Manjunatha B.N.
Ananda Babu J.
M.S. Rekha
Shreya Kulkarni
- Associate Professor, Department of Computer Science and Engineering, R.L Jalappa Institute of Technology, Doddaballapur, Karnataka, India
- Associate Professor, Department of Information Science and Engineering, Malnad College of Engineering, Hassan, Karnataka, India
- Assistant Professor, Department of Computer Science and Engineering, R.L. Jalappa Institute of Technology, Doddaballapur, Karnataka, India
- UG Student, Department of Computer Science and Engineering, R.L. Jalappa Institute of Technology, Doddaballapur, Karnataka, India
Abstract
Nowadays there are huge applications of IOT, cyberattack is extremely affecting all over world. To avoid cyberattacks, designing cyber security approach is today’s basic need. Artificial Intelligence (AI) has appeared as a powerful tool in the domain of cyber-security and can be accustomed to deal with cyber-security and cyber-threats. Cyber security is an incredibly growing field since last decade, there are many applications based on cybersecurity, eventually threats are accelerating. The paper will deliberate about the utilization of AI and implementation in cyber-security and annotate on the disadvantages.
Keywords: Artificial intelligence, cyber security, cyber- threats, block chain
[This article belongs to International Journal of Information Security Engineering(ijise)]
Browse Figures
References
- Jenis Nilkanth Welukar, Gagan Prashant Bajoria, “Artificial Intelligence in Cyber Security – A Review”, International Journal of Scientific Research in Science and Technology (IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 8 Issue 6, pp. 488-491, November-December
- Jagadeeshwar Podishetti and Kadapala Anjaiah, “Role of Artificial Intelligence in Cyber Security”, International Journal of Research in Advanced Computer Science Engineering, Volume No:3, Issue No:3 (August-2017), ISSN No : 2454-423X
- Ghosh, A. K., Michael, C., & Schatz, M. (2000). A real-time intrusion detection system based on learning program behavior. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 1907, 93–109.
- Shitharth, S.; Prasad, K.M.; Sangeetha, K.; Kshirsagar, P.R.; Babu, S.; Alhelou, H.H. An Enriched RPCO BCNN Mechanisms for Attack Detection and Classification in SCADA Systems. IEEE Access 2021, 9, 156297– 156312
- Akojwar, ; Kshirsagar, P. A Novel Probabilistic-PSO Based Learning Algorithm for Optimization of Neural Networks for Benchmark Problems. Wseas Trans. Electron. 2016, 7, 79–84.
- Nabeel Albishry, Rayed AlGhamdi, Abdulmohsen Almalawi, Asif Irshad Khan, Pravin Kshirsagar, undefined BaruDebtera, “An Attribute Extraction for Automated Malware Attack Classification and Detection Using Soft Computing Techniques”, Computational Intelligence and Neuroscience, vol. 2022, Article ID 5061059, 13 pages, 2022.
- Jude, A.B., Singh, D., Islam, S. et al. An Artificial Intelligence Based Predictive Approach for Smart Waste Management. Wireless Pers Commun (2021).
- Nabeel Albishry, Rayed AlGhamdi, Abdulmohsen Almalawi, Asif Irshad Khan, Pravin Kshirsagar, undefined BaruDebtera, “An Attribute Extraction for Automated Malware Attack Classification and Detection Using Soft Computing Techniques”, Computational Intelligence and Neuroscience, vol. 2022, Article ID 5061059, 13 pages, 2022.
- R. Chandan, P. R. Kshirsagar, H. Manoharan et al., “Substantial Phase Exploration for Intuiting Covid using form Expedient with Variance Sensor,” International Journal of Computers Communications & Control, vol. 17, no. 3, 2022.
Volume | 01 |
Issue | 02 |
Received | July 20, 2023 |
Accepted | July 30, 2023 |
Published | August 23, 2023 |