• Complain

Leslie F. Sikos (editor) - AI in Cybersecurity

Here you can read online Leslie F. Sikos (editor) - AI in Cybersecurity full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2018, publisher: Springer, genre: Home and family. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Leslie F. Sikos (editor) AI in Cybersecurity

AI in Cybersecurity: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "AI in Cybersecurity" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

This book presents a collection of state-of-the-art AI approaches to cybersecurity and cyberthreat intelligence, offering strategic defense mechanisms for malware, addressing cybercrime, and assessing vulnerabilities to yield proactive rather than reactive countermeasures. The current variety and scope of cybersecurity threats far exceed the capabilities of even the most skilled security professionals. In addition, analyzing yesterdays security incidents no longer enables experts to predict and prevent tomorrows attacks, which necessitates approaches that go far beyond identifying known threats.

Nevertheless, there are promising avenues: complex behavior matching can isolate threats based on the actions taken, while machine learning can help detect anomalies, prevent malware infections, discover signs of illicit activities, and protect assets from hackers. In turn, knowledge representation enables automated reasoning over network data, helping achieve cybersituational awareness. Bringing together contributions by high-caliber experts, this book suggests new research directions in this critical and rapidly growing field.

Leslie F. Sikos (editor): author's other books


Who wrote AI in Cybersecurity? Find out the surname, the name of the author of the book and a list of all author's works by series.

AI in Cybersecurity — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "AI in Cybersecurity" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
Landmarks
Volume 151 Intelligent Systems Reference Library Series Editors Janusz - photo 1
Volume 151
Intelligent Systems Reference Library
Series Editors
Janusz Kacprzyk
Polish Academy of Sciences, Warsaw, Poland
Lakhmi C. Jain

The aim of this series is to publish a Reference Library, including novel advances and developments in all aspects of Intelligent Systems in an easily accessible and well structured form. The series includes reference works, handbooks, compendia, textbooks, well-structured monographs, dictionaries, and encyclopedias. It contains well integrated knowledge and current information in the field of Intelligent Systems. The series covers the theory, applications, and design methods of Intelligent Systems. Virtually all disciplines such as engineering, computer science, avionics, business, e-commerce, environment, healthcare, physics and life science are included. The list of topics spans all the areas of modern intelligent systems such as: Ambient intelligence, Computational intelligence, Social intelligence, Computational neuroscience, Artificial life, Virtual society, Cognitive systems, DNA and immunity-based systems, e-Learning and teaching, Human-centred computing and Machine ethics, Intelligent control, Intelligent data analysis, Knowledge-based paradigms, Knowledge management, Intelligent agents, Intelligent decision making, Intelligent network security, Interactive entertainment, Learning paradigms, Recommender systems, Robotics and Mechatronics including human-machine teaming, Self-organizing and adaptive systems, Soft computing including Neural systems, Fuzzy systems, Evolutionary computing and the Fusion of these paradigms, Perception and Vision, Web intelligence and Multimedia.

More information about this series at http://www.springer.com/series/8578

Editor
Leslie F. Sikos
AI in Cybersecurity
AI in Cybersecurity - image 2
Editor
Leslie F. Sikos
School of Information Technology and Mathematical Sciences, University of South Australia, Adelaide, SA, Australia
ISSN 1868-4394 e-ISSN 1868-4408
Intelligent Systems Reference Library
ISBN 978-3-319-98841-2 e-ISBN 978-3-319-98842-9
https://doi.org/10.1007/978-3-319-98842-9
Library of Congress Control Number: 2018950921
Springer Nature Switzerland AG 2019
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Switzerland AG

The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland

Foreword

Artificial intelligence (AI) is a relatively mature research topic, as evidenced by the top two AI conferences, the International Joint Conference on Artificial Intelligence and the AAAI Conference on Artificial Intelligence, which have been held since 1969 and 1980, respectively. Over the years, the advances in AI techniques have been phenomenal, and now AI is nearly ubiquitous. For example, the Guardian recently reported that AlphaZero AI beats champion chess program after teaching itself in 4 hours. Thus, a world in which everything is influenced, even to the extent of being controlled, by AI is no longer science fiction.

AI has applications not only in the commercial world, but also in battlefields and military settings, although this might be controversial. This is why Google decided not to renew their US government contract to develop AI techniques that can be used for military applications, such as battlefields (e.g., AI in Internet of military/battlefield things applications).

AI can also play an important role in cybersecurity, cyberthreat intelligence, and analytics to detect, contain, and mitigate advanced persistent threats (APTs), and fight against and mitigate malicious cyberactivities (e.g., organized cybercrimes and state-sponsored cyberthreats). For example, AI techniques can be trained to automatically scan for unknown malware or zero-day exploitation, based on certain features and behavior, rather than specific signatures.

This is the focus of this book. In Chap. , for example, the authors explain the potential of formal knowledge representation of network semantics in addressing interoperability challenges due to heterogeneous network data obtained from a wide range of sources. This constitutes a significant amount of data collected from or generated by, say, different security monitoring solutions. The formal knowledge representation of network semantics can be leveraged by intelligent and next-generation AI techniques and solutions to facilitate mining, interpreting, and extracting knowledge from structured (big) data to inform decision-making and cyberdefense strategies. Other cybersecurity applications of AI include the identification of vulnerabilities and weaknesses in systems and devices, and the detection of suspicious behaviors and anomalies, as explained in this book.

AI techniques and tools can, however, be exploited for malicious purposes. For example, an adversary can also use AI techniques to identify and exploit vulnerabilities in systems and devices. One possible scenario is for an attacker (or group of attackers) to design AI techniques to identify and exploit vulnerabilities in, say, driverless vehicles and unmanned aerial vehicles (UAVs, also known as drones), in order to facilitate coordinated attacks at places of mass gatherings (e.g., financial districts in cities during peak hours). Also, via coordinated attacks, AI techniques can exploit vulnerabilities in smart city infrastructures (e.g., intelligent transportation systems) to maximize the impact of such attacks, with the aim of causing societal panic and unrest. Hence, there is also a need to defend against AI-based cyberphysical attacks.

In other words, more work needs to be done in several directions to answer these open questions:
  1. How to use AI techniques to facilitate forensic investigation?

  2. How can we design AI techniques to facilitate the prediction of future cyberattacks or potential vulnerabilities (and their risk of successful exploitation)?

  3. Can AI techniques help design new security solutions to overcome the pitfalls of human design (e.g., mitigate the break-and-fix trend in cryptographic protocols) or even design new blockchain types?

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «AI in Cybersecurity»

Look at similar books to AI in Cybersecurity. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «AI in Cybersecurity»

Discussion, reviews of the book AI in Cybersecurity and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.