Skip to main content

Artificially Intelligent Cyber Security: Reducing Risk and Complexity

  • Conference paper
  • First Online:
Advances in Artificial Intelligence and Applied Cognitive Computing

Abstract

Historically, research shows analysis, characterization, and classification of complex heterogeneous non-linear systems; and interactions have been difficult to accurately understand and effectively model. Synonymously, exponential growth of Internet of Things (IoT), cyber physical systems, and the litter of current accidental and unscrupulous cyber events portray an ever-challenging security environment wrought with complexity, ambiguity, and non-linearity, thus providing significant incentive to industry and academia toward advanced, predictive solutions to reduce persistent global threats. Recent advances in artificial intelligence (AI) and information theoretic methods (ITM) are benefitting disciplines struggling with learning from rapidly increasing data volume, velocity, and complexity. Research shows axiomatic design (AD) providing design and datum disambiguation for complex systems utilizing information content reduction. Therefore, we propose a transdisciplinary AD, AI/ML, ITM approach combining axiomatic design with advanced, novel, and adaptive machine-based learning techniques. We show how to significantly reduce risks and complexity by improving cyber system adaptiveness, enhancing cyber system learning, and increasing cyber system prediction and insight potential where today context is sorely lacking. We provide an approach for deeper contextual understanding of disjointed cyber events by improving knowledge density (KD) (how much we know about a given event) and knowledge fidelity (KF) (how well do we know) ultimately improving decision mitigation quality and autonomy. We improve classification and understanding of cyber data and reduce system non-linearity and cyber threat risk, thereby increasing efficiency by reducing labor and system costs, and “peace of mind.”

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. S.S. Zhou, G. Feng, C.B. Feng, Robust control for a class of uncertain nonlinear systems: adaptive fuzzy approach based on back- stepping. Fuzzy Sets Syst. 151(1), 1–20 (Apr. 2005)

    Article  MathSciNet  MATH  Google Scholar 

  2. W.S. Yu, C.J. Sun, Fuzzy model based adaptive control for a class of nonlinear systems. IEEE Trans. Fuzzy Syst. 9(3), 413–425 (2001)

    Article  Google Scholar 

  3. N. Suh, Complexity Theory and Applications (Oxford University Press, 2005)

    Google Scholar 

  4. G. Nicolis, Introduction to Nonlinear Science, DI-Fusion (Cambridge University Press, 1995)

    Book  Google Scholar 

  5. J.R. Goodall, W.G. Lutters, A. Komlodi, I know my network: collaboration and expertise in intrusion detection, in Proceedings of the 2004 ACM Conference on Computer Supported Cooperative Work, ed. by J. Herbsleb, G. Olson, (ACM, New York, 2004), pp. 342–345

    Chapter  Google Scholar 

  6. N.A. Giacobe, Application of the JDL data fusion process model for Cyber Security. Multisensor, Multisource Information Fusion: Architectures, Algorithms, and Applications 2010, vol. 7710. International Society for Optics and Photonics (2010)

    Google Scholar 

  7. P.C. Chen, P. Liu, J. Yen, T. Mullen, Experience-based cyber situation recognition using relaxable logic patterns. In Proceedings of the 2012 IEEE international multi-disciplinary conference on cognitive methods in situation awareness and decision support (CogSIMA), pp. 243–250, IEEE (2012)

    Google Scholar 

  8. A. Joinson, T. van Steen, Human aspects of cyber security: behaviour or culture change? Cyber Secur. Peer-Reviewed J. 1(4), 351--360 (2018)

    Google Scholar 

  9. S.A. Zahra, L.R. Newey, Maximizing the impact of organization science: theory-building at the intersection of disciplines and/or fields. J. Manag. Stud. 46(6), 1059–1075 (2009)

    Article  Google Scholar 

  10. D.V. Hutton, Fundamentals of Finite Element Analysis (McGraw-Hill, 2017)

    Google Scholar 

  11. A. Aziz, Prospective client identification using malware attack detection. U.S. Patent No. 9,027,135. 5 May 2015

    Google Scholar 

  12. D. Clark, J. Strand, J. Thyer, Active attack detection system. U.S. Patent No. 9,628,502. 18 Apr. 2017

    Google Scholar 

  13. S. Liu, G. Wei, Y. Song, Y. Liu, Extended Kalman filtering for stochastic nonlinear systems with randomly occurring cyber-attacks. Neurocomputing 207, 708–716 (2016)

    Google Scholar 

  14. J. Crowder, J. Carbone, The Great Migration: Information to Knowledge Using Cognition-Based Frameworks (Springer Science, New York, 2011)

    Google Scholar 

  15. I. I. Liggins, D. H. Martin, J. Llinas (eds.), Handbook of Multisensor Data Fusion: Theory and Practice (CRC Press, 2017)

    Google Scholar 

  16. G. Bello-Orgaz, J.J. Jung, D. Camacho, Social big data: recent achievements and new challenges. Inform. Fusion 28, 45–59 (2016)

    Google Scholar 

  17. D. Quick, K.K.R. Choo, Digital Forensic Data and Open Source Intelligence (DFINT+OSINT). In: Big Digital Forensic Data. Springer Briefs on Cyber Security Systems and Networks. Springer, Singapore (2018)

    Google Scholar 

  18. A. Ertas, M.M. Tanik, T.T. Maxwell, Transdisciplinary engineering education and research model. J. Integr. Design Proc. Sci. 4(4), 1–11 (2000)

    Google Scholar 

  19. P. Nyhuis (ed.), Wandlungsfähige Produktionssysteme (GITO mbH Verlag, 2010)

    Google Scholar 

  20. R. Colbaugh, K. Glass, Predictability-oriented defense against adaptive adversaries. Systems, Man, and Cybernetics (SMC), 2012 IEEE International Conference on. IEEE (2012)

    Google Scholar 

  21. J. Lee, B. Bagheri, H.-A. Kao, Recent advances and trends of cyber-physical systems and bigdata analytics in industrial informatics. International proceeding of int conference on industrial informatics (INDIN) (2014)

    Google Scholar 

  22. J. Carbone, A framework for enhancing transdisciplinary research knowledge. Texas Tech University (2010)

    Google Scholar 

  23. J.A. Crowder, J.N. Carbone, S.A. Friess, Artificial Cognition Architectures (Springer, New York, 2014)

    Book  Google Scholar 

  24. J. Crowder, S. Friess, Artificial neural diagnostics and prognostics: self-soothing in cognitive systems. Proceedings of the 12th annual International Conference on Artificial Intelligence, Las Vegas, NV (2010)

    Google Scholar 

  25. W. Liu et al., A survey of deep neural network architectures and their applications. Neurocomputing 234, 11–26 (2017)

    Article  Google Scholar 

  26. S.S. Roy, et al., A deep learning based artificial neural network approach for intrusion detection. International Conference on Mathematics and Computing, Springer, Singapore (2017)

    Google Scholar 

  27. N. Marz, J. Warren, Big data: principles and best practices of scalable real-time data systems. Manning (2013)

    Google Scholar 

  28. S. Sridhar, M. Govindarasu, Model-based attack detection and mitigation for automatic generation control. IEEE Trans. Smart Grid 5(2), 580–591 (2014)

    Article  Google Scholar 

  29. A. Inselberg, Parallel coordinates, in Encyclopedia of Database Systems, (Springer, Boston, 2009), pp. 2018–2024

    Chapter  Google Scholar 

  30. D.H. Wolpert, W.G. Macready, No free lunch theorems for optimization. IEEE Trans. Evol. Comput. 1(1), 67–82 (1997)

    Article  Google Scholar 

  31. K.P. Burnham, D.R. Anderson, Practical use of the information-theoretic approach, in Model Selection and Inference, (Springer, New York, 1998), pp. 75–117

    Chapter  Google Scholar 

  32. M.A. Ferrag et al., Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study. J. Inform. Secur. Appl. 50, 102419 (2020)

    Google Scholar 

  33. K.A. Heller, et al., One class support vector machines for detecting anomalous windows registry accesses. Proc. of the workshop on Data Mining for Computer Security, vol. 9 (2003)

    Google Scholar 

  34. W. Hu, Y. Liao, V. Rao Vemuri, Robust Support Vector Machines for Anomaly Detection in Computer Security. ICMLA (2003)

    Google Scholar 

  35. I. Balabine, A. Velednitsky, Method and system for confident anomaly detection in computer network traffic. U.S. Patent No. 9,843,488. 12 Dec. 2017

    Google Scholar 

  36. H.M. Jaenisch, J.W. Handley, N. Albritton, Converting data into functions for continuous wavelet analysis. Independent Component Analyses, Wavelets, Neural Networks, Biosystems, and Nanoengineering VII, vol. 7343. International Society for Optics and Photonics (2009)

    Google Scholar 

  37. H.M. Jaenisch, et al., Fractals, malware, and data models. Cyber Sensing 2012, vol. 8408. International Society for Optics and Photonics (2012)

    Google Scholar 

  38. R. Zuech, T.M. Khoshgoftaar, R. Wald, Intrusion detection and big heterogeneous data: a survey. J. Big Data 2(1), 3 (2015)

    Article  Google Scholar 

  39. H. Jaenisch, Spatial voting with data modeling for behavior based tracking and discrimination of human from fauna from GMTI radar tracks. Unattended Ground, Sea, and Air Sensor Technologies and Applications XIV, vol. 8388. International Society for Optics and Photonics (2012)

    Google Scholar 

  40. H.M. Jaenisch, et al., A simple algorithm for sensor fusion using spatial voting (unsupervised object grouping). Signal Processing, Sensor Fusion, and Target Recognition XVII, vol. 6968. International Society for Optics and Photonics, 2008

    Google Scholar 

  41. T. Aksenova, V. Volkovich, A.E.P. Villa, Robust structural modeling and outlier detection with GMDH-type polynomial neural networks. International Conference on Artificial Neural Networks. Springer, Berlin, Heidelberg, 2005

    Google Scholar 

  42. L. Brillouin, Science and Information Theory (Dover, 2004)

    MATH  Google Scholar 

  43. J. Crowder, V. Raskin, J. Taylor, Autonomous creation and detection of procedural memory scripts, in Proceedings of the 13th Annual International Conference on Artificial Intelligence, (Las Vegas, 2012)

    Google Scholar 

  44. J. Llinas, et al., Revisiting the JDL data fusion model II. Space and Naval Warfare Systems Command San Diego CA (2004)

    Google Scholar 

  45. L.A. Zadeh, A note on web intelligence, world knowledge and fuzzy logic. Data Knowl. Eng. 50(3), 291–304 (2004)

    Article  Google Scholar 

  46. P. Gärdenfors, Conceptual Spaces: The Geometry of Thought (MIT Press, 2004)

    Google Scholar 

  47. P. Suppes, Current directions in mathematical learning theory, in Mathematical Psychology in Progress, (Springer, Berlin, Heidelberg, 1989), pp. 3–28

    Chapter  Google Scholar 

  48. R.W. Langacker, Foundations of Cognitive Grammar: Theoretical Prerequisites, vol 1 (Stanford University Press, 1987)

    Google Scholar 

  49. G. Lakoff, Z. Kövecses, The cognitive model of anger inherent in American English, in Cultural Models in Language and Thought, Cambridge University Press, (1987), pp. 195–221

    Chapter  Google Scholar 

  50. L. Talmy, Force dynamics in language and cognition. Cogn. Sci. 12(1), 49–100 (1988)

    Article  Google Scholar 

  51. R.C. Hibbeler, Engineering mechanics (Pearson Education, 2001)

    MATH  Google Scholar 

  52. D. Ejigu, M. Scuturici, L. Brunie, Hybrid approach to collaborative context-aware service platform for pervasive computing. JCP 3(1), 40–50 (2008)

    Google Scholar 

  53. I. Nonaka, H. Takeuchi, The Knowledge-Creating Company: How Japanese Companies Create the Dynamics of Innovation (Oxford University Press, 1995)

    Google Scholar 

  54. M.J. Kearns, U.V. Vazirani, U. Vazirani, An Introduction to Computational Learning Theory(MIT Press, 1994)

    Google Scholar 

  55. T. Gruber, Collective knowledge systems: Where the social web meets the semantic web. J Web Semantics 6(1), 4–13 (2008)

    Article  Google Scholar 

  56. J.C. Platt, Fast training of support vector machines using sequential minimal optimization, in Advances in Kernel Methods, MIT Press, Cambridge, MA, (1999), pp. 185–208

    Google Scholar 

  57. E.P. Blasch, S. Plano, JDL Level 5 fusion model: user refinement issues and applications in group tracking, SPIE Vol. 4729, Aerosense (2002)

    Google Scholar 

  58. A. Einstein, Relativity: the special and general theory: a popular exposition, authorized translation by Robert W. Lawson: Methuen, London (1960)

    Google Scholar 

  59. A. Hendrik Lorentz, Considerations on Gravitation. In: KNAW, Proceedings, 2, 1899–1900, Amsterdam (1900)

    Google Scholar 

  60. M.S. Alber, G.G. Luther, J.E. Marsden, Energy Dependent Schrodinger Operators and Complex Hamiltonian Systems on Riemann Surfaces, August 1996

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to James A. Crowder .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Carbone, J.N., Crowder, J.A. (2021). Artificially Intelligent Cyber Security: Reducing Risk and Complexity. In: Arabnia, H.R., Ferens, K., de la Fuente, D., Kozerenko, E.B., Olivas Varela, J.A., Tinetti, F.G. (eds) Advances in Artificial Intelligence and Applied Cognitive Computing. Transactions on Computational Science and Computational Intelligence. Springer, Cham. https://doi.org/10.1007/978-3-030-70296-0_38

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-70296-0_38

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-70295-3

  • Online ISBN: 978-3-030-70296-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics