HARNESSING ARTIFICIAL INTELLIGENCE FOR ENHANCED CYBER SECURITY
Main Article Content
Abstract:
Effective cybersecurity management requires significant automation to handle the complexity and volume of information involved. Traditional technologies with fixed implementations are often inadequate for combating security threats. Machine learning methods in AI offer a solution to this challenge. This paper presents an overview of various AI applications in cybersecurity and assesses their potential to strengthen defense mechanisms. Our review reveals that valuable AI tools are already in use for network protection and other cybersecurity areas through neural networks. However, some cybersecurity challenges can only be effectively addressed by employing AI strategies. For example, comprehensive data is essential for strategic decision-making, and the need for logical decision support remains a critical unresolved issue in cybersecurity.
Article Details
How to Cite:
References:
Use of Artificial Intelligence Techniques / Applications in Cyber Defense. (n.d.). Retrieved 14 August, 2020, from https://www.researchgate.net/publication/333477899_Use_of_Artificial_Intelligence_Techniqu es_Applications_in_Cyber_Defense.
Ahmad, I., Abdullah, A. B., & Alghamdi, A. S. (2009). Application of artificial neural network in the detection of DOS attacks. SIN’09 - Proceedings of the 2nd International Conference on Security of Information and Networks, 229–234. https://doi.org/10.1145/1626195.1626252.
Bai, J., Wu, Y., Wang, G., Yang, S. X., & Qiu, W. (2006). A novel intrusion detection model based on multi-layer self-organizing maps and principal component analysis. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3973 LNCS, 255–260. https://doi.org/10.1007/11760191_37 .
Bitter, C., North, J., Elizondo, D. A., & Watson, T. (2012). An introduction to the use of neural networks for network intrusion detection. Studies in Computational Intelligence, 394, 5–24. https://doi.org/10.1007/978-3-642-25237-2_2.
Carrillo, F. A. G. (2012). ¿Can Technology Replace the Teacher in the Pedagogical Relationship with the Student? Procedia - Social and Behavioral Sciences, 46, 5646–5655. https://doi.org/10.1016/j.sbspro.2012.06.490.
Chang, R. I., Lai, L. Bin, & Kouh, J. S. (2009). Detecting network intrusions using signal processing with query-based sampling Filter. Eurasip Journal on Advances in Signal Processing, 2009. https://doi.org/10.1155/2009/735283.
Chatzigiannakis, V., Androulidakis, G., & Maglaris, B. (2004). A Distributed Intrusion Detection Prototype using Security Agents. HP OpenView University Association, June 2014.
Chmielewski, M., Wilkos, M., & Wilkos, K. (2010). Building a multiagent environment for military decision support tools with semantic services. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6070 LNAI(PART 1), 173–182. https://doi.org/10.1007/978-3-642-13480- 7_19.
Corral, G., Llull, U. R., Herrera, A. F., Management, H., Ignasi, S., & Llull, U. R. (2007). Innovations in Hybrid Intelligent Systems {--} Proceedings of the 2nd International Workshop on Hybrid Artificial Intelligence Systems (HAIS’07). 44/2008(June 2014). https://doi.org/10.1007/978-3-540-74972-1.
Feyereisl, J., & Aickelin, U. (2009). S Elf -O Rganising M Aps. August, 1–30.
Ghosh, A. K., Michael, C., & Schatz, M. (2000). A real-time intrusion detection system based on learning program behavior. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 1907, 93–109. https://doi.org/10.1007/3-540-39945-3_7.
Hosseini, R., Qanadli, S. D., Barman, S., Mazinani, M., Ellis, T., & Dehmeshki, J. (2012). An automatic approach for learning and tuning gaussian interval type-2 fuzzy membership functions applied to lung CAD classification system. IEEE Transactions on Fuzzy Systems, 20(2), 224–234. https://doi.org/10.1109/TFUZZ.2011.2172616.
IOS Press. (n.d.). Retrieved 14 August 2020, from https://www.iospress.nl/book/algorithmsand-architectures-of-artificial-intelligence/.
Kotenko, I., & Ulanov, A. (2007). Multi-agent framework for simulation of adaptive cooperative defense against internet attacks. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 4476 LNAI, 212–228. https://doi.org/10.1007/978-3-540-72839-9_18.
Kotenko, I. V, Konovalov, A., & Shorov, A. (2010). Agend-based Modeling and Simulation of Botnets and Botnet Defense. In Conference on Cyber Conflict (pp. 21–44). http://ccdcoe.org/229.html.
Kotkas, V., Penjam, J., Kalja, A., & Tyugu, E. (2013). A model-based software technology proposal. MODELSWARD 2013 - Proceedings of the 1st International Conference on ModelDriven Engineering and Software Development, 312–315. https://doi.org/10.5220/0004348203120315.
Pachghare, V. K., Kulkarni, P., & Nikam, D. M. (2009). Intrusion detection system using self organizing maps. 2009 International Conference on Intelligent Agent and Multi-Agent Systems, IAMA 2009, 4(12), 11–16. https://doi.org/10.1109/IAMA.2009.5228074.
Parati, N., & Anand, P. (2017). Machine Learning in Cyber Defence. International Journal of Computer Sciences and Engineering, 5(12), 317–322.
[19] Primbetov, A. (2024). Automatic Red Eye Remover using OpenCV. Modern Science and Research, 3(1), 1-3.
Primbetov, A., Saidova, F., Yembergenova, U., & Primbetov, A. (2024). REAL TIME LOGO RECOGNITION USING YOLO ON ANDROID. Modern Science and Research, 3(1), 1-5.
Abbaz, P. (2024). REAL TIME LOGO RECOGNITION USING YOLO ON ANDROID. Eurasian Journal of Academic Research, 4(7S), 1094-1099.
Giyosjon, J., Anvarjon, N., & Abbaz, P. (2023). SAFEGUARDING THE DIGITAL FRONTIER: EXPLORING MODERN CYBERSECURITY METHODS. JOURNAL OF MULTIDISCIPLINARY BULLETIN, 6(4), 77-85.
ОБУЧИТЕ YOLOV8 НА ПОЛЬЗОВАТЕЛЬСКОМ НАБОРЕ ДАННЫХ Примбетов Аббаз,Саидова Фазилат,Нормуминов Анваржон, Примбетов Азиз, https://doi.org/10.5281/zenodo.8023689
DEVELOP AN APPLICATION THAT CONVERTS VIDEOS INTO SLIDES UTILIZING BACKGROUND ESTIMATION AND FRAME DIFFERENCING IN OPENCV Primbetov Abbaz, Abdusalomov Shaxbozbek, To‘lqinov Oybek, Rahmonova Mahbuba, Pardaboyeva Mohichexra. https://doi.org/10.5281/zenodo.13364871

