Skip to main content

Artificial Intelligence for Cybersecurity: Threats, Attacks and Mitigation

  • Chapter
  • First Online:
Artificial Intelligence for Societal Issues

Part of the book series: Intelligent Systems Reference Library ((ISRL,volume 231))

Abstract

With the advent of the digital era, every day-to-day task is automated due to technological advances. However, technology has yet to provide people with enough tools and safeguards. As the internet connects more-and-more devices around the globe, the question of securing the connected devices grows at an even spiral rate. Data thefts, identity thefts, fraudulent transactions, password compromises, and system breaches are becoming regular everyday news. The surging menace of cyber-attacks got a jolt from the recent advancements in Artificial Intelligence. AI is being applied in almost every field of different sciences and engineering. The intervention of AI not only automates a particular task but also improves efficiency by many folds. So it is evident that such a scrumptious spread would be very appetizing to cybercriminals. Thus the conventional cyber threats and attacks are now “intelligent” threats. This article discusses cybersecurity and cyber threats along with both conventional and intelligent ways of defense against cyber-attacks. Furthermore finally, end the discussion with the potential prospects of the future of AI in cybersecurity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. “cybersecurity ventures official annual cybercrime report” (2022). https://cybersecurityventures.com/annual-cybercrime-report-2017/. Accessed 19 May 2022

  2. “global cybersecurity outlook 2022” (2022). https://www3.weforum.org/docs/WEF_Global_Cybersecurity_Outlook_2022.pdf. Accessed 19 May 2022

  3. Al-Yaseen, W., Othman, Z., Ahmad Nazri, M.Z.: Multi-level hybrid support vector machine and extreme learning machine based on modified k-means for intrusion detection system. Expert Syst. Appl. 67(01) (2017). https://doi.org/10.1016/j.eswa.2016.09.041

  4. Reshma Banu, M.A., Akshatha Kamath C., Ashika S., Ujwala, H.S., Harshitha, S.N.: Detecting phishing attacks using natural language processing and machine learning. pp. 1210–1214 (2019). https://doi.org/10.1109/ICCS45141.2019.9065490

  5. Baptista, I., Shiaeles, S., Kolokotronis, N.: A novel malware detection system based on machine learning and binary visualization. pp. 1–6 (2019). https://doi.org/10.1109/ICCW.2019.8757060

  6. Barbara, D., Couto, J., Jajodia, S., Popyack, L., Wu, N.: Adam: Detecting intrusions by data mining. pp. 5–6 (07 2001)

    Google Scholar 

  7. Bose, S., Barao, T., Liu, X.: Explaining AI for malware detection: analysis of mechanisms of malconv. In: 2020 International Joint Conference on Neural Networks (IJCNN), pp. 1–8 (2020). https://doi.org/10.1109/IJCNN48605.2020.9207322

  8. Chowdhury, M., Rahman, A., Islam, M.R.: Malware analysis and detection using data mining and machine learning classification. pp. 266–274 (2018). https://doi.org/10.1007/978-3-319-67071-3_33

  9. Coull, S., Gardner, C.: Activation analysis of a byte-based deep neural network for malware classification. pp. 21–27 (2019). https://doi.org/10.1109/SPW.2019.00017

  10. Demetrio, L., Biggio, B., Lagorio, G., Roli, F., Armando, A.: Explaining vulnerabilities of deep learning to adversarial malware binaries (2019)

    Google Scholar 

  11. Farid, D., Zahidur Rahman, M.: Anomaly network intrusion detection based on improved self adaptive bayesian algorithm. J. Comput. 5 (2010). https://doi.org/10.4304/jcp.5.1.23-31

  12. Feng, F., Zhou, Q., Shen, Z., Xuhui, Y., Lihong, H., Wang, J.: The application of a novel neural network in the detection of phishing websites. J. Ambient. Intell. Humanized Comput. (2018). https://doi.org/10.1007/s12652-018-0786-3

  13. Feng, W., Sun, J., Zhang, L., Cao, C., Yang, Q.: A support vector machine based naive Bayes algorithm for spam filtering. pp. 1–8 (2016). https://doi.org/10.1109/PCCC.2016.7820655

  14. Guan, Z., Li, J., Wu, L.: Achieving efficient and secure data acquisition for cloud-supported internet of things in smart grid. IEEE Internet Things J. 4(6), 1934–1944 (2017). https://doi.org/10.1109/JIOT.2017.2690522

  15. Hall, M.: Correlation-based feature selection for machine learning. Dep. Comput. Sci. 19 (2000)

    Google Scholar 

  16. Hamamoto, A., Carvalho, L.D.H., Sampaio, L., Abrao, T., Proença, M.: Network anomaly detection system using genetic algorithm and fuzzy logic. Expert Syst. Appl. 92 (2017). https://doi.org/10.1016/j.eswa.2017.09.013

  17. Hamid, Y., Muthukumarasamy, S., Ranganathan, B.: Ids using machine learning -current state of art and future directions. Br. J. Appl. Sci. Technol. 15, 1–22 (2016). https://doi.org/10.9734/BJAST/2016/23668

  18. Hashemi, H., Azmoodeh, A., Hamzeh, A., Hashemi, S.: Graph embedding as a new approach for unknown malware detection. J. Comput. Virol. Hacking Tech. 13 (2017). https://doi.org/10.1007/s11416-016-0278-y

  19. Hossain Faruk, M.J., Shahriar, H., Valero, M., Barsha, F., Sobhan, S., Khan, A., Whitman, M., Cuzzocrea, A., Lo, D., Rahman, A., Wu, F.: Malware detection and prevention using artificial intelligence techniques (2021). https://doi.org/10.1109/BigData52589.2021.9671434

  20. Johns, J.: “representation learning for malware classification” (2017). https://www.fireeye.com/content/dam/fireeye-www/blog/pdfs/malware-classification-slides.pdf. Accessed 19 May 2022

  21. Kissell, R.L.: Chapter 2 - algorithmic trading. In: Kissell, R.L. (ed.) Algorithmic Trading Methods, 2nd edn., pp. 23–56. Academic Press (2021). https://doi.org/10.1016/B978-0-12-815630-8.00002-8, https://www.sciencedirect.com/science/article/pii/B9780128156308000028

  22. Kolosnjaji, B., Demontis, A., Biggio, B., Maiorca, D., Giacinto, G., Eckert, C., Roli, F.: Adversarial malware binaries: evading deep learning for malware detection in executables (2018). https://doi.org/10.48550/ARXIV.1803.04173, https://arxiv.org/abs/1803.04173

  23. Kreuk, F., Barak, A., Aviv-Reuven, S., Baruch, M., Pinkas, B., Keshet, J.: Deceiving end-to-end deep learning malware detectors using adversarial examples (2018). https://doi.org/10.48550/ARXIV.1802.04528, https://arxiv.org/abs/1802.04528

  24. Luo, B., Xia, J.: A novel intrusion detection system based on feature generation with visualization strategy. Expert Syst. Appl. 41, 4139–4147 (2014). https://doi.org/10.1016/j.eswa.2013.12.048

  25. Mahajan, R., Siddavatam, I.: Phishing website detection using machine learning algorithms. Int. J. Comput. Appl. 181, 45–47 (10 2018). https://doi.org/10.5120/ijca2018918026

  26. McLaughlin, N., Doupé, A., Ahn, G., Martinez-del Rincon, J., Kang, B., Yerima, S., Miller, P., Sezer, S., Safaei, Y., Trickel, E., Zhao, Z.: Deep android malware detection. pp. 301–308 (2017). https://doi.org/10.1145/3029806.3029823

  27. Molina Valdiviezo, L., Furfaro, A., Malena, G., Parise, A.: A simulation model for the analysis of DDOS amplification attacks (2015). https://doi.org/10.1109/UKSim.2015.52

  28. Obotivere, B., Nwaezeigwe, A.: Cyber security threats on the internet and possible solutions. IJARCCE 9, 92–97 (2020). https://doi.org/10.17148/IJARCCE.2020.9913

  29. Peng, T., Harris, I., Sawa, Y.: Detecting phishing attacks using natural language processing and machine learning. pp. 300–301 (2018). https://doi.org/10.1109/ICSC.2018.00056

  30. Rokon, M.O.F., Islam, R., Darki, A., Papalexakis, E., Faloutsos, M.: Sourcefinder: finding malware source-code from publicly available repositories in GitHub (2020)

    Google Scholar 

  31. Sausalito, C.: “cyberwarfare in the c-suite.” (2022). https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/ (Nov 13, 2020); Accessed 19 May 2022

  32. Schultz, M., Eskin, E., Zadok, F., Stolfo, S.: Data mining methods for detection of new malicious executables. pp. 38–49 (2001). https://doi.org/10.1109/SECPRI.2001.924286

  33. Sharma, S., Challa, R., Sahay, S.: Detection of advanced malware by machine learning techniques (2019)

    Google Scholar 

  34. Shrestha, P., Maharjan, S., Ramirez-de-la Rosa, G., Sprague, A., Solorio, T., Warner, G.: Using string information for malware family identification. pp. 686–697 (2014). https://doi.org/10.1007/978-3-319-12027-0_55

    Google Scholar 

  35. Syiemlieh, P., Golden, M., Khongsit, Sharma, U., Sharma, B.: Phishing-an analysis on the types, causes, preventive measures and case studies in the current situation (2015)

    Google Scholar 

  36. Taghavi Zargar, S., Joshi, J., Tipper, D.: A survey of defense mechanisms against distributed denial of service (DDOS) flooding attacks. IEEE Commun. Surv. Tutor. 15, 2046–2069 (2013). https://doi.org/10.1109/SURV.2013.031413.00127

  37. Tandon, R.: A survey of distributed denial of service attacks and defenses (2020). https://doi.org/10.48550/ARXIV.2008.01345, arXiv:abs/2008.01345

  38. Lau, R.Y., Liao, S.Y., Kwok, R.C.W., Xu, K., Xia, Y., Li, Y.: Text mining and probabilistic language modeling for online review spam detection. 2, 1–30 (2011). https://doi.org/10.1145/2070710.2070716

  39. Ye, Y., Chen, L., Hou, S., Hardy, W., Li, X.: DeepAM: a heterogeneous deep learning framework for intelligent malware detection. Knowl. Inf. Syst. 54, 1–21 (2018). https://doi.org/10.1007/s10115-017-1058-9

  40. Zhu, H.J., You, Z.H., Zhu, Z., Shi, W.L., Cheng, L.: DroiDdet: effective and robust detection of android malware using static analysis along with rotation forest model. Neurocomputing 272, 638–646 (2018). https://doi.org/10.1016/j.neucom.2017.07.030

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abhilash Chakraborty .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Chakraborty, A., Biswas, A., Khan, A.K. (2023). Artificial Intelligence for Cybersecurity: Threats, Attacks and Mitigation. In: Biswas, A., Semwal, V.B., Singh, D. (eds) Artificial Intelligence for Societal Issues. Intelligent Systems Reference Library, vol 231. Springer, Cham. https://doi.org/10.1007/978-3-031-12419-8_1

Download citation

Publish with us

Policies and ethics