Integrating Artificial Intelligence into Human-In-The-Loop Cybersecurity: Techniques and Advances

T Poonkodi

Abstract


The process of defending computer networks against cyberattacks or unintentional unauthorized access has become known as cybersecurity. For businesses and security experts who are constantly searching for improvedways to combat these threats, this constantly changing threat landscape presents difficulties. By integratingcybersecurity with artificial intelligence, security professionals can better protect sensitive networks and data fromonline threats. For identifying malware attacks, network intrusions, phishing and spam emails, and data violations,among other threats, AI-based approaches can offer strong and efficient cyber defence solutions that can notifysecurity problems as quickly as they happen. The objective of this research paper was to evaluate the impact of AIbased technologies on organizational cyber security and determine their effectiveness compared to traditional cybersecurity approaches. The proposed Enhanced Human-in-the-Loop Cybersecurity Techniques effectively prevent anddetect uncertain cyber events.

References


Bhardwaj, M.D. Alshehri, K. Kaushik, H.J. Alyamani, M. Kumar, Secure framework against cyber-attacks on cyberphysical robotic systems, J. Electron. Imaging 31 (6) (2022), 061802-061802.

M. N. O. Sadiku, S. Alam, S. M. Musa, and C. M. Akujuobi,” A primer on cybersecurity,” International Journal of Advances in Scientific Research and Engineering, vol. 3, no. 8, Sept. 2017, pp. 71-74.

M. N. O. Sadiku, T. J. Ashaolu, and S. M. Musa,” Artificial Intelligence in medicine: A primer,” International Journal of Trend in Research and Development, vol. 6, no. 1, Jan.-Feb. 2019, pp. 270-272.

Y. Mintz and R. Brodie, “Introduction to artificial intelligence in medicine,” Minimally Invasive Therapy & Allied Technologies, vol. 28, no. 2, 2019, pp. 73-81.

M. N. O. Sadiku, Y. Zhou, and S. M. Musa, “Natural language processing in healthcare,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 8, no. 5, May 2018, pp. 39-42.

M. Taddeo, T. McCutcheon, and L. Floridi , “Trusting artificial intelligence in cybersecurity is a double-edged sword,” Nature Machine Intelligence, vol. 1, November 2019, pp. 557–560.

M. Zajko, "Canada’s cyber security and the changing threat landscape", Critical Studies on Security, vol. 3, no. 2, pp. 147-161, 2015.

R. Winkels, Eleventh International Conference on Artificial Intelligence and Law: proceedings: June 4-8, 2007, Stanford Law School, Stanford, California. Place of publication not identified: ACM, 2007.

H. Bidgoli, Handbook of information security. Hoboken, NJ: John Wiley, 2006.

H. Zhuge, "Semantic linking through spaces for cyber-physical-socio intelligence: A methodology", Artificial Intelligence, vol. 175, no. 5- 6, pp. 988-1019, 2011.

Wang Z, Fang B (2019) Application of combined kernel function artifcial intelligence algorithm in mobile communication network security authentication mechanism. J Supercomput 75(9):5946–5964.

Hariyanto, Sudiro SA, Lukman S (2015) Minutiae matching algorithm using artifcial neural network for fngerprint recognition. In: 2015 3rd international conference on artifcial intelligence, modelling and simulation (AIMS), pp 37–41.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.

Â