), pp.1-6. International Journal of Artificial Intelligence & Applications
(IJAIA), Vol. 6, No. 1, January 2015 37
• M. Danforth, (2009) “Towards a Classifying Artificial Immune System for Web Server
Attacks”, International Conference on Machine Learning and Applications, pp. 523 –
527.
27 | P a g e
• H. Qiang, T. Yiqian, (2010) “A Network Security Evaluate Method Base on AIS”,
International Forum on Information Technology and Applications (IFITA), Vol. 2, pp.
42 – 45.
• J. Yang, T. F. Wang, C. M. Liu, B. Li, (2011) “Improved Agent Model for Network
Security Evaluation Based on AIS”, Fourth International Conference on Intelligent
Computation Technology and Automation (ICICTA), Vol. 1, pp. 151 – 154.
28 | P a g e
• G.V.P. Kumar, D.K. Reddy, (2014) "An Agent Based Intrusion Detection System for
Wireless Network with Artificial Immune System (AIS) and Negative Clone
Selection," International Conference on Electronic Systems, Signal Processing and
Computing Technologies (ICESC), pp. 429-433.
• M. A. Sekeh, M. A. Bin Maarof, (2009) "Fuzzy Intrusion Detection System via Data
Mining Technique with Sequences of System Calls," Fifth International Conference on
Information Assurance and Security (IAS '09.), Vol.1, pp.154-157.
• A.A. Ojugo, A.O. Eboka, O.E. Okonta, R.E Yoro (Mrs), F.O. Aghware, (2012)
“Genetic Algorithm Rule-Based Intrusion Detection System (GAIDS),” Journal of
Emerging Trends in Computing and Information Sciences, Vol. 3, No. 8, pp. 1182 –
1194. International Journal of Artificial Intelligence & Applications (IJAIA), Vol. 6,
No. 1, January 2015 38
29 | P a g e
• A. Chaudhary, V. N. Tiwari, A. Kumar, (2014) "Design an anomaly based fuzzy
intrusion detection system for packet dropping attack in mobile ad hoc networks," IEEE
International Conference on Advance Computing (IACC), pp. 256-261.
• Y. P. Zhou, (2009) “Hybrid Model based on Artificial Immune System and PCA Neural
Networks for Intrusion Detection”, Asia-Pacific Conference on Information
Processing, Vol. 1, pp. 21 – 24.
30 | P a g e
• Z. S. Jing, S. W. Li, R. Hui, C. Z. Ting, Y. Yu, (2011) “Research of Intelligent Immune
Intrusion Detection System About Combating Virus with “Virus”, IEEE 2nd
International Conference on Software Engineering and Service Science (ICSESS), pp.
753 756.
• C.M. Ou, Y.T. Wang, C.R. Ou, (2011) “Intrusion Detection Systems Adapted from
Agent-based Artificial Immune Systems”, IEEE International Conference on Fuzzy
Systems, pp. 115 – 122.
• E.W.T. Ferreira, G.A. Carrijo, R. de Oliveira, N.V. de Souza Araujo, (2011) "Intrusion
Detection System with Wavelet and Neural Artifical Network Approach for Networks
Computers," Latin America Transactions, IEEE (Revista IEEE America Latina) , Vol.
9, No. 5, pp. 832-837.
31 | P a g e
• F. Barani, (2014) "A hybrid approach for dynamic intrusion detection in ad hoc
networks using genetic algorithm and artificial immune system," Iranian Conference
on Intelligent Systems (ICIS), pp.1 6.
32 | P a g e