The Role of AI-ML Techniques in Cyber Security

The Role of AI-ML Techniques in Cyber Security

Sima Das, Ajay Kumar Balmiki, Kaushik Mazumdar
DOI: 10.4018/978-1-6684-3991-3.ch003
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Digital protection is the act and protocol to protect personal computers, mobile, electronic devices, and data from malicious attacks. Artificial intelligence (AI) and machine learning (ML) are presently essential for our daily existence, and this incorporates network protection. AI/ML can recognize vulnerabilities and lessen occurrence reaction time. Due to this unprecedented test, AI-based instruments for network safety have arisen to help data security groups decrease break chance and further develop their security to act proficiently and successfully. Simulated intelligence and AI developed basic advances in information security, as they can quickly examine a huge quantity of datasets and recognize various kinds of network stranded and breaches – from malware, one can pursue advantage to distinguishing unsafe comportment which might prompt a phishing attack or downloading malicious program. The advancements learned over the system can be used to identify new types of attacks in the future.
Chapter Preview
Top

Introduction

A cyber-physical system (CPS) or smart device is a system which can be controlled as well as monitored the given task through computer primarily related algorithms. Though in cyber physical system, applications of physical and software additives are thoroughly intertwined, able to feature on remarkable spatial and temporal scales, show off multiple and notable behavioral modalities, and have interaction with each different in approaches that exchange with context. CPS involves transdisciplinary methods, merging principles of cybernetics, mechatronics, layout and technique science. The task manager is regularly called embedded structures. In embedded systems, the emphasis has a bent to be greater at the executive factors, and much less on a severe hyperlink among the computational and physical factors. CPS is likewise similar to the Internet of Things (IoT), sharing the same simple structure; though, cyber physical system represents a greatest sum up and synchronization among physical and execution factors.

Complete Chapter List

Search this Book:
Reset