2 research outputs found
Use of Artificial Intelligence Techniques / Applications in Cyber Defense
Nowadays, considering the speed of the processes and the amount of data used
in cyber defense, it cannot be expected to have an effective defense by using
only human power without the help of automation systems. However, for the
effective defense against dynamically evolving attacks on networks, it is
difficult to develop software with conventional fixed algorithms. This can be
achieved by using artificial intelligence methods that provide flexibility and
learning capability. The likelihood of developing cyber defense capabilities
through increased intelligence of defense systems is quite high. Given the
problems associated with cyber defense in real life, it is clear that many
cyber defense problems can be successfully solved only when artificial
intelligence methods are used. In this article, the current artificial
intelligence practices and techniques are reviewed and the use and importance
of artificial intelligence in cyber defense systems is mentioned. The aim of
this article is to be able to explain the use of these methods in the field of
cyber defense with current examples by considering and analyzing the artificial
intelligence technologies and methodologies that are currently being developed
and integrating them with the role and adaptation of the technology and
methodology in the defense of cyberspace
Exception Agent Detection System for IP Spoofing Over Online Environments
Over the recent years, IP and email spoofing gained much importance for
security concerns due to the current changes in manipulating the system
performance in different online environments. Intrusion Detection System (IDS)
has been used to secure these environments for sharing their data over network
and host based IDS approaches. However, the rapid growth of intrusion events
over Internet and local area network become responsible for the distribution of
different threats and vulnerabilities in the computing systems. The current
signature detection approach used by IDS, detects unclear actions based on
analyzing and describing the action patterns such as time, text, password etc
and has been faced difficulties in updating information, detect unknown novel
attacks, maintenance of an IDS which is necessarily connected with analyzing
and patching of security holes, and the lack of information on user privileges
and attack signature structure. Thus, this paper proposes an EADS (Exception
agent detection system) for securing the header information carried by IP over
online environments. The study mainly concerns with the deployment of new
technique for detecting and eliminating the unknown threats attacks during the
data sharing over online environments.Comment: 7 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis