205,622 research outputs found
An Immune Inspired Approach to Anomaly Detection
The immune system provides a rich metaphor for computer security: anomaly
detection that works in nature should work for machines. However, early
artificial immune system approaches for computer security had only limited
success. Arguably, this was due to these artificial systems being based on too
simplistic a view of the immune system. We present here a second generation
artificial immune system for process anomaly detection. It improves on earlier
systems by having different artificial cell types that process information.
Following detailed information about how to build such second generation
systems, we find that communication between cells types is key to performance.
Through realistic testing and validation we show that second generation
artificial immune systems are capable of anomaly detection beyond generic
system policies. The paper concludes with a discussion and outline of the next
steps in this exciting area of computer security.Comment: 19 pages, 4 tables, 2 figures, Handbook of Research on Information
Security and Assuranc
Explanation and trust: what to tell the user in security and AI?
There is a common problem in artificial intelligence (AI) and information security. In AI, an expert system needs to be able to justify and explain a decision to the user. In information security, experts need to be able to explain to the public why a system is secure. In both cases, the goal of explanation is to acquire or maintain the users' trust. In this paper, we investigate the relation between explanation and trust in the context of computing science. This analysis draws on literature study and concept analysis, using elements from system theory as well as actor-network theory. We apply the conceptual framework to both AI and information security, and show the benefit of the framework for both fields by means of examples. The main focus is on expert systems (AI) and electronic voting systems (security). Finally, we discuss consequences of our analysis for ethics in terms of (un)informed consent and dissent, and the associated division of responsibilities
The Practice Research of Artificial Intelligence in Computer Network Technology in the New Era
This paper summarizes the practical application and development trend of artificial intelligence technology in the field of computer network. Artificial intelligence has been widely used in network communication, management and security, and other aspects, to achieve the network independent optimization, fault self-healing, threat identification and other intelligent capabilities. Artificial intelligence is a key technology to promote the evolution of the next generation network to the direction of adaptive, intelligence and security. The use of artificial intelligence also faces challenges such as algorithm deviations and regulatory constraints. Collaborative innovation algorithms and systems and the establishment of legal ethics systems are needed to promote the healthy development of AI and the progress of computer networks
- …