2412 820
Full Length Article
Journal of Cognitive Human-Computer Interaction
Volume 2 , Issue 2, PP: 50-55 , 2022 | Cite this article as | XML | Html |PDF

Title

A Survey on Cyber Security Meets Artificial Intelligence: AI– Driven Cyber Security

  S.P. Samyuktha 1 * ,   Dr.P. Kavitha 2 ,   V.A Kshaya 3 ,   P. Shalini 4 ,   R. Ramya 5

1  Department of AI&DS, Panimalar Engineering College, Chennai, India
    (spsamyu516@gmail.com)

2  Department of AI&DS, Panimalar Engineering College, Chennai, India
    (bharathi3803@gmail.com)

3  Department of AI&DS, Panimalar Engineering College, Chennai, India
    (drkavitha.ads2021@gmail.com)

4  Department of AI&DS, Panimalar Engineering College, Chennai, India
    (shaluparthi789@gmail.com)

5  Department of AI&DS, Panimalar Engineering College, Chennai, India
    (ramesharithu@gmail.com)


Doi   :   https://doi.org/10.54216/JCHCI.020202

Received: October29, 2021 Accepted: March21, 2022

Abstract :

The computerized version of human intelligence is Artificial Intelligence(AI). Artificial Intelligence

systems combine large sets of data with intelligent and iterative processing algorithms in order to make

predictions, based on patterns and features in the data that they analyse. With the booming technologies

such as IOT and Cloud Computing, huge amounts of data are generated and collected that require cyber

security protection today. There is a growing need for cyber security methods which are both robust and

intelligent due to the ever-increasing complexity of cyber crimes. While data can be used to benefit

business interests, it poses a number of challenges in terms of security and privacy protection. Artificial

Intelligence (AI) based technologies, such as machine learning statistics, big data analysis, deep learning

and so on, have been used to deal with cyber security threats. These technologies are used for intrusion

detection systems, malicious software detection, and encrypted communications. In the rapidly growing

field of AI driven security, scientists from multiple disciplines work together to combat cyber threats. AI

models require unique cyber security defence and protection technologies. This survey provides various

method, different datasets and methodologies that may be used for the proposed IA enabled cyber security

technologies. This study aims to classify the AI-based cyber security solutions gathered and describe how

they can help solve problems in the field of cyber security.

Keywords :

artificial intelligence , cyber security , machine learning , detection system , AI based cyber security.

References :

[1] SomuVelgekar, HarshKhandve, RajeshwariGundla:“Survey of Artificial Intelligence Applications in Cyber

security” , Volume10, Issue 5, May 2021.

[2] Dr.SunilBhutada, PreetiBhutada, “Applications of Artificial Intelligence in Cyber Security” (Volume5, Issue4,

April 2018).

[3] JiagengChen, Chunhua Su and ZhengYan.”AI-Driven Cyber Security Analytics and Privacy Protection”,

Hindawi Security and Communication Networks Volume 2019.

[4] YaoJun, Alisa Craig, Wasswa Shafik, and LuleSharif: “Artificial Intelligence Application in Cyber security and

Cyber defense “,Hindawi Wireless Communications and Mobile Computing Volume 2021.

[5] IsaacWiafe, FelixNtiKoranteng, EmmanuelNyarkoObeng, NanaAssyne, AbigailWiafe, and StephenR.Gulliver:

“Artificial Intelligence for Cyber security: A Systematic Mapping of Literature” , July 30, 2020.

[6] X.Chenetal. ,“Artificial intelligence-empowered path selection: A survey of ant colony optimization for static

and mobile sensor networks, ”IEEE Access, vol.8, pp.71497–71511, 2020,

doi:10.1109/ACCESS.2020.2984329.

[7] FengTao, MuhammadShoaibAkhtar and ZhangJiayuan: “The future of Artificial Intelligence in Cyber security:

A Comprehensive Survey“(07July2021)

[8] [8].Jian-huaLI: “Cyber security meets artificial intelligence: a survey“, Dec.24, 2018.

[9] Harini MRajan, DharaniS “Artificial Intelligence in Cyber Security-An Investigation” Int. Res. J. Computer

Science, Issue, vol.09, no.4, pp.28–30, 2017.

[10] B.Christain, D.A.Elizondo and T.Watson, ―Application of artificial neural networks and related techniques to

intrusion detection‖,World Congress on Computation Intelligence, pp.949-954, 2010.

[11] I.H.Sarker, Y.B.Abushark, F.Alsolami, and A.I.Khan, “IntruD Tree: A machine learning based cyber security

intrusion detection model,”Symmetry (Basel). vol. 12, no. 5, pp.1–15, 2020, doi:10.3390/SYM12050754.

[12] Shidawa BabaAtiku, AchiUnimkeAaron, GotengKuwunidiJob, FatimaShittu, and IsmailZahraddeenYakubu:

“Survey on the Applications of Artificial Intelligence in Cyber Security”, international journal of scientific &

technology research volume 9, issue10, October 2020.

[13] Syarif A R, Gata W, 2017 .Intrusion detection system using hybrid binary PSO and K-nearest neighbourhood

algorithm. 11th International Conference on Information & Communication Technology and System.

[14] BinnyNaik1·AshirMehta1·HiteshriYagnik2·MananShah3:“The impacts of artificial intelligence techniques in

augmentation of cyber security: a comprehensive review”, 3 August 2021

[15] P. Kavitha , R. Subha Shini , R. Priya, "An Implementation Of Statistical Feature Algorithms For The Detection

Of Brain Tumor", Journal of Cognitive Human-Computer Interaction, 2021, DOI:

https://doi.org/10.54216/JCHCI.010202.

[16] Sonia Jenifer Rayen, "Survey On Smart Cane For Visually Impaired Using IOT", Journal of Cognitive Human-

Computer Interaction, 2021, DOI: https://doi.org/10.54216/JCHCI.010205.

[17] Ajith Krishna R , Ankit Kumar , Vijay K, " An Automated Optimize Utilization of Water and Crop Monitoring

in Agriculture Using IoT", Journal of Cognitive Human-Computer Interaction, 2021,

https://doi.org/10.54216/JCHCI.010105.

[18] Ashok Kumar M , Abirami A , Sindhu P , Ashok Kumar V D , Rani V, " Modern Medical Innovation on the

Preferred Information about the Medicine using AI Technique", Journal of Cognitive Human-Computer

Interaction, 2021, https://doi.org/10.54216/JCHCI.010102.


Cite this Article as :
Style #
MLA S.P. Samyuktha, Dr.P. Kavitha, V.A Kshaya, P. Shalini , R. Ramya. "A Survey on Cyber Security Meets Artificial Intelligence: AI– Driven Cyber Security." Journal of Cognitive Human-Computer Interaction, Vol. 2, No. 2, 2022 ,PP. 50-55 (Doi   :  https://doi.org/10.54216/JCHCI.020202)
APA S.P. Samyuktha, Dr.P. Kavitha, V.A Kshaya, P. Shalini , R. Ramya. (2022). A Survey on Cyber Security Meets Artificial Intelligence: AI– Driven Cyber Security. Journal of Journal of Cognitive Human-Computer Interaction, 2 ( 2 ), 50-55 (Doi   :  https://doi.org/10.54216/JCHCI.020202)
Chicago S.P. Samyuktha, Dr.P. Kavitha, V.A Kshaya, P. Shalini , R. Ramya. "A Survey on Cyber Security Meets Artificial Intelligence: AI– Driven Cyber Security." Journal of Journal of Cognitive Human-Computer Interaction, 2 no. 2 (2022): 50-55 (Doi   :  https://doi.org/10.54216/JCHCI.020202)
Harvard S.P. Samyuktha, Dr.P. Kavitha, V.A Kshaya, P. Shalini , R. Ramya. (2022). A Survey on Cyber Security Meets Artificial Intelligence: AI– Driven Cyber Security. Journal of Journal of Cognitive Human-Computer Interaction, 2 ( 2 ), 50-55 (Doi   :  https://doi.org/10.54216/JCHCI.020202)
Vancouver S.P. Samyuktha, Dr.P. Kavitha, V.A Kshaya, P. Shalini , R. Ramya. A Survey on Cyber Security Meets Artificial Intelligence: AI– Driven Cyber Security. Journal of Journal of Cognitive Human-Computer Interaction, (2022); 2 ( 2 ): 50-55 (Doi   :  https://doi.org/10.54216/JCHCI.020202)
IEEE S.P. Samyuktha, Dr.P. Kavitha, V.A Kshaya, P. Shalini, R. Ramya, A Survey on Cyber Security Meets Artificial Intelligence: AI– Driven Cyber Security, Journal of Journal of Cognitive Human-Computer Interaction, Vol. 2 , No. 2 , (2022) : 50-55 (Doi   :  https://doi.org/10.54216/JCHCI.020202)