Skip to main content

Cyber security meets artificial intelligence: a survey

Abstract

There is a wide range of interdisciplinary intersections between cyber security and artificial intelligence (AI). On one hand, AI technologies, such as deep learning, can be introduced into cyber security to construct smart models for implementing malware classification and intrusion detection and threating intelligence sensing. On the other hand, AI models will face various cyber threats, which will disturb their sample, learning, and decisions. Thus, AI models need specific cyber security defense and protection technologies to combat adversarial machine learning, preserve privacy in machine learning, secure federated learning, etc. Based on the above two aspects, we review the intersection of AI and cyber security. First, we summarize existing research efforts in terms of combating cyber attacks using AI, including adopting traditional machine learning methods and existing deep learning solutions. Then, we analyze the counterattacks from which AI itself may suffer, dissect their characteristics, and classify the corresponding defense methods. Finally, from the aspects of constructing encrypted neural network and realizing a secure federated deep learning, we expatiate the existing research on how to build a secure AI system.

This is a preview of subscription content, access via your institution.

References

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jian-hua Li.

Additional information

Project supported by the National Natural Science Foundation of China (Nos. 61431008 and 61571300)

Rights and permissions

Reprints and Permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, Jh. Cyber security meets artificial intelligence: a survey. Frontiers Inf Technol Electronic Eng 19, 1462–1474 (2018). https://doi.org/10.1631/FITEE.1800573

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1631/FITEE.1800573

Key words

CLC number