Volume 151
Intelligent Systems Reference Library
Series Editors
Janusz Kacprzyk
Polish Academy of Sciences, Warsaw, Poland
Lakhmi C. Jain
The aim of this series is to publish a Reference Library, including novel advances and developments in all aspects of Intelligent Systems in an easily accessible and well structured form. The series includes reference works, handbooks, compendia, textbooks, well-structured monographs, dictionaries, and encyclopedias. It contains well integrated knowledge and current information in the field of Intelligent Systems. The series covers the theory, applications, and design methods of Intelligent Systems. Virtually all disciplines such as engineering, computer science, avionics, business, e-commerce, environment, healthcare, physics and life science are included. The list of topics spans all the areas of modern intelligent systems such as: Ambient intelligence, Computational intelligence, Social intelligence, Computational neuroscience, Artificial life, Virtual society, Cognitive systems, DNA and immunity-based systems, e-Learning and teaching, Human-centred computing and Machine ethics, Intelligent control, Intelligent data analysis, Knowledge-based paradigms, Knowledge management, Intelligent agents, Intelligent decision making, Intelligent network security, Interactive entertainment, Learning paradigms, Recommender systems, Robotics and Mechatronics including human-machine teaming, Self-organizing and adaptive systems, Soft computing including Neural systems, Fuzzy systems, Evolutionary computing and the Fusion of these paradigms, Perception and Vision, Web intelligence and Multimedia.
More information about this series at http://www.springer.com/series/8578
Editor
Leslie F. Sikos
School of Information Technology and Mathematical Sciences, University of South Australia, Adelaide, SA, Australia
ISSN 1868-4394 e-ISSN 1868-4408
Intelligent Systems Reference Library
ISBN 978-3-319-98841-2 e-ISBN 978-3-319-98842-9
https://doi.org/10.1007/978-3-319-98842-9
Library of Congress Control Number: 2018950921
Springer Nature Switzerland AG 2019
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Foreword
Artificial intelligence (AI) is a relatively mature research topic, as evidenced by the top two AI conferences, the International Joint Conference on Artificial Intelligence and the AAAI Conference on Artificial Intelligence, which have been held since 1969 and 1980, respectively. Over the years, the advances in AI techniques have been phenomenal, and now AI is nearly ubiquitous. For example, the Guardian recently reported that AlphaZero AI beats champion chess program after teaching itself in 4 hours. Thus, a world in which everything is influenced, even to the extent of being controlled, by AI is no longer science fiction.
AI has applications not only in the commercial world, but also in battlefields and military settings, although this might be controversial. This is why Google decided not to renew their US government contract to develop AI techniques that can be used for military applications, such as battlefields (e.g., AI in Internet of military/battlefield things applications).
AI can also play an important role in cybersecurity, cyberthreat intelligence, and analytics to detect, contain, and mitigate advanced persistent threats (APTs), and fight against and mitigate malicious cyberactivities (e.g., organized cybercrimes and state-sponsored cyberthreats). For example, AI techniques can be trained to automatically scan for unknown malware or zero-day exploitation, based on certain features and behavior, rather than specific signatures.
This is the focus of this book. In Chap. , for example, the authors explain the potential of formal knowledge representation of network semantics in addressing interoperability challenges due to heterogeneous network data obtained from a wide range of sources. This constitutes a significant amount of data collected from or generated by, say, different security monitoring solutions. The formal knowledge representation of network semantics can be leveraged by intelligent and next-generation AI techniques and solutions to facilitate mining, interpreting, and extracting knowledge from structured (big) data to inform decision-making and cyberdefense strategies. Other cybersecurity applications of AI include the identification of vulnerabilities and weaknesses in systems and devices, and the detection of suspicious behaviors and anomalies, as explained in this book.
AI techniques and tools can, however, be exploited for malicious purposes. For example, an adversary can also use AI techniques to identify and exploit vulnerabilities in systems and devices. One possible scenario is for an attacker (or group of attackers) to design AI techniques to identify and exploit vulnerabilities in, say, driverless vehicles and unmanned aerial vehicles (UAVs, also known as drones), in order to facilitate coordinated attacks at places of mass gatherings (e.g., financial districts in cities during peak hours). Also, via coordinated attacks, AI techniques can exploit vulnerabilities in smart city infrastructures (e.g., intelligent transportation systems) to maximize the impact of such attacks, with the aim of causing societal panic and unrest. Hence, there is also a need to defend against AI-based cyberphysical attacks.
In other words, more work needs to be done in several directions to answer these open questions:
How to use AI techniques to facilitate forensic investigation?
How can we design AI techniques to facilitate the prediction of future cyberattacks or potential vulnerabilities (and their risk of successful exploitation)?
Can AI techniques help design new security solutions to overcome the pitfalls of human design (e.g., mitigate the break-and-fix trend in cryptographic protocols) or even design new blockchain types?