You are on page 1of 4

AI IN CYBER SECURITY

2) A GOOD OR A BAD?

S. B. Rashmi
Assistant Professor
Department of Management Studies
Ramaiah Institute of Technology. Bengaluru

ABSTRACT
in ihe era of technologv. the hyper-connected workplaces and the growth of cloud and mobile
echnologies connected device has created a lot of issue in the cyber security. The threat to a
biusiness increases if it has data flowing from different sources. As the data is exposed to more
maware and a distributed denial-of-service (DDoS) an attack. Network systems security is also a
matter of concern for businesses. There are threats to networks that have become nore common,
hacks have become more complex, and
they are no longer just a concern for large organizations.
he tratfic on the network needs to consistently monitored, inspected and co-related.Traditional
methods to cyber security threats and detect malware are
failing. Cyber criminals are constanthy
coming up with new ways to bypass firewalls and become a threat to an organization's security.
The only way to fight it out is to be more
prepared and smarter than the hackers. Developing
a
sofiware system with standard logic for effectively defending against the growing cyber attacks is
however difficult. The organizations are spending close to S100 billion on a dizzying array of
securiy products. However, the convenience and automation loT affords means it isn't an
ephemeral trend. Businesses need to look to new technologies, like AI, to effectively protect their
customers as they broaden their perimeter.

Keywords: Artificial Intelligence, Cyber-Security

INTRODUCTION
Hyper-connected workplaces and the growth of cloud and mobile technologies have sparked a
chain reaction when it comes to security risks. The vast volume of
connected devices feeding into
networks provides a dream scenario for cyber criminals new and
plentiful points
-

access to
target. Further, security on these access points is often deficient.
The threat to abusiness increases if it has data flowing from different sources. The data is
constantly exposed to more malware, bots and DDoS attacks. Network systems security is also a
matter of concern for businesses. There are threats to
networks that have become more common,
hacks have become more
complex, and they are longer just a concen for large organizations.
no
The traffic on the network needs to
consistently monitored, inspected and co-related.

ARTIFICIAL INTELLIGENCE
The next generation cybersecurity products is increasingly incorporating Artificial
of
(Al) and Machine L.earning (MIL) Intelligence
technologies. By training Al software on large datasets of
cybersecurity, network, and even physical information, cybersecurity solutions
detect and block ab1normal
behavior, even if it docs not exhibit a known providers aim to
"signature" or palten.
pate
perts anticipa: that, over tume, companies will
EN uty products. Artuficial intell1gence (AI) incorporate ML into every
category of
is, by and large, the newest, most
alogy advancement currently affectung everything and everyone in the influential
digital world.
aQIns
The o of artificial intelligence (Al) can be traced all the way back to World
War II, when a
am of British cryptographers developed what came to be the world's first
Aat used mathematical reasoning to decrypt polymorphic codes transmitted computer, a machine

estimated that this innovation shortened the war by two tobyfour


the Axis powers.
ictorians have
years, saving
hetween 14 and 21 million lives. This was followed up by the birth of computer science as a field
af study in the 1950's, originally meant to simplify and automate human
ofmanagement big
data. With the evolution of technology and the rise of the internet, Al has been used
to help information security teams to fight cyber crime. increasingly
Artificial intelligence (AI) is an area of computer science that emphasizes the creation of
intelligent machines that work and reacts like humans. Some of the activities computers with
artificial intelligence are designed for include:

Speech Recognition
Learming
Planning
Problem solving
Artificial intelligence is a science field that is interested in finding solutions to complex problems
ike humans does. A decision mechanism that is similar to a real human decision mechanism is
tried to be modeled with some algorithms. Artificial intelligence (AI) is a result of a software that
tries to create a decision mechanism similar to human brain's decision mechanism.

The purpose of Al applications is to solve something that an expert spends a certain t1me on, in a
very short time. For instance, think about a doctor who is an expert on cancer, the process of his
detecting the cancer cells can be modelled with an artificial intelligence technique. The model
that we get can always detect the cancer cells just as well as the doctor does. Besides, the
developed software can be used by everyone;, Hospitals that don't have specialist doctors in this
area can also do(make) successful detection.
Above all, every problem that requires experts-as long as we have the appropriate data- can
be modelled by using artificial intelligence techniques. Data that is fit to the problem means the
data that has the features of that specific problem. For example, for the detection of cancer celi,
cell's size, its growing speed, the enzymes that it secretes, its rate of mutation, etc., this kind of
distinctive features need to be collected. If the features that are related to the problem can be
collected, the problem can be solved by using machine learning techniques.
Artificial intelligence is the new golden ring for cybersecurity developers, thanks to its potential
to not just automate functions at scale but also to make contextual decisions based on what it
leams over time. This can have big implications for security personnel-all too often,

companies simply don't have the resources to search through the haystack of anomalies for the
proverbial malicious needle.

USING AI TO OPTIMIZE CYBERSECURITY RESULTS: POSITIVE

sides: those looking to attack and those looking


Al has the possibility of being deployed by both
of ways. Mainly, it has the ability to learn
o defend. Of course, Al can be beneficial in a number
If deployed correctly, Al would be
and adapt to its current environment and the threat landscape. successful
collect intelligence regarding new threats, attempted attacks,
aDie to consistently This allows it to then better fulfil the
rcaches, blocked or failed attacks and learn from all of it.
purpose of defending the digital assets of an organisation, can immediately
react
dtcnpled breach, be able to mitigate and address the threat, as well as leam better was t to a
dnd expel it in the future This could be extremcly beneficial in taking cyber secu
level ecurity to the
ect
nev
Al
technology has the ab1lity
to pick up abnormalities within an organi7ation s
network and
itquicker than a member of the cvber secunty or T team could. Als i

ability tlag
normal behav1our would allow it to bnng attention to potentially malicious under
to

suspicious or abnormal user or device activity


behavto of
Al technology has the ab1lty to pick up abnormalities within an
il quicker than a member of the
organization s
network and fla
cvber security or 1T team could. Al's ab1lity to understa
normal behaviour would allow it to br1ng attention to
potentially malicious stand
Suspicious or abnomal user or device activity behaviour of
Al can boost
organizational cybersecurity by leveraging existing data to detect
dentify cyber attacks According to Cisco Systems, vulnerab1ities and
up to 32% ot businesses are
dependent on Al for their currently highly
based on Al is being used cybersecurity
needs In its present form.
Cybersecunty technolog
to
Accelerate incident detection
using processing power and analytics
Tdentify security risks based on configuration errors and sottware vuinerab1l1ties
Ranking and prioritizing threats
Automate threat response

USING AI TO OPTIMIZE CYBERSECURITY RESULTS: NEGATIVE


For every positive of Al, there is
an equal
defenses and tools that it runs negative: Al could be contigured to learn the specific
up against, which will allow it to be able to better
the future Viruses could be breach them in
created that host this type of Al, which
bypass even more advanced security implementat1ions. What's produces malware that can
more, the hackers don't even need
to
tamper with the data itself. they could work out the features
mirror it with their own code of code that a model using and
they are using with malicious intent so the
catch it In this case. Al is most
certainly hindrance
a
algor1thm isn't able to
Additionally, the numerous application possibilities of Al from retail to
track1ng means that it is rapidly expand1ng the currentfinance,
-

to environmental manufacturing
are definitely two sides to the coin attack surface There
when it comes to Al, and in all
weighed aga1nst the potentual downs1des Whilst the use of the situations, the benefits must be
robust,defence-in-depth Informmation Assurance strategy technology continues to grow a

as safe as it can be
1s needed to keep an
organisation s data

CONCLU SION
In the cuITent situation
due to nsing advancement in
Secunty System is required malware and cyber-attacks, Inteing
Appeared
solutions, Al methods are robust and mored1fferently
in relation to
contemporary CyDer s
better defense system from an flexible, as a result
expand1ng secunty execuo
that we have numerous increas1ng number of adv ance cyber threats In spite ot uhe fact
advantages when we uttlize Al procedures for cyber security, Al the
main panacea for
security At the point when a human opponent with an 1st
Circumvention goal attacks the uniaat
intelligent security the framework will fail This doesn't
we cannot ut1l1ze Al impiy
methods, but rather we should know its restrictions and utilize it
prop
and training. Alongside the threat researchers this
collaboration

an work efficiently
l eets ceuschess has proven to
Securily
Cyber either. But in the hand.
with won't mend a car
ypnoachoflAl
AL
hof attractive. By itselt, it
nches is
not or improved. That is largely the
that cannot be repaired
' s o c k e tw r e n c h

t h e r e is
little
little neither can it handle
hanic, there human security engineers
It won't replace
mechanic,

| me on top of cyber security,


security,.
crilical lool for getting
l ' as h i l l e d

Al today. now a
cyber
However, it
is
with
and response and keeping
alon
wI s
own
data for better detection
can be done.
of threal
of
before any serious damage
she yolumesvolumes

evict attackers
to repel or
the
ng
cnough
delencesh i g h .gh

from
American Institute of
Retrieved
REFERENCES (2019). Astronautics:
Cybersecurity.
for
https://www.aiaa.org/default.aspx?
Artificial
Intelligence ga-2.243425538.602735804.1553853620-
and
A e r o n a u t I C s

Security,
1290719648.1553853620 Are Affecting
Advancements

How Al https://www.techopedia.com/

August 15). Techopedia:


Buttice, C. (2018, Retrieved
from NormShield.

from
and Hacking. Retrieved
Cybersecurity
Intelligence.
(n.d.). Retrieved
Cybersecurity.
with
Artificial
Intelligence
in
Security Artificial
3 Cyber
JUN 28). The Role of Information

(2018,
from BIZTECH: https://biztechmagazine.com/ from
Ganti, V. Retrieved
4 cyber
security.
The role of AIin
April 19 ).
Retrieved
security?
5. Ismail, N (2017,
Age: https://www.information-age.com/
impacting
cyber
Intelligence
(AI)
Artificial
Retrieved
How is hindrance?

(n.d.).
Johns, K.
or a
6. from ishir: https://www.ishir.com/
security:
a help
in cyber
November
30). AI
https://www.information-age.com/ Good,
and
(2018, Tool for

intel igence-a-cybersccurity-tool-for-good-and-sometimes-bad/137831/
Panesar, D. threatpost.com
A https://threatpost.com/artificial-
https://threatpost.com/artiticial-
Cybersecurity

7. Age: Intelligence:
I n f o r m a t i o n

Artificial
from
October 3). t h r e a t p o s t . c o m :

T. (2018, from
the Hour
8. Scals,
Reet
trri
ieev
veed
d
Necd of
R

Bad. is
Sometimes
Cyber
Security Defence
Intelligence
in Cyber
Artificial
Speed
Why High 1 5 5 3 8 5 4 0 8 8 9

A. (n.d.).
753710.d4c98fa0579bd3b79d95117ct14c5044.
Paladion 1553854088906.

Tewary, from 808348s


9 http://www.paladion.nethsl.angcn-i 2951
Retrieved
753710.1.1553854088907& hsfp
Retrieved
from

June 28).
(2018,
hssc
hstc
us&1553854088906.1&
C y b e r s e c u r i t y .

in
Inteligence

06 Artificial

Role
of
The
10.
H u n t S o u r c e

You might also like