2020
DOI: 10.3390/sym12030410
|View full text |Cite
|
Sign up to set email alerts
|

Artificial Intelligence in the Cyber Domain: Offense and Defense

Abstract: Artificial intelligence techniques have grown rapidly in recent years, and their applications in practice can be seen in many fields, ranging from facial recognition to image analysis. In the cybersecurity domain, AI-based techniques can provide better cyber defense tools and help adversaries improve methods of attack. However, malicious actors are aware of the new prospects too and will probably attempt to use them for nefarious purposes. This survey paper aims at providing an overview of how artificial intel… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
26
0
1

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 69 publications
(27 citation statements)
references
References 66 publications
0
26
0
1
Order By: Relevance
“…Machine learning methods are becoming increasingly popular in several domains, such as image and speech processing, social media marketing, healthcare, and also in cybersecurity [25][26][27]. These techniques can be separated into two main categories: supervised algorithms must undergo a training phase with a proper labeled dataset, where each sample is associated with a specific label (or class); on the other hand, unsupervised algorithms do not require a labeled dataset.…”
Section: Machine Learning For Cyber Detectionmentioning
confidence: 99%
See 2 more Smart Citations
“…Machine learning methods are becoming increasingly popular in several domains, such as image and speech processing, social media marketing, healthcare, and also in cybersecurity [25][26][27]. These techniques can be separated into two main categories: supervised algorithms must undergo a training phase with a proper labeled dataset, where each sample is associated with a specific label (or class); on the other hand, unsupervised algorithms do not require a labeled dataset.…”
Section: Machine Learning For Cyber Detectionmentioning
confidence: 99%
“…• Decision Tree: these algorithms are conditional classifiers composed of several nodes. The tree is inspected from top to bottom, where a given condition is checked at each node by analyzing the features of the input sample, leading to the following node [1,3,27,28]. • Random Forest: they are ensemble methods consisting of several Decision Trees, in which the output is computed after evaluating the prediction of each individual tree composing the "forest" [1,3,[27][28][29].…”
Section: Machine Learning For Cyber Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, when vertex 1 is deleted, its neighbors N (1) = {7, 11, 13, 15} react to this deletion and traverse their neighbor list to check whether they are linked to each other, and then establish a new one. In this case, the following edges are created: (7,13), and (11,15). Similarly, when vertex 12 is removed together with its connected edge, the new edges are appeared: (7,9) and (0, 11).…”
Section: Network Self-healing Mechanismmentioning
confidence: 99%
“…Recent years have witnessed a dramatic growth in utilizing computational intelligence techniques for various domains. Based on developments of evolving trends of cyber-threat, it is reasonable to predict that cybercriminals will begin to integrate malware with artificial intelligence in general, swarm intelligence technology in particular, to create more effective attacks, as stated in the literature [10,11,12,13]. Generally, artificial swarm malware can share the collected information, speed up the process of trial and error, and leverage the specialized members of the swarms in the specific environment [8,17,14].…”
Section: Introductionmentioning
confidence: 99%