Prevention of Cyber Attacks Using AI[First Draft]
Prevention of Cyber Attacks Using AI[First Draft]
1
Lipsa Das, 2 Neelanjan Mukherji, 3 Aditi Khatana, 4 Bhavika Singh
1, 2, 3, 4
Amity University, Greater Noida, UP, India
1
lipsaentc9@gmail.com, 2neelanjanmukherji88@gmail.com,
3
sakshikhatana.aaa@gmail.com, 4bhavikasingh2023@gmail.com
Introduction
Artificial intelligence is rapidly becoming a dominant influence on technology across
several industries. The past several years have demonstrated how different
companies are utilizing AI to help with a range of services. Artificial intelligence is
being utilized in many different industries due to its numerous applications. The
influence of these applications has made increased faith in AI technologies possible.
Artificial Intelligence (AI) has effectively addressed cybersecurity concerns, leading
to the development of a variety of highly efficient solutions. Most of these systems
have shown increased benefits and effectiveness through the use of AI. Because of
this, the widespread application of AI in developing a cyber attack defense has been
tested and shown to be effective. Thus, AI algorithms play a major role in building a
robust defense against cyber attacks.
Background
Over the past 20 years, the Internet has become a vital instrument for international
communication and has become ingrained in people's lives all over the world.
Globally, over 3 billion people use the internet, a statistic that is in part due to the
network's accessibility and affordability. Experts and other relevant parties now
prioritize cybersecurity due to the introduction of the Internet and the ongoing
digital transformation. The development of the internet was associated with a
significant global spike in cyber attack rates over a few years. Despite the fact that
the platform can be used for recreational and educational purposes, most hackers
use it to carry out different kinds of criminal activities. It is now increasingly harder to
catch these criminals since they use technology to commit their crimes.
Research Problems
Cybersecurity is currently one of the biggest issues in cyberspace. In order to
monitor network security in accordance with preset criteria, traditional safety
measures rely on the static control of security devices, such as firewalls, intrusion
prevention systems (IPSs), and intrusion detection systems (IDSs), deployed on
1
specific edges or nodes. The dated technology is retrograde, focusing mostly on
known attackers and attacks. This could lead to blind spots when recognizing odd
behavior in new attacks.
Enhancing the security level of vital system assets requires developing innovative
and smart security defensive tactics that can manage a range of persistent threats.
However, this passive defensive paradigm is no longer sufficient to protect systems
against new cyber security risks like Advanced Persistent Threats (APTs) and
zero-day assaults. Within computer science, the field of artificial intelligence (AI) is
growing quickly. The objective is to replicate, enhance, and broaden human intellect
by means of investigating and formulating theories, approaches, strategies, and
implementation frameworks.
Artificial intelligence (AI) has a wide range of applications beyond the three domains
of speech, image, and behavior. In the field of cyber security, it also has a variety of
other great uses, such as malware monitoring and intrusion detection. In the early
phases of AI research, machine learning (ML) technologies played a critical role in
combating online threats. Machine learning relies too heavily on feature extraction,
despite its immense potential. This flaw is particularly evident when it comes to the
realm of cyber security.
Research Objectives
Traditional cybersecurity methods can't keep up with the volume and sophistication
of modern cyberthreats, despite their relative effectiveness. Conventional
rule-based systems cannot manage new and evolving threats since they are based
on predefined patterns and fingerprints. Because cyber threats are dynamic,
real-time threat identification is required, and ML and AI are best equipped to fulfill
this demand. They have the capacity to promptly process incoming data streams,
assess the risk level of ongoing activities, and raise an alarm as soon as they detect
questionable activity. This proactive approach enables cybersecurity teams to
respond swiftly, preventing any attacks or minimizing their effects.
Based on AI's characteristics in comparison to existing technologies, the application
of AI in cybersecurity has produced a number of results. This has further enhanced
the numerous advantages that AI technology provides for protecting different
businesses. The several attributes listed also emphasize the crucial element that
adds AI technology's value for cybersecurity. Therefore, it makes logical sense to
build a solid defense using an AI system. A handful of the companies utilizing the
algorithms have noted an increase in the caliber of defense offered. The ability of the
technology to sustain high security levels gives the impression that the defense is
more effective. Therefore, the main factor influencing AI's efficacy in creating AI
technology is its very essence.
2
Methodology
The research employs a comprehensive methodology to investigate modern
cybersecurity techniques across several domains. The method consists of the
following essential components:
Data Collection
Our data collection sources include academic literature, industry reports, technical
documentation, case studies, and empirical data acquired from cybersecurity
vendors and research organizations. The primary data sources include scholarly
articles, whitepapers, and reports from reputable entities such as MITRE, NIST, and
cybersecurity conferences. Secondary data sources include publicly available
statistics, threat intelligence reports, and anonymized data acquired via
cybersecurity platforms and technologies.
Research Design
Our study utilizes a mixed-methods methodology, integrating qualitative and
quantitative methodologies to provide a thorough understanding of current
cybersecurity measures. Quantitative techniques include analyzing data, using
statistical models, and evaluating performance to measure the efficacy and
efficiency of cybersecurity systems and efforts. Qualitative methodologies include
literature research, case studies, and expert interviews to examine the theoretical
foundations, practical implementations, and emerging trends in cybersecurity.
3
Literature Review
4
used as a very effective means for the propagation of viruses. Engaging in
actions such as accessing the attachment in the email, browsing a website
that contains malicious software, executing a file, or seeing an infected
advertisement might result in the transmission of the virus to your machine.
Moreover, viruses may also be transmitted via contact with already infected
portable storage devices, such as USB drives. Viruses may easily infiltrate a
computer by bypassing its protection systems. In the event of a successful
breach, the user may face significant consequences, including the spread of
infection to other resources or system software, alteration or removal of
crucial features or programs, and the manipulation, deletion, or encryption of
data.
2. Trojan Horse
In the realm of computers, a Trojan horse is a kind of malicious software that
cunningly misleads users on its true intent. An attacker employs a kind of
harmful software, sometimes referred to as malware, to send an email to the
user's computer. The authenticity of this email seems to be valid; but, once it
is downloaded, the perpetrator acquires access to the system.
Trojans have the capability to facilitate an intruder in obtaining unlawful entry
to users' personal data, encompassing sensitive information such as banking
credentials, passwords, and network privileges. Ransomware assaults are
often carried out via a Trojan horse.
3. Spywares
Spyware is a kind of software that is surreptitiously installed on a user's
computer to clandestinely observe their actions and communicate this data to
a third party. User-monitoring software, akin to contemporary spyware, has
been present in several manifestations throughout the evolution of personal
computing.
Spyware comprises several forms, including Adware, Browser Hijackers,
Dialers, Drive-By Downloads, Scumware, and the well known term, Spyware.
Every variant has the inherent characteristic of being explicitly designed to be
installed on user computers for the purpose of promoting the commercial,
financial, or personal agenda of a third party.
4. Denial of Service (DoS)/ Distributed Denial of Service (DDoS)
A denial-of-service attack is a situation when the system's resources are
inundated, rendering it incapable of responding to service requests.
The compromised host system, under the command of a malicious actor,
launches a Distributed Denial of Service (DDoS) attack. This kind of
cyber-attack entails making the computer or network resources unavailable
to the intended user by interrupting the service of the host connected to the
internet. TCP SYN flood, teardrop attack, smurf attack, ping-of-death assault,
5
and botnets are several forms of Denial of Service (DoS) and Distributed
Denial of Service (DDoS) assaults.
A distributed denial-of-service (DDoS) attack is a kind of cyber assault in
which the attacker seeks to disable a web server by inundating it with an
overwhelming volume of traffic from a network of hacked machines, referred
to as a botnet. Traditional botnets are created by gaining illegal access to and
taking control of individual computers. The enhancement of PC's inherent
security features is making the construction of a typical botnet more difficult.
6
5. Man-in-the-middle Attack
7
input supplied by the programmer and then assessing possible attacks
against this intended structure.
7. Cross-site Scripting Attack(XSS)
A cross-site scripting attack occurs when an attacker illicitly obtains entry to a
website by inserting malicious JavaScript code into the input parameters on
8
the script on a victim's web browser inside the framework of the conduit web
application. The attack script is prohibited because the program intentionally
restricts the execution of scripts inside untrusted HTML. XSS defenses aim to
prevent undesired script execution by enforcing a stringent no-script policy
on untrusted HTML.
8. Brute Force
The advent of the internet has compelled computer users to establish
passwords for the purpose of accessing an email account, engaging in
e-banking, and retrieving emails, among several other activities. Passwords,
also known as watchwords, have been used for a prolonged period and
constantly safeguarded as classified data, limited to unauthorized persons
without authorization to enter a certain system or service.
Password cracking is the act of attempting to obtain unauthorized entry into a
system by guessing or deciphering passwords, either to retrieve a forgotten
password or with malevolent intentions. A user engages in a series of iterative
tries to guess the password until the correct password is successfully
identified. Multiple methods are available for illicitly gaining access to a
password.Here are few popular techniques for successfully cracking: Various
techniques used in computer security include dictionaries, hybrid
approaches, brute force methods, targeted brute force, and untargeted brute
force.
9
is limited to basic decision-making and lacks precise control. Moreover, it
disregards the contents of the package.
Application proxies use a unified protocol client and server to function as an
intermediary for transmitting high-level protocol data. Proxies have the ability
to do intricate tasks such as precise protocol control, content filtering, and
comprehensive logging by using high-level protocol data. Nevertheless, the
use of dual data connections, one on either side of the firewall, together with
the accompanying flow control overhead, results in a comparatively sluggish
performance. An additional complexity associated with application proxies is
their incapability to manage encrypted connections.
Stateful Packet Filtering is situated between application proxies and simple
packet filtering. Stateful filtering functions as a comprehensive packet filter
that is applied to connections as a whole, rather than to individual packets. It
recognizes and handles packets that pertain to the same connection in a
similar manner. In addition, stateful packet filters have enhanced
understanding of the content of higher-level protocols, allowing them to
make more informed decisions. Nevertheless, their principal activity continues
to be centered on individual packets. This technique is very efficient and
allows for a fundamental comprehension of applications, but requires
sophisticated programming in order to include new protocols.
10
Encryption at a rudimentary level safeguards the confidentiality and integrity
of data. However, increased use of encryption presents additional
complexities in the realm of cybersecurity. Encryption is used to safeguard
data throughout its transmission, such as while it is being sent across
networks like the Internet, ecommerce platforms, mobile phones, wireless
microphones, wireless intercoms, and so on. Therefore, by encrypting the
code, one may determine if there is any unauthorized disclosure of
information.
1. Defense-in-Depth
11
by relying on another. A well-optimized defense in depth architecture can
effectively prevent most attacks and rapidly alert an administrator of any
breaches that manage to evade the system.
Implementing a Defense in Depth approach is very effective in mitigating and
preventing automated assaults, since these attacks primarily focus on the
most vulnerable assets that are accessible over the public Internet. An active
attacker scenario, when a genuine adversary tries to exploit an information
asset, poses a more formidable task for analysis. The Defense in Depth
architecture offers several degrees of protection based on the origin of the
assault, whether it be internal or external.
To thwart an attacker's attempts to gain unauthorized access from the
internet, a defense in depth approach can be employed. This involves
implementing robust security measures such as Network Address Translation
(NAT), a firewall, a Demilitarized Zone (DMZ), and a gateway Intrusion
Detection System (IDS). Each of the stated security methods acts as an
obstacle that an attacker must surpass; even exceptionally skilled attackers
who lack motivation will be deterred by a variety of security measures.
12
2. Defense-in-Breadth
In the sphere of information security, the defense-in-breadth methodology
sprang out of nowhere and was largely ignored by government authorities.
Defense in Breadth promises to address symptoms but not the underlying
causes, making it look more like a patch for the Defense in Depth architecture
than a fully developed strategy. The Defense in Depth strategy is obviously
similar to the Defense in Breadth concept, but there are positive features to
each as well. Defense in Breadth is the strategic deployment of many security
solutions across various attack vectors to enable interception of assaults that
may be beyond the capabilities of individual systems.
The whole approach involves the installation of many antivirus software
applications on a single host in order to ensure that any vulnerabilities missed
by one program are detected by the others. Any competent administrator
would find it amusing to install several antivirus products, and Defense in
Breadth is unworkable for the same reasons that render this example flawed.
Companies such as F5 used the Defense in Breadth concept to provide
security technology to enterprises that were already safeguarded by other
firms.
The concept of Defense in Breadth is commendable, but its practical
implementation lacks coherence. Implementing many layers of security in
certain network segments requires managers to allocate a significant amount
of time and resources, which in turn leaves other network segments exposed
to potential threats. The parallel occurrence that led to the escalation of
internal risks with the advancement of redundant and layered perimeter
technology is also directly accountable for the surge in exterior vulnerabilities.
Implementing distinct security rules and distributing them across the network
are the only methods to ensure that a deliberate endeavor is being
undertaken to protect the network and data assets.
In theory, using both breadth and depth in defense may effectively mitigate
routing assaults. However, due to the substantial resource investment
required to protect against novel attack routes, this approach exhibits a
delayed adaptability and responsiveness to emerging threats. If firms were
able to allocate substantial financial resources towards addressing
information security concerns, the occurrence of prominent security breaches
would not see such a substantial rise. The security community is placing
blame on the regulations that oversee information security, which is causing a
shift away from compliance. It is essential for security system administrators
to assume accountability for issues related to implementation.
13
Artificial Intelligence
Artificial intelligence is a branch of computer science that focuses on developing
artificial creatures capable of emulating the cognitive processes of the human brain,
with the goal of automating fundamental tasks.
Types of AI
Artificial Intelligence may be broadly classified into two primary groups. The first
classification, denoted as Handcrafted Knowledge Systems, comprises deliberately
designed systems with explicit coding. Handcrafted Knowledge Systems are
software systems that use rules to encapsulate the knowledge of human experts
into a set of programmed rules that dictate the output based on a certain input.
These systems use traditional programming languages. The second group consists
of machine learning systems that are trained using large datasets. Machine learning
systems get information from training datasets and then use this trained system to
provide expected outcomes based on new operational data.
Machine Learning
Machine learning comprises three sub-disciplines: supervised learning,
unsupervised learning, and semi-supervised learning. In supervised learning, the
target class or label is pre-established, whereas in unsupervised learning, the target
classes are not predefined. Unsupervised learning entails the division of data into
separate clusters based on the observed similarity between data items.
Semi-supervised learning combines the characteristics of both supervised learning
and unsupervised learning.
Deep Learning
Deep learning is a kind of machine learning that aims to uncover complex patterns in
data by using hierarchical structures. This approach is becoming more popular and
has been widely used in several traditional artificial intelligence domains, such as
semantic parsing, transfer learning, natural language processing, computer vision,
and others.
Deep-learning techniques are a kind of representation-learning method that
consists of several layers of representation. These levels are formed by merging
fundamental, but non-linear components. Every module converts the representation
at a certain level, starting with the unprocessed input, into a representation at a
higher level that is relatively more conceptual. By amalgamating a sufficient quantity
of these alterations, it becomes feasible to acquire very complex functionality. In
classification issues, the higher layers of representation amplify the salient
14
characteristics of the input that are crucial for discerning between distinct
categories, while diminishing the influence of insignificant disparities.
An image is shown as an array of pixel values. The first layer of representation often
reveals learned characteristics that signify the existence or non-existence of edges
at certain orientations and locations within the picture. Typically, the second layer of
the system is intended to detect motifs by detecting certain patterns of edges,
disregarding slight variations in edge locations. The third layer has the capacity to
arrange motifs into larger combinations that symbolize distinct constituents of
identifiable entities, whilst the subsequent layers are accountable for recognizing
items based on these amalgamations of parts. Deep learning is characterized by the
automatic acquisition of layers of features from data, rather than being manually
constructed by human engineers, using a flexible learning process.
15
are integrated into various network firewalls to serve as security measures against
hackers.
The predictive capabilities of AI technology have shown their use in the field of
cybersecurity. Prediction has been recognized as one of the key properties and
applications of AI systems. This characteristic has been associated with the capacity
of AI technology to rapidly assess extensive amounts of data. In order to ensure that
it thoroughly analyzes the provided data and produces unique predictions based on
the system's training, the AI system may be consistently enhanced in a specific
manner. This capacity has been facilitated by the progress of machine learning.
Consequently, AI systems in the field of cybersecurity scrutinize data with the aim of
predicting cyberthreats. Furthermore, this approach ensures the achievement of
cybersecurity.
The prompt responsiveness of AI technology is a key feature that enhances its use in
the field of cybersecurity. AI algorithms are used in cybersecurity due to their rapid
response capabilities. Cybersecurity analysts demonstrate proficiency, but their
response to attacks may not always be immediate. Artificial intelligence (AI) systems
excel at reacting to such scenarios due to their quick learning and analyzing
capabilities. This functionality ensures that there has been no compromise to the
system or network. Hence, the integration of AI algorithms in cybersecurity systems
ensures significant improvement in reaction times and uncompromised data
protection.
AI in Firewall
Anomalous Pattern Recognition
Anomaly detection is a common operation carried out by intrusion detection
systems (IDSs). An Intrusion Detection System (IDS) using this methodology will
consistently monitor network traffic and compare the flow of network packets with
its understanding of usual network traffic.
When an unusual traffic pattern is detected, a timely alert will be sent to the network
administrator for immediate attention. Anomaly detection is pertinent not just to
intrusion detection, but also to infection surveillance. At the moment, it is not being
applied to the whole network traffic, but only to specific data points. An advanced
firewall designed to detect and counteract novel types of cyber assaults. The
number of packets is 61 in total. The upgraded virus monitor will examine data
packets in the usual way. Aside from scanning for known harmful-code patterns, the
system will also examine patterns that it considers potentially dangerous and react
accordingly, such as issuing a warning.
16
Neural Network Models
Presently, the predominant Intrusion Detection Techniques (IDSs) depend on
signature-based techniques. These systems function by using pre-established
descriptions of attack signatures. Various techniques for identifying data sources and
recognizing patterns are still used. However, several well described attacks may be
easily modified to display a variety of different signatures. In the event that the
database lacks comprehensive coverage of all variations, there exists a potential for
the inadvertent omission of a recognized attack. Various modern approaches
attempt to use tactics based on neural networks. To analyze attack spaces, a
hierarchical methodology is used, using back propagation (BP) neural networks (NN)
for the protocol and the self-organizing map (SOM) technique for anomaly
classification. Nevertheless, the research only relied on deliberately fabricated data.
Applies a conventional feed-forward multilayer perceptron network, namely a back
propagation neural network and time delay neural network, for the purpose of
identifying anomalies in programming.
An analysis is being carried out to assess the appropriateness of neural networks in
recognizing and classifying network activity utilizing limited, imperfect, and
nonlinear data sources. The neural network architecture integrates both multi-layer
perceptron (MLP) and hybrid variations, such as MLP + SOM.
17
each possessing distinctive attributes and merits that might be advantageous for
cybersecurity professionals. Machine learning approaches vary significantly, hence it
is essential for researchers to provide the appropriate data for optimal performance
of the ML-based system. Out of the six machine learning algorithms, two of them
stand out as exceptional for cybersecurity.
One approach is the use of Artificial Neural Networks (ANN). ANN, or Artificial Neural
Networks, are computational models designed to simulate the functioning of the
human brain. This approach employs processing nodes or neurons that establish
connections with one another, as well as with a concealed layer.
Artificial neural networks (ANNs) have the ability to identify intricate patterns that are
very challenging for humans to discern. Additionally, artificial neural networks have
the capability to identify ambiguous patterns. Utilizing Artificial Neural Networks
(ANN) in Intrusion Detection and Prevention Systems (IDPS) improves the overall
level of network security. Cybercriminals have acquired the ability to circumvent
security measures.
18
They possess the ability to execute assaults that evade system alarms, hence posing
a greater challenge for cybersecurity specialists to identify. For instance, when
fraudsters do a passive port scan, they imitate a genuine connection to identify open
ports. Nevertheless, an Artificial Neural Network (ANN) would possess the ability to
identify whether a connection is valid or not based on its connection patterns, and
then activate a security warning. Passive scans often initiate a connection but
promptly terminate it before it reaches completion, so avoiding detection as a
malicious activity.
The second approach used in machine learning is the Genetic Algorithm (GA). GA
detects hazards by using its understanding of previous instances of abnormal
occurrences. Similar to the human brain, individuals acquire information about the
hazards of fire from the accumulated experiences of those who came before them.
Geographic analysis (GA) is an invaluable technique for detecting widespread
hazards that exhibit repeated patterns. Thus, GA employs historical patterns to make
conclusions on new patterns that the system cannot recognize.
19
employs machine learning techniques to enhance the likelihood of identifying
botnets.
The first stage encompasses the process of acquiring or assimilating knowledge.
The training procedure employs a system that assigns labels and classifies data.
During this stage, the machine learning algorithm will gather data that is directly
associated with the DNS requests originating from the bots inside the botnet. During
the training phase, the machine learning algorithm retrieves the domain names from
the queries in order to train. The ownership of the domain names is with the
botmasters, who possess control over the devices inside the botnet. This stage
encompasses the preliminary processing of data. The machine learning system
utilizes the data obtained from the pre-processing stage to undergo training,
enabling it to acquire knowledge of patterns and effectively identify the botnet.
Classifiers are generated as part of the training process. Once the first phase reaches
this stage, it is prepared to proceed to the detection phase.
The detection phase represents the subsequent stage in the process. The detection
phase examines the outcomes obtained during the training phase. An examination of
the domain names uncovers a classifier that assesses the authenticity of the domain
name. The classifier differentiates between valid DNS requests and those associated
with a botnet.
Aymen Awadi and Bahari Belaton devised a strategy that comprises many steps.
Their approach largely depends on the use of Intrusion Detection Systems to detect
and ascertain the presence of botnets. The first stage of Awadi and Belaton's
approach employs a unique database mechanism based on signatures, which
contrasts with the approach used by Hoang and Nguyen. In phase two, Awadi and
Belaton collect data from the botnet and evaluate the current attacks, while Hoang
and Nguyen concentrate on acquiring botnet data in phase one and then turn their
emphasis to detection in phase two. The methodology devised by Awadi and
Belaton is very effective in identifying and detecting malicious assaults.
Nevertheless, it does not possess the capability to create data for identifying
changes in IP addresses and seemingly legitimate behaviors without the use of
machine learning.
Xuan and Nguyen validated the precision of their botnet detection techniques via
empirical experiments. Their approach included using conventional supervised
machine learning methodologies. The model used a variety of techniques, including
k-Nearest Neighbor (kNN), Random Forest (RF), Decision Trees (DT), and Naïve
Bayes (NB). The testing yielded significant discoveries, with the most noteworthy
algorithms examined being kNN and RF. The kNN algorithm had a mean accuracy of
90% in detecting botnets, whereas the RF technique demonstrated a mean accuracy
of 88%.
20
The Deep Learning Technique
Various other approaches have been suggested to enhance the precision of
detection. Deep Learning is a more intricate kind of Machine Learning, showcasing a
greater degree of intricacy. Deep learning (DL) is a neural network design that is
distinguished by the inclusion of a minimum of three hidden layers, as defined by
academics. Scientists feed data into the input layer of the deep learning neural
network. The input layer transmits the data to many hidden layers, which use
algorithms to generate potential outputs.
21
assesses both the errors and the anticipated results. The procedure utilizes an
iterative loop that concludes after it attains the defined intended outputs as outlined
by DBN.
When comparing with current intrusion detection systems, it is often seen that false
positives arise. In 2017, CRRC Qingdao Sifang co., LTD performed research in which
their simulations achieved an accuracy rate of 92.25%. The remaining 7.75% indicates
a decreased likelihood of false positives happening. Cybersecurity experts often
dedicate significant resources to carefully examine alerts generated by established
Intrusion Detection Systems (IDS) in order to confirm their validity as false positives.
Utilizing deep learning methods will reduce the likelihood of false positive rates,
hence improving both performance and detection capabilities.
22
Challenges and Future Directions
Future Directions
Several institutions have included AI training within their operations. The need for AI
specialists has significantly increased in the last decade due to the growing use of AI
technologies. It is advisable for cybersecurity professionals to have expertise in
artificial intelligence (AI). Each of these factors represents the growing potential of AI
in the field of cybersecurity. These tactics will ensure that cybersecurity defenses
are completely automated in the near future.
Therefore, the growing trend of incorporating AI into cybersecurity holds significant
promise for the progress of AI-powered cybersecurity. Companies are urged to use
the technology because of its effectiveness in improving security.
Conclusion
This study offers a thorough analysis of both conventional and contemporary
cybersecurity methods, as well as the effects of Artificial Intelligence. Machine
Learning and Deep Learning are beneficial for Intrusion Detection and Intrusion
Prevention Systems. However, AI is still seen as a nascent technology, which leads
enterprises to exhibit apprehension prior to embracing this significant advancement.
23
References
1. Sudar, K. Muthamil, et al. "Analysis of cyberattacks and its detection
mechanisms." 2020 Fifth International Conference on Research in
Computational Intelligence and Communication Networks (ICRCICN). IEEE,
2020.
2. Kim, S. H., Wang, Q.-H., & Ullrich, J. B. (2012). A comparative study of
cyberattacks. Communications of the ACM, 55(3), 66.
doi:10.1145/2093548.2093568
3. Biju, Jibi Mariam, Neethu Gopal, and Anju J. Prakash. "Cyber attacks and its
different types." International Research Journal of Engineering and Technology
6.3 (2019): 4849-4852.
4. Hussain, Sarfraz Nahid, and Mr N. Rana Singha. "A survey on cyber security
threats and their solutions." Int. J. Res. Appl. Sci. Eng. Technol 8.7 (2020):
1141-1146.
5. Stafford, Thomas F., and Andrew Urbaczewski. "Spyware: The ghost in the
machine." The Communications of the Association for Information Systems 14.1
(2004): 49.
6. Huang, K., Yang, L.-X., Yang, X., Xiang, Y., & Tang, Y. Y. (2020). A Low-Cost
Distributed Denial-of-Service Attack Architecture. IEEE Access, 1–1.
doi:10.1109/access.2020.2977112
7. Mallik, Avijit. "Man-in-the-middle-attack: Understanding in simple words."
Cyberspace: Jurnal Pendidikan Teknologi Informasi 2.2 (2019): 109-134.
8. Zheng, Yu, et al. "Dynamic defenses in cyber security: Techniques, methods
and challenges." Digital Communications and Networks 8.4 (2022): 422-435.
9. Gouda, Mohamed G., and Alex X. Liu. "Structured firewall design." Computer
networks 51.4 (2007): 1106-1120
10. Feng Qu, Jitao Zhang, Zetian Shao, and Shuzhuang Qi. 2017. An Intrusion
Detection Model Based on Deep Belief Network. In Proceedings of the 2017 VI
International Conference on Network, Communication and Computing (ICNCC
'17). Association for Computing Machinery, New York, NY, USA, 97–101.
https://doi.org/10.1145/3171592.3171598
11. Dash, Bibhu, et al. "Threats and Opportunities with AI-based Cyber Security
Intrusion Detection: A Review." International Journal of Software Engineering &
Applications (IJSEA) 13.5 (2022).
12.
13. Kaloudi, Nektaria, and Jingyue Li. "The ai-based cyber threat landscape: A
survey." ACM Computing Surveys (CSUR) 53.1 (2020): 1-34.
14.
24
15. Sewak, Mohit, Sanjay K. Sahay, and Hemant Rathore. "Deep reinforcement
learning for cybersecurity threat detection and protection: A review."
International Conference on Secure Knowledge Management in Artificial
Intelligence Era. Cham: Springer International Publishing, 2021.
16.
17. Shah, Varun. "Machine Learning Algorithms for Cybersecurity: Detecting and
Preventing Threats." International Journal of Advanced Engineering
Technologies and Innovations 1.3 (2021): 19-42.
18.
19. Vegesna, Vinod Varma. "Enhancing cyber resilience by integrating AI-Driven
threat detection and mitigation strategies." Transactions on Latest Trends in
Artificial Intelligence 4.4 (2023).
20.
21. Kaur, Ramanpreet, Dušan Gabrijelčič, and Tomaž Klobučar. "Artificial
intelligence for cybersecurity: Literature review and future research
directions." Information Fusion (2023): 101804.
22.
23. Parisi, Alessandro. Hands-On Artificial Intelligence for Cybersecurity:
Implement smart AI systems for preventing cyber-attacks and detecting
threats and network anomalies. Packt Publishing Ltd, 2019.
24. M. Luallen, and S. Hamburg (2009) Applying Security Defense-In-Depth,”
Control Engineering, 2009, pp. 49- 51.
25. Harel, Y., Gal, I., & Elovici, Y. (2017, May). Cyber Security and the Role of
Intelligent Systems in Addressing its Challenges. Retrieved from
http://delivery.acm.org/10.1145/3060000/3057729/a49-
harel.pdf?ip=100.14.153.157&id=3057729&acc=OPEN&key=4D4702B0C3E38B35.
4D
4702B0C3E38B35.4D4702B0C3E38B35.6D218144511F3437&__acm__=15432067
91_ d4a18011d3946afb2384998007d8ea6d
26. Cavelty, M. D. (2010). Cyber-security. The Routledge Handbook of New
Security Studies, 154-162.
27. 0. De Donno, M., Dragoni, N., Giaretta, A., Spognardi, A., Institutionen för
naturvetenskap och teknik, & Örebro universitet. (2018). DDoS-capable IoT
malwares: Comparative analysis and mirai investigation. Security and
Communication Networks, 2018, 1-30. doi:10.1155/2018/7178164
28. . Feizollah, A., Anuar, N. B., Salleh, R., Amalina, F., & Shamshirband, S. (2013). A
study of machine learning classifiers for anomaly-based mobile botnet
detection. Malaysian Journal of Computer Science, 26(4), 251-265.
29. Awadi, Aymen Hasan Rashid Al, & Belaton, B. (2015). Multi-phase IRC botnet
and botnet behavior detection model. doi:10.5120/11164-6289
25
30. Whitman, M. E., & Mattord, H. J. (2017). Principles of information security.
Boston, MA: Cengage Learning
31. Tecuci, G. (2012). Artificial intelligence. Wiley Interdisciplinary Reviews:
Computational Statistics, 4(2), 168-180. doi:10.1002/wics.200
32. Polson, N. G., & Sokolov, V. (2017). Deep learning: A bayesian perspective.
Bayesian Analysis, 12(4), 1275-1304. doi:10.1214/17-BA1082
33. Fortinet. (2018, September 14). Using AI to Address Advanced Threats That
LastGeneration Network Security Cannot. Retrieved from
https://ready.fortinet.com/networklead-rapidly-changing-advanced-threats/
using-ai-to-address-advanced-threats-that-lastgeneration-network-security-
cannot
34. A Sophos Article 04.12v1.dNA, eight trends changing network security by
James Lyne.
35. Cyber Security: Understanding Cyber Crimes- Sunit Belapure Nina Godbole
36. Computer Security Practices in Non Profit Organisations – A NetAction Report
by Audrie Krause.
37. A Look back on Cyber Security 2012 by Luis corrons – Panda Labs.
38. International Journal of Scientific & Engineering Research, Volume 4, Issue 9,
September-2013 Page nos.68 – 71 ISSN 2229-5518, “Study of Cloud
Computing in HealthCare Industry “ by G.Nikhita Reddy, G.J.Ugander Reddy
39. IEEE Security and Privacy Magazine – IEEECS “Safety Critical Systems – Next
Generation “July/ Aug 2013.
40. CIO Asia, September 3rd , H1 2013: Cyber security in malaysia by Avanthi
Kumar.
41. J. A. Roy, F. Koushanfar, and I. L. Markov, “Epic: Ending piracy of integrated
circuits,” in Proceedings of the conference on Design, automation and test in
Europe. ACM, 2008, pp. 1069–1074.
42. R. S. Chakraborty and S. Bhunia, “Harpoon: an obfuscation-based soc design
methodology for hardware protection,” IEEE Transactions on Computer-Aided
Design of Integrated Circuits and Systems, vol. 28, no. 10, pp. 1493–1502, 2009
43. J. Rajendran, M. Sam, O. Sinanoglu, and R. Karri, “Security analysis of
integrated circuit camouflaging,” in Proceedings of the 2013 ACM SIGSAC
conference on Computer & communications security. ACM, 2013, pp. 709–720.
44. P. Subramanyan, S. Ray, and S. Malik, “Evaluating the security of logic
encryption algorithms,” in 2015 IEEE International Symposium on Hardware
Oriented Security and Trust (HOST). IEEE, 2015, pp. 137–143.
26