Abstract
Internet practice has become an essential part of human life. Without Internet, even a miniscule work may not be finished. On the contrary various forms of cybercrimes or network, outbreaks are also increasing with the same rhythm and swiftness. In this crucial time protection of information on the cyber world has become an enormous task. Therefore, everyone should have knowledge of different strong security dealings to protect their information. The Artificial Intelligence approaches are applied on existing data to constantly improve its functionalities and tactics over time. It studies and comprehends standard user behavior with the ability to detect the smallest amount of dissimilarity from the given outline. Nonetheless, besides collecting information to perceive and classify threats, an artificial intelligence system also uses gathered information to advance its own functionalities. It is difficult to create software with standard algorithms or hardware for successful alarms against the network attacks which are powerfully designed. It is obvious that several cyber security issues are additionally coming day by day. So, it is into consideration that artificial intelligence applications may be incorporated with cyber security computing issues to analyze the improvements against cyberattacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Patil P (2016) Artificial intelligence in cyber security. Int J Res Comput Appl Robot 4(5):1–5. ISSN 2320–7345
Ashok Kumar D, Venugopalan SR (2017) Intrusion detection system: a review. Int J Adv Res Comput Sci 8(8). ISSN No. 0976-5697
Abomhara M, Køien GM (2015) Cyber security and the Internet of Things: vulnerabilities, threats, intruders and attacks. J Cyber Secur Mobility 4(1):65–88. https://doi.org/10.13052/jcsm2245-1439.414
Cherdantseva Y et al (2016) A review of cyber security risk assessment methods for SCADA systems. Comput Secur 56:1–27. https://doi.org/10.1016/j.cose.2015.09.009
Vadza K (2013) Cyber crime & its categories. Indian J Appl Res 3(5):130–133. https://doi.org/10.15373/2249555X/MAY2013/39
Romagna M (2019) Hacktivism: conceptualization, techniquesand historical view. In: The Palgrave handbook of international cybercrime and cyber deviance, pp 1–27
https://www.abusix.com/blog/the-importance-of-network-security-in-any-organization
https://consoltech.com/blog/why-network-security-is-more-important-than-ever/
Wright J, Harmening J (2009) 15 Computer and information security handbook. Elsevier Inc., Morgan Kaufmann Publications, p 257
Salahdine F, Kaabouch N (2019) Social engineering attacks: a survey. Future Internet. https://doi.org/10.3390/fi11040089
Pawar M, Anuradha J (2015) Network security & types of attacks in network. Procedia Comput Sci 48. https://doi.org/10.1016/j.procs.2015.04.126
Denning DE (2012) Stuxnet: what has changed? Future Internet. https://doi.org/10.3390/fi4030672
Nazreen Banu M, Munawara Banu S (2013) A comprehensive study of phishing attacks. Int J Comput Sci Inf Technol 4(6):783–786
Distributed denial of service attacks. Internet Protocol J 7(4). Cisco
Sahu SS, Pandey M (2014) Distributed denial of service attack: a review. I. J. Mod Educ Comput Sci 1:65–71. https://doi.org/10.5815/ijmecs.2014.01.07
Singh A, Junefa D (2010) Agent based preventive measure for UDP flood attack in DDoS attacks. IJEST 2(8):3405–3411
https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/
Bogdanoski M, Risteski A (2011) Wireless network behavior under ICMP ping flood DoS attack and mitigation techniques. Int J Commun Netw Inf Secur (IJCNIS) 3(1):17–24
Vishwakarma R, Jain AK (2020) A survey of DDoS attacking techniques and defense mechanisms in the IoT network. Telecommun Syst 73:3–25. https://doi.org/10.1007/s11235-019-00599-z
Selvara V (2018) Distributed denial of service attack detection, prevention & mitigation service on cloud environment. J Comput Eng Inf Technol 7:2. https://doi.org/10.4172/2324-9307.1000204
Suroto (2017) A review of defense against slow HTTP attack. Int J Inform Vis 1(4). ISSN: 2549-9904
Dragoni N et al (2018) DDoS-capable IoT malwares: comparative analysis and Mirai investigation. Secur Commun Netw. https://doi.org/10.1155/2018/7178164.
Gupta BB, Badve OP (2017) Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a Cloud computing environment. Neural Comput Appl 28:3655–3682. https://doi.org/10.1007/s00521-016-2317-5
Baitha AK, Vinod S (2018) Session hijacking & technique. Int J Eng Technol 7:193–198
https://owasp.org/www-community/attacks/Session_hijacking_attack
Raza M, Iqbal M et al (2012) A survey of password attacks and comparative analysis on methods forsecure authentication. World Appl Sci J 19(4):439–444
Ingham KL (1994) Network firewalls. In IEEE Commun Mag 32. https://doi.org/10.1201/9780849330452
Mason AG (2002) Cisco secure virtual private network. Cisco Press, 7 pp
Singh G et al (2013) An overview of artificialintelligence. SBIT J Sci Technol. ISSN 2(1):2277–8764
https://cyberlaw.stanford.edu/blog2011/08/sorcerers-apprentice-or-why-weak-ai-interesting-enough
Shamiulla AM (2019) Role of artificial intelligence in cyber security. Int J Innov Technol Explor Eng (IJITEE) 9(1). ISSN: 2278-3075
Martellini M, Malizia A (2017) Cyber and chemical, biological, radiological, nuclear, explosives, challenges: threats and counter efforts Springer. ISBN:9783319621081.
https://www.paloaltonetworks.com/cyberpedia/what-is-an-intrusion-prevention-system-ips
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Singh, M., Lall, H., Shaurya (2021). Cyber Security with AI–Part II. In: Chakraborty, M., Singh, M., Balas, V.E., Mukhopadhyay, I. (eds) The "Essence" of Network Security: An End-to-End Panorama. Lecture Notes in Networks and Systems, vol 163. Springer, Singapore. https://doi.org/10.1007/978-981-15-9317-8_7
Download citation
DOI: https://doi.org/10.1007/978-981-15-9317-8_7
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-9316-1
Online ISBN: 978-981-15-9317-8
eBook Packages: EngineeringEngineering (R0)