International Journal of Computer & Organization Trends (IJCOT) | |
|
© 2022 by IJCOT Journal | ||
Volume - 12 Issue - 2 | ||
Year of Publication : 2022 | ||
Authors : Alex Mathew | ||
DOI : 10.14445/22492593/IJCOT-V12I2P302 |
Citation
MLA Style: Alex Mathew . "Use of AI in Cybersecurity Applications toward Advanced Defensive Security Discipline " International Journal of Computer and Organization Trends, vol. 12, no. 2, May-Aug. 2022, pp. 6-8. Crossref, https://doi.org/10.14445/22492593/IJCOT-V12I2P302
APA Style: Alex Mathew . (2022). Integrated Access Control System of Face Recognition and Non-Contact Temperature Measurement Based on Arduino. International Journal of Computer and Organization Trends, 12(2), 6-8. https://doi.org/10.14445/22492593/IJCOT-V12I2P302
Abstract
Based on the technological developments in the world and the increased risk of cyber-attacks, utilizing the most recent technology to achieve security is necessary. Identifying the threat can be challenging, and several methods and algorithms have been suggested, including reinforcement, supervised, and unsupervised learning. The strategic plan for implementing AI includes the automation of available infrastructure to ensure that the available labor resources are utilized efficiently. Additionally, running the IT infrastructure on a 24-hour basis seals loopholes that can be used to compromise the integrity of the entire system. Time and physical resources are required to smoothen the process of AI implementation. Additionally, defense tactics can be used, including model alteration, change data, and support resources. Consequently, it is important to look at the technical approach that can be used to incorporate AI into the cyber defense system.
Keywords
Cybersecurity, Technology, Algorithm, Defense, Artificial intelligence (AI).
References
[1] R. Das and R. Sandhane, "Artificial Intelligence in Cyber Security," Journal of Physics: Conference Series, Vol. 1964, 2021.
[2] R. Das and R. Sandhane, "Artificial Intelligence in Cyber Security," Journal of Physics: Conference Series, Vol. 1964, 2021. [2] M. E. Bonfanti, Artificial Intelligence and Cybersecurity: A Promising But Uncertain Future, 2020. [Online]. Available: Https://Www.Realinstitutoelcano.Org/En/Analyses/Artificial-Intelligence-and-Cybersecurity-A-Promising-But-Uncertain-Future/
[3] T. C. Truong, Q. B. Diep, and I. Zelinka, "Artificial Intelligence in the Cyber Domain: Offense and Defense," Symmetry, Vol. 12, Pp. 410, 2020.
[4] A. H. Althobyti, S. M. Alhusayni, and S. M. Alzahran, "Defense By Artificial Intelligence in Cyber Attack," International Journal of Scientific Engineering and Science, Vol. 5, Pp. 35-40, 2021.
[5] B. Herron, "Implementing Security Controls to Iot Wireless Technologies," Giac (Gccc) Gold Certification, 2022.
[6] M. Raney, "Threat Hunting: This Is the Way,” Giac (Gccc) Gold Certification, Pp.1-22, 2021.
[7] J. Li, "Cyber Security Meets Artificial Intelligence: A Survey," Frontiers of Information Technology & Electronic Engineering, Vol. 19, Pp. 1462-1474, 2018.
[8] F. Kamoun, F. Iqbal, M. A. Esseghir, and T. Baker, "Ai and Machine Learning: A Mixed Blessing for Cybersecurity," 2020 International Symposium on Networks, Computers and Communications (Isncc), 2020.
[9] C. Benzaid, and T Taleb, "Ai for Beyond 5g Networks: A Cyber-Security Defense Or Offense Enabler?" Ieee Network, Vol. 34, Pp. 140-147, 2020.
[10] Evans Mwasiaji, Kenneth Iloka, "Cyber Security Concerns and Competitiveness for Selected Medium Scale Manufacturing Enterprises in the Context of Covid-19 Pandemic in Kenya," Ssrg International Journal of Computer Science and Engineering, Vol.8, No.8, Pp.1-7 2021. Crossref,Https://Doi.Org/10.14445/23488387/Ijcse-V8i8p101.
[11] J. Johnson, "Artificial Intelligence & Future Warfare: Implications for International Security," Defense & Security Analysis, Vol. 35, Pp. 147-169, 2019.
[12] D. Ventre, "Artificial Intelligence and Defense Issues," Artificial Intelligence, Cybersecurity and Cyber Defense, Pp.105-186, 2020.
[13] S. Gavaskar, E. Ramaraj, R. Surendiran, “A Compressed Anti Ip Spoofing Mechanism Using Cryptography,” Ijcsns International Journal of Computer Science and Network Security, Vol. 12, No. 11, Pp.137-140, 2012.
[14] Booz Allen Hamilton, The Role of Artificial Intelligence in Cybersecurity, 2021. [Online]. Available: Https://Www.Boozallen.Com/S/Insight/Publication/Role-of-Artificial-Intelligence-in-Cyber-Security.Html.