Abstract
Historically, research shows analysis, characterization, and classification of complex heterogeneous non-linear systems; and interactions have been difficult to accurately understand and effectively model. Synonymously, exponential growth of Internet of Things (IoT), cyber physical systems, and the litter of current accidental and unscrupulous cyber events portray an ever-challenging security environment wrought with complexity, ambiguity, and non-linearity, thus providing significant incentive to industry and academia toward advanced, predictive solutions to reduce persistent global threats. Recent advances in artificial intelligence (AI) and information theoretic methods (ITM) are benefitting disciplines struggling with learning from rapidly increasing data volume, velocity, and complexity. Research shows axiomatic design (AD) providing design and datum disambiguation for complex systems utilizing information content reduction. Therefore, we propose a transdisciplinary AD, AI/ML, ITM approach combining axiomatic design with advanced, novel, and adaptive machine-based learning techniques. We show how to significantly reduce risks and complexity by improving cyber system adaptiveness, enhancing cyber system learning, and increasing cyber system prediction and insight potential where today context is sorely lacking. We provide an approach for deeper contextual understanding of disjointed cyber events by improving knowledge density (KD) (how much we know about a given event) and knowledge fidelity (KF) (how well do we know) ultimately improving decision mitigation quality and autonomy. We improve classification and understanding of cyber data and reduce system non-linearity and cyber threat risk, thereby increasing efficiency by reducing labor and system costs, and “peace of mind.”
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
S.S. Zhou, G. Feng, C.B. Feng, Robust control for a class of uncertain nonlinear systems: adaptive fuzzy approach based on back- stepping. Fuzzy Sets Syst. 151(1), 1–20 (Apr. 2005)
W.S. Yu, C.J. Sun, Fuzzy model based adaptive control for a class of nonlinear systems. IEEE Trans. Fuzzy Syst. 9(3), 413–425 (2001)
N. Suh, Complexity Theory and Applications (Oxford University Press, 2005)
G. Nicolis, Introduction to Nonlinear Science, DI-Fusion (Cambridge University Press, 1995)
J.R. Goodall, W.G. Lutters, A. Komlodi, I know my network: collaboration and expertise in intrusion detection, in Proceedings of the 2004 ACM Conference on Computer Supported Cooperative Work, ed. by J. Herbsleb, G. Olson, (ACM, New York, 2004), pp. 342–345
N.A. Giacobe, Application of the JDL data fusion process model for Cyber Security. Multisensor, Multisource Information Fusion: Architectures, Algorithms, and Applications 2010, vol. 7710. International Society for Optics and Photonics (2010)
P.C. Chen, P. Liu, J. Yen, T. Mullen, Experience-based cyber situation recognition using relaxable logic patterns. In Proceedings of the 2012 IEEE international multi-disciplinary conference on cognitive methods in situation awareness and decision support (CogSIMA), pp. 243–250, IEEE (2012)
A. Joinson, T. van Steen, Human aspects of cyber security: behaviour or culture change? Cyber Secur. Peer-Reviewed J. 1(4), 351--360 (2018)
S.A. Zahra, L.R. Newey, Maximizing the impact of organization science: theory-building at the intersection of disciplines and/or fields. J. Manag. Stud. 46(6), 1059–1075 (2009)
D.V. Hutton, Fundamentals of Finite Element Analysis (McGraw-Hill, 2017)
A. Aziz, Prospective client identification using malware attack detection. U.S. Patent No. 9,027,135. 5 May 2015
D. Clark, J. Strand, J. Thyer, Active attack detection system. U.S. Patent No. 9,628,502. 18 Apr. 2017
S. Liu, G. Wei, Y. Song, Y. Liu, Extended Kalman filtering for stochastic nonlinear systems with randomly occurring cyber-attacks. Neurocomputing 207, 708–716 (2016)
J. Crowder, J. Carbone, The Great Migration: Information to Knowledge Using Cognition-Based Frameworks (Springer Science, New York, 2011)
I. I. Liggins, D. H. Martin, J. Llinas (eds.), Handbook of Multisensor Data Fusion: Theory and Practice (CRC Press, 2017)
G. Bello-Orgaz, J.J. Jung, D. Camacho, Social big data: recent achievements and new challenges. Inform. Fusion 28, 45–59 (2016)
D. Quick, K.K.R. Choo, Digital Forensic Data and Open Source Intelligence (DFINT+OSINT). In: Big Digital Forensic Data. Springer Briefs on Cyber Security Systems and Networks. Springer, Singapore (2018)
A. Ertas, M.M. Tanik, T.T. Maxwell, Transdisciplinary engineering education and research model. J. Integr. Design Proc. Sci. 4(4), 1–11 (2000)
P. Nyhuis (ed.), Wandlungsfähige Produktionssysteme (GITO mbH Verlag, 2010)
R. Colbaugh, K. Glass, Predictability-oriented defense against adaptive adversaries. Systems, Man, and Cybernetics (SMC), 2012 IEEE International Conference on. IEEE (2012)
J. Lee, B. Bagheri, H.-A. Kao, Recent advances and trends of cyber-physical systems and bigdata analytics in industrial informatics. International proceeding of int conference on industrial informatics (INDIN) (2014)
J. Carbone, A framework for enhancing transdisciplinary research knowledge. Texas Tech University (2010)
J.A. Crowder, J.N. Carbone, S.A. Friess, Artificial Cognition Architectures (Springer, New York, 2014)
J. Crowder, S. Friess, Artificial neural diagnostics and prognostics: self-soothing in cognitive systems. Proceedings of the 12th annual International Conference on Artificial Intelligence, Las Vegas, NV (2010)
W. Liu et al., A survey of deep neural network architectures and their applications. Neurocomputing 234, 11–26 (2017)
S.S. Roy, et al., A deep learning based artificial neural network approach for intrusion detection. International Conference on Mathematics and Computing, Springer, Singapore (2017)
N. Marz, J. Warren, Big data: principles and best practices of scalable real-time data systems. Manning (2013)
S. Sridhar, M. Govindarasu, Model-based attack detection and mitigation for automatic generation control. IEEE Trans. Smart Grid 5(2), 580–591 (2014)
A. Inselberg, Parallel coordinates, in Encyclopedia of Database Systems, (Springer, Boston, 2009), pp. 2018–2024
D.H. Wolpert, W.G. Macready, No free lunch theorems for optimization. IEEE Trans. Evol. Comput. 1(1), 67–82 (1997)
K.P. Burnham, D.R. Anderson, Practical use of the information-theoretic approach, in Model Selection and Inference, (Springer, New York, 1998), pp. 75–117
M.A. Ferrag et al., Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study. J. Inform. Secur. Appl. 50, 102419 (2020)
K.A. Heller, et al., One class support vector machines for detecting anomalous windows registry accesses. Proc. of the workshop on Data Mining for Computer Security, vol. 9 (2003)
W. Hu, Y. Liao, V. Rao Vemuri, Robust Support Vector Machines for Anomaly Detection in Computer Security. ICMLA (2003)
I. Balabine, A. Velednitsky, Method and system for confident anomaly detection in computer network traffic. U.S. Patent No. 9,843,488. 12 Dec. 2017
H.M. Jaenisch, J.W. Handley, N. Albritton, Converting data into functions for continuous wavelet analysis. Independent Component Analyses, Wavelets, Neural Networks, Biosystems, and Nanoengineering VII, vol. 7343. International Society for Optics and Photonics (2009)
H.M. Jaenisch, et al., Fractals, malware, and data models. Cyber Sensing 2012, vol. 8408. International Society for Optics and Photonics (2012)
R. Zuech, T.M. Khoshgoftaar, R. Wald, Intrusion detection and big heterogeneous data: a survey. J. Big Data 2(1), 3 (2015)
H. Jaenisch, Spatial voting with data modeling for behavior based tracking and discrimination of human from fauna from GMTI radar tracks. Unattended Ground, Sea, and Air Sensor Technologies and Applications XIV, vol. 8388. International Society for Optics and Photonics (2012)
H.M. Jaenisch, et al., A simple algorithm for sensor fusion using spatial voting (unsupervised object grouping). Signal Processing, Sensor Fusion, and Target Recognition XVII, vol. 6968. International Society for Optics and Photonics, 2008
T. Aksenova, V. Volkovich, A.E.P. Villa, Robust structural modeling and outlier detection with GMDH-type polynomial neural networks. International Conference on Artificial Neural Networks. Springer, Berlin, Heidelberg, 2005
L. Brillouin, Science and Information Theory (Dover, 2004)
J. Crowder, V. Raskin, J. Taylor, Autonomous creation and detection of procedural memory scripts, in Proceedings of the 13th Annual International Conference on Artificial Intelligence, (Las Vegas, 2012)
J. Llinas, et al., Revisiting the JDL data fusion model II. Space and Naval Warfare Systems Command San Diego CA (2004)
L.A. Zadeh, A note on web intelligence, world knowledge and fuzzy logic. Data Knowl. Eng. 50(3), 291–304 (2004)
P. Gärdenfors, Conceptual Spaces: The Geometry of Thought (MIT Press, 2004)
P. Suppes, Current directions in mathematical learning theory, in Mathematical Psychology in Progress, (Springer, Berlin, Heidelberg, 1989), pp. 3–28
R.W. Langacker, Foundations of Cognitive Grammar: Theoretical Prerequisites, vol 1 (Stanford University Press, 1987)
G. Lakoff, Z. Kövecses, The cognitive model of anger inherent in American English, in Cultural Models in Language and Thought, Cambridge University Press, (1987), pp. 195–221
L. Talmy, Force dynamics in language and cognition. Cogn. Sci. 12(1), 49–100 (1988)
R.C. Hibbeler, Engineering mechanics (Pearson Education, 2001)
D. Ejigu, M. Scuturici, L. Brunie, Hybrid approach to collaborative context-aware service platform for pervasive computing. JCP 3(1), 40–50 (2008)
I. Nonaka, H. Takeuchi, The Knowledge-Creating Company: How Japanese Companies Create the Dynamics of Innovation (Oxford University Press, 1995)
M.J. Kearns, U.V. Vazirani, U. Vazirani, An Introduction to Computational Learning Theory(MIT Press, 1994)
T. Gruber, Collective knowledge systems: Where the social web meets the semantic web. J Web Semantics 6(1), 4–13 (2008)
J.C. Platt, Fast training of support vector machines using sequential minimal optimization, in Advances in Kernel Methods, MIT Press, Cambridge, MA, (1999), pp. 185–208
E.P. Blasch, S. Plano, JDL Level 5 fusion model: user refinement issues and applications in group tracking, SPIE Vol. 4729, Aerosense (2002)
A. Einstein, Relativity: the special and general theory: a popular exposition, authorized translation by Robert W. Lawson: Methuen, London (1960)
A. Hendrik Lorentz, Considerations on Gravitation. In: KNAW, Proceedings, 2, 1899–1900, Amsterdam (1900)
M.S. Alber, G.G. Luther, J.E. Marsden, Energy Dependent Schrodinger Operators and Complex Hamiltonian Systems on Riemann Surfaces, August 1996
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Carbone, J.N., Crowder, J.A. (2021). Artificially Intelligent Cyber Security: Reducing Risk and Complexity. In: Arabnia, H.R., Ferens, K., de la Fuente, D., Kozerenko, E.B., Olivas Varela, J.A., Tinetti, F.G. (eds) Advances in Artificial Intelligence and Applied Cognitive Computing. Transactions on Computational Science and Computational Intelligence. Springer, Cham. https://doi.org/10.1007/978-3-030-70296-0_38
Download citation
DOI: https://doi.org/10.1007/978-3-030-70296-0_38
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-70295-3
Online ISBN: 978-3-030-70296-0
eBook Packages: Computer ScienceComputer Science (R0)