Journal of Cognitive Human-Computer Interaction

Journal DOI

https://doi.org/10.54216/JCHCI

Submit Your Paper

2771-1463ISSN (Online) 2771-1471ISSN (Print)
Full Length Article

Journal of Cognitive Human-Computer Interaction

Volume 2, Issue 2, PP: 50-55, 2022 | Cite this article as | XML | | Html PDF

A Survey on Cyber Security Meets Artificial Intelligence: AI– Driven Cyber Security

S.P. Samyuktha   1 * , Dr.P. Kavitha   2 , V.A Kshaya   3 , P. Shalini   4 , R. Ramya   5

  • 1 Department of AI&DS, Panimalar Engineering College, Chennai, India - (spsamyu516@gmail.com)
  • 2 Department of AI&DS, Panimalar Engineering College, Chennai, India - (bharathi3803@gmail.com)
  • 3 Department of AI&DS, Panimalar Engineering College, Chennai, India - (drkavitha.ads2021@gmail.com)
  • 4 Department of AI&DS, Panimalar Engineering College, Chennai, India - (shaluparthi789@gmail.com)
  • 5 Department of AI&DS, Panimalar Engineering College, Chennai, India - (ramesharithu@gmail.com)
  • Doi: https://doi.org/10.54216/JCHCI.020202

    Received: October29, 2021 Accepted: March21, 2022
    Abstract

    The computerized version of human intelligence is Artificial Intelligence(AI). Artificial Intelligence

    systems combine large sets of data with intelligent and iterative processing algorithms in order to make

    predictions, based on patterns and features in the data that they analyse. With the booming technologies

    such as IOT and Cloud Computing, huge amounts of data are generated and collected that require cyber

    security protection today. There is a growing need for cyber security methods which are both robust and

    intelligent due to the ever-increasing complexity of cyber crimes. While data can be used to benefit

    business interests, it poses a number of challenges in terms of security and privacy protection. Artificial

    Intelligence (AI) based technologies, such as machine learning statistics, big data analysis, deep learning

    and so on, have been used to deal with cyber security threats. These technologies are used for intrusion

    detection systems, malicious software detection, and encrypted communications. In the rapidly growing

    field of AI driven security, scientists from multiple disciplines work together to combat cyber threats. AI

    models require unique cyber security defence and protection technologies. This survey provides various

    method, different datasets and methodologies that may be used for the proposed IA enabled cyber security

    technologies. This study aims to classify the AI-based cyber security solutions gathered and describe how

    they can help solve problems in the field of cyber security.

    Keywords :

    artificial intelligence, cyber security, machine learning, detection system, AI based cyber security.

    References

    [1] SomuVelgekar, HarshKhandve, RajeshwariGundla:“Survey of Artificial Intelligence Applications in Cyber

    security” , Volume10, Issue 5, May 2021.

    [2] Dr.SunilBhutada, PreetiBhutada, “Applications of Artificial Intelligence in Cyber Security” (Volume5, Issue4,

    April 2018).

    [3] JiagengChen, Chunhua Su and ZhengYan.”AI-Driven Cyber Security Analytics and Privacy Protection”,

    Hindawi Security and Communication Networks Volume 2019.

    [4] YaoJun, Alisa Craig, Wasswa Shafik, and LuleSharif: “Artificial Intelligence Application in Cyber security and

    Cyber defense “,Hindawi Wireless Communications and Mobile Computing Volume 2021.

    [5] IsaacWiafe, FelixNtiKoranteng, EmmanuelNyarkoObeng, NanaAssyne, AbigailWiafe, and StephenR.Gulliver:

    “Artificial Intelligence for Cyber security: A Systematic Mapping of Literature” , July 30, 2020.

    [6] X.Chenetal. ,“Artificial intelligence-empowered path selection: A survey of ant colony optimization for static

    and mobile sensor networks, ”IEEE Access, vol.8, pp.71497–71511, 2020,

    doi:10.1109/ACCESS.2020.2984329.

    [7] FengTao, MuhammadShoaibAkhtar and ZhangJiayuan: “The future of Artificial Intelligence in Cyber security:

    A Comprehensive Survey“(07July2021)

    [8] [8].Jian-huaLI: “Cyber security meets artificial intelligence: a survey“, Dec.24, 2018.

    [9] Harini MRajan, DharaniS “Artificial Intelligence in Cyber Security-An Investigation” Int. Res. J. Computer

    Science, Issue, vol.09, no.4, pp.28–30, 2017.

    [10] B.Christain, D.A.Elizondo and T.Watson, ―Application of artificial neural networks and related techniques to

    intrusion detection‖,World Congress on Computation Intelligence, pp.949-954, 2010.

    [11] I.H.Sarker, Y.B.Abushark, F.Alsolami, and A.I.Khan, “IntruD Tree: A machine learning based cyber security

    intrusion detection model,”Symmetry (Basel). vol. 12, no. 5, pp.1–15, 2020, doi:10.3390/SYM12050754.

    [12] Shidawa BabaAtiku, AchiUnimkeAaron, GotengKuwunidiJob, FatimaShittu, and IsmailZahraddeenYakubu:

    “Survey on the Applications of Artificial Intelligence in Cyber Security”, international journal of scientific &

    technology research volume 9, issue10, October 2020.

    [13] Syarif A R, Gata W, 2017 .Intrusion detection system using hybrid binary PSO and K-nearest neighbourhood

    algorithm. 11th International Conference on Information & Communication Technology and System.

    [14] BinnyNaik1·AshirMehta1·HiteshriYagnik2·MananShah3:“The impacts of artificial intelligence techniques in

    augmentation of cyber security: a comprehensive review”, 3 August 2021

    [15] P. Kavitha , R. Subha Shini , R. Priya, "An Implementation Of Statistical Feature Algorithms For The Detection

    Of Brain Tumor", Journal of Cognitive Human-Computer Interaction, 2021, DOI:

    https://doi.org/10.54216/JCHCI.010202.

    [16] Sonia Jenifer Rayen, "Survey On Smart Cane For Visually Impaired Using IOT", Journal of Cognitive Human-

    Computer Interaction, 2021, DOI: https://doi.org/10.54216/JCHCI.010205.

    [17] Ajith Krishna R , Ankit Kumar , Vijay K, " An Automated Optimize Utilization of Water and Crop Monitoring

    in Agriculture Using IoT", Journal of Cognitive Human-Computer Interaction, 2021,

    https://doi.org/10.54216/JCHCI.010105.

    [18] Ashok Kumar M , Abirami A , Sindhu P , Ashok Kumar V D , Rani V, " Modern Medical Innovation on the

    Preferred Information about the Medicine using AI Technique", Journal of Cognitive Human-Computer

    Interaction, 2021, https://doi.org/10.54216/JCHCI.010102.

    Cite This Article As :
    S.P. Samyuktha, Dr.P. Kavitha, V.A Kshaya, P. Shalini , R. Ramya. "A Survey on Cyber Security Meets Artificial Intelligence: AI– Driven Cyber Security." Full Length Article, Vol. 2, No. 2, 2022 ,PP. 50-55 (Doi   :  https://doi.org/10.54216/JCHCI.020202)
    S.P. Samyuktha, Dr.P. Kavitha, V.A Kshaya, P. Shalini , R. Ramya. (2022). A Survey on Cyber Security Meets Artificial Intelligence: AI– Driven Cyber Security. Journal of , 2 ( 2 ), 50-55 (Doi   :  https://doi.org/10.54216/JCHCI.020202)
    S.P. Samyuktha, Dr.P. Kavitha, V.A Kshaya, P. Shalini , R. Ramya. "A Survey on Cyber Security Meets Artificial Intelligence: AI– Driven Cyber Security." Journal of , 2 no. 2 (2022): 50-55 (Doi   :  https://doi.org/10.54216/JCHCI.020202)
    S.P. Samyuktha, Dr.P. Kavitha, V.A Kshaya, P. Shalini , R. Ramya. (2022). A Survey on Cyber Security Meets Artificial Intelligence: AI– Driven Cyber Security. Journal of , 2 ( 2 ), 50-55 (Doi   :  https://doi.org/10.54216/JCHCI.020202)
    S.P. Samyuktha, Dr.P. Kavitha, V.A Kshaya, P. Shalini , R. Ramya. A Survey on Cyber Security Meets Artificial Intelligence: AI– Driven Cyber Security. Journal of , (2022); 2 ( 2 ): 50-55 (Doi   :  https://doi.org/10.54216/JCHCI.020202)
    S.P. Samyuktha, Dr.P. Kavitha, V.A Kshaya, P. Shalini, R. Ramya, A Survey on Cyber Security Meets Artificial Intelligence: AI– Driven Cyber Security, Journal of , Vol. 2 , No. 2 , (2022) : 50-55 (Doi   :  https://doi.org/10.54216/JCHCI.020202)