Abstract
With the advent of the digital era, every day-to-day task is automated due to technological advances. However, technology has yet to provide people with enough tools and safeguards. As the internet connects more-and-more devices around the globe, the question of securing the connected devices grows at an even spiral rate. Data thefts, identity thefts, fraudulent transactions, password compromises, and system breaches are becoming regular everyday news. The surging menace of cyber-attacks got a jolt from the recent advancements in Artificial Intelligence. AI is being applied in almost every field of different sciences and engineering. The intervention of AI not only automates a particular task but also improves efficiency by many folds. So it is evident that such a scrumptious spread would be very appetizing to cybercriminals. Thus the conventional cyber threats and attacks are now “intelligent” threats. This article discusses cybersecurity and cyber threats along with both conventional and intelligent ways of defense against cyber-attacks. Furthermore finally, end the discussion with the potential prospects of the future of AI in cybersecurity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
“cybersecurity ventures official annual cybercrime report” (2022). https://cybersecurityventures.com/annual-cybercrime-report-2017/. Accessed 19 May 2022
“global cybersecurity outlook 2022” (2022). https://www3.weforum.org/docs/WEF_Global_Cybersecurity_Outlook_2022.pdf. Accessed 19 May 2022
Al-Yaseen, W., Othman, Z., Ahmad Nazri, M.Z.: Multi-level hybrid support vector machine and extreme learning machine based on modified k-means for intrusion detection system. Expert Syst. Appl. 67(01) (2017). https://doi.org/10.1016/j.eswa.2016.09.041
Reshma Banu, M.A., Akshatha Kamath C., Ashika S., Ujwala, H.S., Harshitha, S.N.: Detecting phishing attacks using natural language processing and machine learning. pp. 1210–1214 (2019). https://doi.org/10.1109/ICCS45141.2019.9065490
Baptista, I., Shiaeles, S., Kolokotronis, N.: A novel malware detection system based on machine learning and binary visualization. pp. 1–6 (2019). https://doi.org/10.1109/ICCW.2019.8757060
Barbara, D., Couto, J., Jajodia, S., Popyack, L., Wu, N.: Adam: Detecting intrusions by data mining. pp. 5–6 (07 2001)
Bose, S., Barao, T., Liu, X.: Explaining AI for malware detection: analysis of mechanisms of malconv. In: 2020 International Joint Conference on Neural Networks (IJCNN), pp. 1–8 (2020). https://doi.org/10.1109/IJCNN48605.2020.9207322
Chowdhury, M., Rahman, A., Islam, M.R.: Malware analysis and detection using data mining and machine learning classification. pp. 266–274 (2018). https://doi.org/10.1007/978-3-319-67071-3_33
Coull, S., Gardner, C.: Activation analysis of a byte-based deep neural network for malware classification. pp. 21–27 (2019). https://doi.org/10.1109/SPW.2019.00017
Demetrio, L., Biggio, B., Lagorio, G., Roli, F., Armando, A.: Explaining vulnerabilities of deep learning to adversarial malware binaries (2019)
Farid, D., Zahidur Rahman, M.: Anomaly network intrusion detection based on improved self adaptive bayesian algorithm. J. Comput. 5 (2010). https://doi.org/10.4304/jcp.5.1.23-31
Feng, F., Zhou, Q., Shen, Z., Xuhui, Y., Lihong, H., Wang, J.: The application of a novel neural network in the detection of phishing websites. J. Ambient. Intell. Humanized Comput. (2018). https://doi.org/10.1007/s12652-018-0786-3
Feng, W., Sun, J., Zhang, L., Cao, C., Yang, Q.: A support vector machine based naive Bayes algorithm for spam filtering. pp. 1–8 (2016). https://doi.org/10.1109/PCCC.2016.7820655
Guan, Z., Li, J., Wu, L.: Achieving efficient and secure data acquisition for cloud-supported internet of things in smart grid. IEEE Internet Things J. 4(6), 1934–1944 (2017). https://doi.org/10.1109/JIOT.2017.2690522
Hall, M.: Correlation-based feature selection for machine learning. Dep. Comput. Sci. 19 (2000)
Hamamoto, A., Carvalho, L.D.H., Sampaio, L., Abrao, T., Proença, M.: Network anomaly detection system using genetic algorithm and fuzzy logic. Expert Syst. Appl. 92 (2017). https://doi.org/10.1016/j.eswa.2017.09.013
Hamid, Y., Muthukumarasamy, S., Ranganathan, B.: Ids using machine learning -current state of art and future directions. Br. J. Appl. Sci. Technol. 15, 1–22 (2016). https://doi.org/10.9734/BJAST/2016/23668
Hashemi, H., Azmoodeh, A., Hamzeh, A., Hashemi, S.: Graph embedding as a new approach for unknown malware detection. J. Comput. Virol. Hacking Tech. 13 (2017). https://doi.org/10.1007/s11416-016-0278-y
Hossain Faruk, M.J., Shahriar, H., Valero, M., Barsha, F., Sobhan, S., Khan, A., Whitman, M., Cuzzocrea, A., Lo, D., Rahman, A., Wu, F.: Malware detection and prevention using artificial intelligence techniques (2021). https://doi.org/10.1109/BigData52589.2021.9671434
Johns, J.: “representation learning for malware classification” (2017). https://www.fireeye.com/content/dam/fireeye-www/blog/pdfs/malware-classification-slides.pdf. Accessed 19 May 2022
Kissell, R.L.: Chapter 2 - algorithmic trading. In: Kissell, R.L. (ed.) Algorithmic Trading Methods, 2nd edn., pp. 23–56. Academic Press (2021). https://doi.org/10.1016/B978-0-12-815630-8.00002-8, https://www.sciencedirect.com/science/article/pii/B9780128156308000028
Kolosnjaji, B., Demontis, A., Biggio, B., Maiorca, D., Giacinto, G., Eckert, C., Roli, F.: Adversarial malware binaries: evading deep learning for malware detection in executables (2018). https://doi.org/10.48550/ARXIV.1803.04173, https://arxiv.org/abs/1803.04173
Kreuk, F., Barak, A., Aviv-Reuven, S., Baruch, M., Pinkas, B., Keshet, J.: Deceiving end-to-end deep learning malware detectors using adversarial examples (2018). https://doi.org/10.48550/ARXIV.1802.04528, https://arxiv.org/abs/1802.04528
Luo, B., Xia, J.: A novel intrusion detection system based on feature generation with visualization strategy. Expert Syst. Appl. 41, 4139–4147 (2014). https://doi.org/10.1016/j.eswa.2013.12.048
Mahajan, R., Siddavatam, I.: Phishing website detection using machine learning algorithms. Int. J. Comput. Appl. 181, 45–47 (10 2018). https://doi.org/10.5120/ijca2018918026
McLaughlin, N., Doupé, A., Ahn, G., Martinez-del Rincon, J., Kang, B., Yerima, S., Miller, P., Sezer, S., Safaei, Y., Trickel, E., Zhao, Z.: Deep android malware detection. pp. 301–308 (2017). https://doi.org/10.1145/3029806.3029823
Molina Valdiviezo, L., Furfaro, A., Malena, G., Parise, A.: A simulation model for the analysis of DDOS amplification attacks (2015). https://doi.org/10.1109/UKSim.2015.52
Obotivere, B., Nwaezeigwe, A.: Cyber security threats on the internet and possible solutions. IJARCCE 9, 92–97 (2020). https://doi.org/10.17148/IJARCCE.2020.9913
Peng, T., Harris, I., Sawa, Y.: Detecting phishing attacks using natural language processing and machine learning. pp. 300–301 (2018). https://doi.org/10.1109/ICSC.2018.00056
Rokon, M.O.F., Islam, R., Darki, A., Papalexakis, E., Faloutsos, M.: Sourcefinder: finding malware source-code from publicly available repositories in GitHub (2020)
Sausalito, C.: “cyberwarfare in the c-suite.” (2022). https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/ (Nov 13, 2020); Accessed 19 May 2022
Schultz, M., Eskin, E., Zadok, F., Stolfo, S.: Data mining methods for detection of new malicious executables. pp. 38–49 (2001). https://doi.org/10.1109/SECPRI.2001.924286
Sharma, S., Challa, R., Sahay, S.: Detection of advanced malware by machine learning techniques (2019)
Shrestha, P., Maharjan, S., Ramirez-de-la Rosa, G., Sprague, A., Solorio, T., Warner, G.: Using string information for malware family identification. pp. 686–697 (2014). https://doi.org/10.1007/978-3-319-12027-0_55
Syiemlieh, P., Golden, M., Khongsit, Sharma, U., Sharma, B.: Phishing-an analysis on the types, causes, preventive measures and case studies in the current situation (2015)
Taghavi Zargar, S., Joshi, J., Tipper, D.: A survey of defense mechanisms against distributed denial of service (DDOS) flooding attacks. IEEE Commun. Surv. Tutor. 15, 2046–2069 (2013). https://doi.org/10.1109/SURV.2013.031413.00127
Tandon, R.: A survey of distributed denial of service attacks and defenses (2020). https://doi.org/10.48550/ARXIV.2008.01345, arXiv:abs/2008.01345
Lau, R.Y., Liao, S.Y., Kwok, R.C.W., Xu, K., Xia, Y., Li, Y.: Text mining and probabilistic language modeling for online review spam detection. 2, 1–30 (2011). https://doi.org/10.1145/2070710.2070716
Ye, Y., Chen, L., Hou, S., Hardy, W., Li, X.: DeepAM: a heterogeneous deep learning framework for intelligent malware detection. Knowl. Inf. Syst. 54, 1–21 (2018). https://doi.org/10.1007/s10115-017-1058-9
Zhu, H.J., You, Z.H., Zhu, Z., Shi, W.L., Cheng, L.: DroiDdet: effective and robust detection of android malware using static analysis along with rotation forest model. Neurocomputing 272, 638–646 (2018). https://doi.org/10.1016/j.neucom.2017.07.030
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Chakraborty, A., Biswas, A., Khan, A.K. (2023). Artificial Intelligence for Cybersecurity: Threats, Attacks and Mitigation. In: Biswas, A., Semwal, V.B., Singh, D. (eds) Artificial Intelligence for Societal Issues. Intelligent Systems Reference Library, vol 231. Springer, Cham. https://doi.org/10.1007/978-3-031-12419-8_1
Download citation
DOI: https://doi.org/10.1007/978-3-031-12419-8_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-12418-1
Online ISBN: 978-3-031-12419-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)