Skip to main content

Cyber Security with AI–Part II

  • Chapter
  • First Online:
The "Essence" of Network Security: An End-to-End Panorama

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 163))

Abstract

Internet practice has become an essential part of human life. Without Internet, even a miniscule work may not be finished. On the contrary various forms of cybercrimes or network, outbreaks are also increasing with the same rhythm and swiftness. In this crucial time protection of information on the cyber world has become an enormous task. Therefore, everyone should have knowledge of different strong security dealings to protect their information. The Artificial Intelligence approaches are applied on existing data to constantly improve its functionalities and tactics over time. It studies and comprehends standard user behavior with the ability to detect the smallest amount of dissimilarity from the given outline. Nonetheless, besides collecting information to perceive and classify threats, an artificial intelligence system also uses gathered information to advance its own functionalities. It is difficult to create software with standard algorithms or hardware for successful alarms against the network attacks which are powerfully designed. It is obvious that several cyber security issues are additionally coming day by day. So, it is into consideration that artificial intelligence applications may be incorporated with cyber security computing issues to analyze the improvements against cyberattacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Patil P (2016) Artificial intelligence in cyber security. Int J Res Comput Appl Robot 4(5):1–5. ISSN 2320–7345

    Google Scholar 

  2. Ashok Kumar D, Venugopalan SR (2017) Intrusion detection system: a review. Int J Adv Res Comput Sci 8(8). ISSN No. 0976-5697

    Google Scholar 

  3. https://def.camp/artificial-intelligence-cybersecurity

  4. Abomhara M, Køien GM (2015) Cyber security and the Internet of Things: vulnerabilities, threats, intruders and attacks. J Cyber Secur Mobility 4(1):65–88. https://doi.org/10.13052/jcsm2245-1439.414

  5. Cherdantseva Y et al (2016) A review of cyber security risk assessment methods for SCADA systems. Comput Secur 56:1–27. https://doi.org/10.1016/j.cose.2015.09.009

  6. Vadza K (2013) Cyber crime & its categories. Indian J Appl Res 3(5):130–133. https://doi.org/10.15373/2249555X/MAY2013/39

  7. Romagna M (2019) Hacktivism: conceptualization, techniquesand historical view. In: The Palgrave handbook of international cybercrime and cyber deviance, pp 1–27

    Google Scholar 

  8. https://www.abusix.com/blog/the-importance-of-network-security-in-any-organization

  9. https://consoltech.com/blog/why-network-security-is-more-important-than-ever/

  10. Wright J, Harmening J (2009) 15 Computer and information security handbook. Elsevier Inc., Morgan Kaufmann Publications, p 257

    Google Scholar 

  11. Salahdine F, Kaabouch N (2019) Social engineering attacks: a survey. Future Internet. https://doi.org/10.3390/fi11040089

  12. Pawar M, Anuradha J (2015) Network security & types of attacks in network. Procedia Comput Sci 48. https://doi.org/10.1016/j.procs.2015.04.126

  13. Denning DE (2012) Stuxnet: what has changed? Future Internet. https://doi.org/10.3390/fi4030672

  14. Nazreen Banu M, Munawara Banu S (2013) A comprehensive study of phishing attacks. Int J Comput Sci Inf Technol 4(6):783–786

    Google Scholar 

  15. Distributed denial of service attacks. Internet Protocol J 7(4). Cisco

    Google Scholar 

  16. Sahu SS, Pandey M (2014) Distributed denial of service attack: a review. I. J. Mod Educ Comput Sci 1:65–71. https://doi.org/10.5815/ijmecs.2014.01.07

  17. https://www.us-cert.gov/ncas/tips/ST04-015

  18. Singh A, Junefa D (2010) Agent based preventive measure for UDP flood attack in DDoS attacks. IJEST 2(8):3405–3411

    Google Scholar 

  19. https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/

  20. Bogdanoski M, Risteski A (2011) Wireless network behavior under ICMP ping flood DoS attack and mitigation techniques. Int J Commun Netw Inf Secur (IJCNIS) 3(1):17–24

    Google Scholar 

  21. Vishwakarma R, Jain AK (2020) A survey of DDoS attacking techniques and defense mechanisms in the IoT network. Telecommun Syst 73:3–25. https://doi.org/10.1007/s11235-019-00599-z

  22. Selvara V (2018) Distributed denial of service attack detection, prevention & mitigation service on cloud environment. J Comput Eng Inf Technol 7:2. https://doi.org/10.4172/2324-9307.1000204

  23. Suroto (2017) A review of defense against slow HTTP attack. Int J Inform Vis 1(4). ISSN: 2549-9904

    Google Scholar 

  24. Dragoni N et al (2018) DDoS-capable IoT malwares: comparative analysis and Mirai investigation. Secur Commun Netw. https://doi.org/10.1155/2018/7178164.

  25. Gupta BB, Badve OP (2017) Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a Cloud computing environment. Neural Comput Appl 28:3655–3682. https://doi.org/10.1007/s00521-016-2317-5

    Article  Google Scholar 

  26. Baitha AK, Vinod S (2018) Session hijacking & technique. Int J Eng Technol 7:193–198

    Google Scholar 

  27. https://owasp.org/www-community/attacks/Session_hijacking_attack

  28. Raza M, Iqbal M et al (2012) A survey of password attacks and comparative analysis on methods forsecure authentication. World Appl Sci J 19(4):439–444

    Google Scholar 

  29. https://www.csoonline.com/article/3285651/what-is-network-security-definition-methods-jobs-and-salaries.html

  30. Ingham KL (1994) Network firewalls. In IEEE Commun Mag 32. https://doi.org/10.1201/9780849330452

  31. Mason AG (2002) Cisco secure virtual private network. Cisco Press, 7 pp

    Google Scholar 

  32. Singh G et al (2013) An overview of artificialintelligence. SBIT J Sci Technol. ISSN 2(1):2277–8764

    Google Scholar 

  33. https://cyberlaw.stanford.edu/blog2011/08/sorcerers-apprentice-or-why-weak-ai-interesting-enough

  34. https://hackr.io/blog/types-of-ai

  35. Shamiulla AM (2019) Role of artificial intelligence in cyber security. Int J Innov Technol Explor Eng (IJITEE) 9(1). ISSN: 2278-3075

    Google Scholar 

  36. Martellini M, Malizia A (2017) Cyber and chemical, biological, radiological, nuclear, explosives, challenges: threats and counter efforts Springer. ISBN:9783319621081.

    Google Scholar 

  37. https://www.paloaltonetworks.com/cyberpedia/what-is-an-intrusion-prevention-system-ips

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Moutushi Singh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Singh, M., Lall, H., Shaurya (2021). Cyber Security with AI–Part II. In: Chakraborty, M., Singh, M., Balas, V.E., Mukhopadhyay, I. (eds) The "Essence" of Network Security: An End-to-End Panorama. Lecture Notes in Networks and Systems, vol 163. Springer, Singapore. https://doi.org/10.1007/978-981-15-9317-8_7

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-9317-8_7

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-9316-1

  • Online ISBN: 978-981-15-9317-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics