Volume 2 , Issue 2 , PP: 50-55, 2022 | Cite this article as | XML | Html | PDF | Full Length Article
S.P. Samyuktha 1 * , Dr.P. Kavitha 2 , V.A Kshaya 3 , P. Shalini 4 , R. Ramya 5
Doi: https://doi.org/10.54216/JCHCI.020202
The computerized version of human intelligence is Artificial Intelligence(AI). Artificial Intelligence
systems combine large sets of data with intelligent and iterative processing algorithms in order to make
predictions, based on patterns and features in the data that they analyse. With the booming technologies
such as IOT and Cloud Computing, huge amounts of data are generated and collected that require cyber
security protection today. There is a growing need for cyber security methods which are both robust and
intelligent due to the ever-increasing complexity of cyber crimes. While data can be used to benefit
business interests, it poses a number of challenges in terms of security and privacy protection. Artificial
Intelligence (AI) based technologies, such as machine learning statistics, big data analysis, deep learning
and so on, have been used to deal with cyber security threats. These technologies are used for intrusion
detection systems, malicious software detection, and encrypted communications. In the rapidly growing
field of AI driven security, scientists from multiple disciplines work together to combat cyber threats. AI
models require unique cyber security defence and protection technologies. This survey provides various
method, different datasets and methodologies that may be used for the proposed IA enabled cyber security
technologies. This study aims to classify the AI-based cyber security solutions gathered and describe how
they can help solve problems in the field of cyber security.
artificial intelligence, cyber security, machine learning, detection system, AI based cyber security.
[1] SomuVelgekar, HarshKhandve, RajeshwariGundla:“Survey of Artificial Intelligence Applications in Cyber
security” , Volume10, Issue 5, May 2021.
[2] Dr.SunilBhutada, PreetiBhutada, “Applications of Artificial Intelligence in Cyber Security” (Volume5, Issue4,
April 2018).
[3] JiagengChen, Chunhua Su and ZhengYan.”AI-Driven Cyber Security Analytics and Privacy Protection”,
Hindawi Security and Communication Networks Volume 2019.
[4] YaoJun, Alisa Craig, Wasswa Shafik, and LuleSharif: “Artificial Intelligence Application in Cyber security and
Cyber defense “,Hindawi Wireless Communications and Mobile Computing Volume 2021.
[5] IsaacWiafe, FelixNtiKoranteng, EmmanuelNyarkoObeng, NanaAssyne, AbigailWiafe, and StephenR.Gulliver:
“Artificial Intelligence for Cyber security: A Systematic Mapping of Literature” , July 30, 2020.
[6] X.Chenetal. ,“Artificial intelligence-empowered path selection: A survey of ant colony optimization for static
and mobile sensor networks, ”IEEE Access, vol.8, pp.71497–71511, 2020,
doi:10.1109/ACCESS.2020.2984329.
[7] FengTao, MuhammadShoaibAkhtar and ZhangJiayuan: “The future of Artificial Intelligence in Cyber security:
A Comprehensive Survey“(07July2021)
[8] [8].Jian-huaLI: “Cyber security meets artificial intelligence: a survey“, Dec.24, 2018.
[9] Harini MRajan, DharaniS “Artificial Intelligence in Cyber Security-An Investigation” Int. Res. J. Computer
Science, Issue, vol.09, no.4, pp.28–30, 2017.
[10] B.Christain, D.A.Elizondo and T.Watson, ―Application of artificial neural networks and related techniques to
intrusion detection‖,World Congress on Computation Intelligence, pp.949-954, 2010.
[11] I.H.Sarker, Y.B.Abushark, F.Alsolami, and A.I.Khan, “IntruD Tree: A machine learning based cyber security
intrusion detection model,”Symmetry (Basel). vol. 12, no. 5, pp.1–15, 2020, doi:10.3390/SYM12050754.
[12] Shidawa BabaAtiku, AchiUnimkeAaron, GotengKuwunidiJob, FatimaShittu, and IsmailZahraddeenYakubu:
“Survey on the Applications of Artificial Intelligence in Cyber Security”, international journal of scientific &
technology research volume 9, issue10, October 2020.
[13] Syarif A R, Gata W, 2017 .Intrusion detection system using hybrid binary PSO and K-nearest neighbourhood
algorithm. 11th International Conference on Information & Communication Technology and System.
[14] BinnyNaik1·AshirMehta1·HiteshriYagnik2·MananShah3:“The impacts of artificial intelligence techniques in
augmentation of cyber security: a comprehensive review”, 3 August 2021
[15] P. Kavitha , R. Subha Shini , R. Priya, "An Implementation Of Statistical Feature Algorithms For The Detection
Of Brain Tumor", Journal of Cognitive Human-Computer Interaction, 2021, DOI:
https://doi.org/10.54216/JCHCI.010202.
[16] Sonia Jenifer Rayen, "Survey On Smart Cane For Visually Impaired Using IOT", Journal of Cognitive Human-
Computer Interaction, 2021, DOI: https://doi.org/10.54216/JCHCI.010205.
[17] Ajith Krishna R , Ankit Kumar , Vijay K, " An Automated Optimize Utilization of Water and Crop Monitoring
in Agriculture Using IoT", Journal of Cognitive Human-Computer Interaction, 2021,
https://doi.org/10.54216/JCHCI.010105.
[18] Ashok Kumar M , Abirami A , Sindhu P , Ashok Kumar V D , Rani V, " Modern Medical Innovation on the
Preferred Information about the Medicine using AI Technique", Journal of Cognitive Human-Computer
Interaction, 2021, https://doi.org/10.54216/JCHCI.010102.