Artificial Intelligence in Cyber Security

Artificial Intelligence in Cyber Security

MohanaKrishnan M., A.V. Senthil Kumar, Veera Talukdar, Omar S. Saleh, Indrarini Dyah Irawati, Rohaya Latip, Gaganpreet Kaur
DOI: 10.4018/978-1-6684-8098-4.ch022
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In the digital age, cybersecurity has become an important issue. Data breaches, identity theft, captcha fracturing, and other similar designs abound, affecting millions of individuals and organizations. The challenges are always endless when it comes to inventing appropriate controls and procedures and implementing them as flawlessly as available to combat cyberattacks and crime. The risk of cyberattacks and crime has increased exponentially due to recent advances in artificial intelligence. It applies to almost all areas of the natural and engineering sciences. From healthcare to robotics, AI has revolutionized everything. In this chapter, the authors discuss certain encouraging artificial intelligence technologies. They cover the application of these techniques in cybersecurity. They conclude their discussion by talking about the future scope of artificial intelligence and cybersecurity.
Chapter Preview
Top

Machine learning is a popular AI technique that is being used to improve cyber security. By vast amounts of data, machine learning algorithms can identify patterns and anomalies that might indicate a cyberattack. Deep learning is another AI technique that is being used to detect and respond to cyber threats. Deep learning algorithms can identify complex patterns and relationships in data, enabling them to recognize sophisticated attacks that might otherwise go undetected.

Natural language processing (NLP) is another AI technique that is being used to enhance cyber security. NLP can be used to text data from sources such as social media, email, and chat logs to identify potential security threats (Mccarthy, 2004). This can help organizations to identify and respond to threats more quickly and effectively.

Complete Chapter List

Search this Book:
Reset