0% found this document useful (0 votes)
27 views3 pages

Role of Artificial Intelligence in Cyber Security: Arab Mohammed Shamiulla

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 3

International Journal of Innovative Technology and Exploring Engineering (IJITEE)

ISSN: 2278-3075 (Online), Volume-9 Issue-1, November 2019

Role of Artificial Intelligence in Cyber Security


Arab Mohammed Shamiulla

Abstract: Artificial Intelligence (AI) is a buzz word in the It can be in the form of malicious software, phishing,
cyber world. It is still a developing science in multiple facets password attacks, drive by downloads by using hyperlinks,
according to the challenges thrown by 21st century. Use of AI has virus attacks etc. As per the latest survey by the SSL Store,
become inseparable from human life. In this day and age one
cannot imagine a world without AI as it has much significant
cyber crimes will generate 1.5 trillion profits in the year
impact on human life. The main objective of AI is to develop the 2018. There is a high chance that the actual figures may be
technology based activities which represents the human more.
knowledge in order to solve problems. Simply AI is study of how
an individual think, work, learn and decide in any scenario of Table-1.1: Various revenue sources of cybercrimes
life, whether it may be related to problem solving or learning new Crime Annual Revenues in $
things or thinking rationally or to arrive at a solution etc. AI is in Illegal Online Markets $860000000000
every area of human life, naming a few it is into gaming,
language processing, speech recognition, expert system, vision Trade Secret, Intellectual $500000000000
system, hand writing recognition, intelligence robots, financial Property Theft
transactions and what not, every activity of human life has Data Trading $160000000000
become a subset of AI. In spite of numerous uses, AI can also Crime Ware / CaaS $16000000000
used for destroying the human life, that is the reason human
inference is required to monitor the AI activities. Cyber crimes
Ransomeware $10000000000
has become quite common and become a daily news item. It is Total Cyber Crime $1500000000000
not just a problem faced in one country, it is across the world. Revenues
Without strong security measures, AI is meaningless as it can be *Source: Re-Hashed: 2018 Cybercrime Statistics
easily accessible by others. It has become a big threat for
governments, banks, multinational companies through online
attacks by hackers. Lot of individual and organizational data is Cyber security holds a very significant part in the field of
exploited by hackers and it becomes a big threat to the cyber information technology. When someone comes across with
world. In this connection research in the area of AI and cyber a fraud, then cyber security comes into our mind. Protecting
security has gained more importance in the recent times and it is our own information on net has become a biggest challenge.
ever lasting also as it is a dynamic and sensitive issue linked to The immediate word we get in our mind after hearing cyber
human life.
security is cyber crimes. Governments are taking numerous
Key Words: Artificial Intelligence, Cyber Security, Online security measures to prevent cyber crimes, in spite of that;
attacks, Hackers, Human life cyber crime rate is increasing rapidly. In this paper an
attempt is made to know the various challenges faced by
I. INTRODUCTION cyber security and also the latest technologies which prevent
cyber attacks.
Cyber security is not just a problem of IT field. In fact its
scope is very vast. Today everyone is familiar with internet.
Table-1.2: Revenue from Ransomeware statistics
Even illiterate people are using smart phones and it has
Ransomeware Year Revenues in $
become indispensable from their day to day life. It is not an
exaggerated statement that if someone says people are living CryptoLocker 2013 $300000
on the internet today. Over a period of time internet has CryptoWall 2014 $1800000 - $32000000
become the indispensable part of human life. Without proper Locky 2015 $780000 - $1500000
knowledge and awareness, everyone is using AI in their
Cerber 2016 $690000
daily walks of life. This is the golden opportunity for
hackers to deceive the people easily. At times, hackers are WannaCry 2016 $55000 - $140000
also cheating the people who are having sound knowledge Petya/NotPetya 2016 $10000
on AI. There for cyber security is a mutual problem across *Source: Re-Hashed: 2018 Cybercrime Statistics
the globe. Hackers are becoming smarter day by day and
they are more innovative in creating malicious software to The fact is over 50% of cyber crime revenues are from
exploit the vulnerable data of individuals, organizations and online markets. It is astonishing truth Ransomeware made
governments. Cyber attacks are increasing rapidly despite of $10000000000 with in a period of just three years i.e. from
enough security measures. 2013-2016.
To avoid from all these cyber crimes/attacks, an
Revised Manuscript Received on November 30, 2019. organization must have sound cyber security measures.
* Correspondence Author
Dr. Arab Mohammed Shamiulla*, Associate Professor, School of
Hence, cyber security is the need of the hour. The emerging
Law, Presidency University, Bangalore, India. technologies like cloud computing, mobile computing,
internet banking, electronic and mobile commerce also need
© The Authors. Published by Blue Eyes Intelligence Engineering and cyber security.
Sciences Publication (BEIESP). This is an open access article under the
CC-BY-NC-ND license http://creativecommons.org/licenses/by-nc-nd/4.0/

Retrieval Number: A615119119/2019©BEIESP


Published By:
DOI: 10.35940/ijitee.A6115.119119
4628 Blue Eyes Intelligence Engineering
Journal Website: www.ijitee.org
& Sciences Publication
Role of Artificial Intelligence in Cyber Security

It includes a set of techniques used to safeguard the integrity V. METHODOLOGY


of networks, stored data, programs etc from damage,
Methodology specifies the boundaries of research within
unauthorized usage and from attack by hackers.
which it is conducted, sources and methods of collecting
The proper application of cyber security protect from data
data and analysis of data. Research methodology should
and information breach, theft of identity and many more
give answer to the following questions. They are (i) the
cyber attacks by hackers. Therefore cyber security helps in
various sources available to collect data, (ii) what are the
protecting unauthorized access, modification and deletion of
tools or methods used to collect the data, (iii) what
data.
techniques should be used for analysis of collected data
and (iv) what would be the ideal sample size?
II. REVIEW OF LITERATURE
To understand the role of artificial intelligence in cyber
Ganesan. R. (2010): In his study he cautioned about spam security and different technologies used to identify and
mails sent by hackers. He introduces a new word scareware prevent cyber attacks/crimes, data or reports related cyber
which is fake mail detecting software. security incidents are collected through secondary data. The
following statistical tools are used to analyze the collected
It cautions about all sort of communications over internet
data.
and warns not to open mails from open sources.
1. Measures of central tendency (simple and weighed
Govardhan. S. (2010): In his paper, he emphasized more
average)
on dynamic challenges faced by cyber security. In this day
2. Percentile analysis
and age, hacker’s intentions are malicious and to achieve it
they are thinking out of box which a great threat for cyber
VI. DATA ANALYSIS
security. He explained this by taking a classic example of
operation aurora. The data regarding various forms of cyber crimes is
Selvakani, Maheshwari and Karavanasundari (2010): collected through secondary source. Simple average and
This study reveals the importance of cyber laws to protect percentile analysis are used to amylase the collected data.
the interest of cyber victims. AI should help in designing a
strong law which can use effectively to trace cyber crimes. Table-6.1: Cyber Crime Incidents Records
Shukla R and Upadyaya A. (2011): This paper focuses Cyber attacks July- Jan- Increase
more on financial data vulnerability. Now a day’s people are / crimes Dec- June- /Decrease
more dependent on electronic banking activities. 90% of Incidents 2018 2019
total commercial transactions are done online. Majority of Cyber Harassment 565 784 +219
cyber crimes are in banking industry only. Therefore this Online Fraud 5786 5964 +178
field requires high security and best practices. Spam 654 697 +43
Karheek D. N., Kumar M. A., Kumar M. R. P. (2012): Content related 756 798 +42
This paper throws an attention in cryptographic measures. Vulnerability Reports 73 55 -18
The basic problem in cryptography is security. By Intrusion Attempts 5151 4671 -480
introducing new measures like quantum channel, cyber Denial of Services 345 296 -49
attacks can be reduced. *Source: Reports from National Crime Record Bureau-2019
Balamuralikrishna I. T., Raghavendrasai, Sukumar S.
(2012): It focuses on online frauds by various sites. In order
to reduce the frauds the two techniques i.e. image matching
and web page matching mechanism are helpful.

III. PROBLEM STATEMENT


Internet usage has become an integral part of human life.
Without using it, even a tiny work is not completing. On the
other hand cyber crimes or attacks are also increasing in the
same tempo and velocity. In this era of protecting
information on net has become a Herculean task. Hence, one
must know the strong security measures to protect their
information safely. In this paper a detailed analysis is made
on the necessity of cyber security measures and it
significance in IT world.

IV. OBJECTIVES THE STUDY


The following objective are undertaken in this study
1. To know the various AI tools and its significance in
cyber security.
2. To measure the impact of AI tools in identifying
the different cyber attacks.

Retrieval Number: A615119119/2019©BEIESP


Published By:
DOI: 10.35940/ijitee.A6115.119119
4629 Blue Eyes Intelligence Engineering
Journal Website: www.ijitee.org
& Sciences Publication
International Journal of Innovative Technology and Exploring Engineering (IJITEE)
ISSN: 2278-3075 (Online), Volume-9 Issue-1, November 2019

Interpretation: From the above table it is clear that cyber REFERENCES


harassment (+219), online fraud (+178) and spam (+43) and 1. R. Hill, "Dealing with cyber security threats: International
contend related attacks (+42) are increasing whereas cooperation, ITU, and WCIT", 2015 7th International Conference on
intrusion attempts (-18), denial of services (-49), Cyber Conflict: Architectures in Cyberspace, pp. 119-134, 2015
vulnerability reports attacks (-480) are decreasing. 2. S. Singh and S. Silakari, "A Survey of Cyber Attack Detection
Every organization pays high attention towards securing Systems", IJCSNS International Journal of Computer Science and
their data. For that they purchase different types of security Network Security, vol. 9, no. 5, 2009
3. J. Nogueira, "Mobile Intelligent Agents to Fight Cyber Intrusions",
software. It also leads to major business in cyber security
The International Journal of FORENSIC COMPUTER SCIENCE,
area. vol. 1, pp. 28-32, 2006
4. S. Adebukola, Onashoga, Akinwale O. Bamidele and A. Taofik, "A
Table-6.2: Cyber crime as a service platform statistics Simulated Multiagent-Based Architecture for Intrusion Detection
System", (IJARAI) International Journal of Advanced Research in
Cyber crime Product/Service Price in $ Artificial Intelligence, vol. 2, no. 4, 2013
SMS Spoofing $20 5. S. Dilek, H. Çakır and M. Aydın,"APPLICATIONS OF ARTIFICIAL
INTELLIGENCE TECHNIQUES TO COMBATING CYBER
Custom Spyware $200 CRIMES: A REVIEW", International Journal of Artificial
Hacker for Hire $200 Intelligence & Applications (IJAIA), vol. 6, no. 1, 2015
6. J.Raiyn, "A survey of Cyber Attack Detection Strategies",
Malware Exploit kit $200 -$700 International Journal of Security and Its Applications, vol. 8, no. 1,
Black hole Exploit kit $700 -$1500 pp. 247-256, 2014
7. Cerli and D. Ramamoorthy, "Intrusion Detection System by
Zero day Exploit kit $30000 Combining Fuzzy Logic with Genetic Algorithm", Global Journal of
Zero day IOS Exploit kit $250000 Pure and Applied Mathematics (GJPAM), vol. 11, no. 1, 2015
8. O. Oriola, A. Adeyemo and A. Robert, "Distributed Intrusion
*Source: Re-Hashed: 2018 Cybercrime Statistics Detection System Using P2P Agent Mining Scheme", African Journal
of Computing & ICT, vol. 5, no. 2, 2012
Interpretation: Providing security measures to prevent 9. S. Simmons, D. Edwards, N. Wilde, J. Just and M. Satyanarayana,
"Preventing Unauthorized Islanding: Cyber-Threat Analysis", 2006
cyber attacks has also emerged as a huge profit business. IEEE/SMC International Conference on System of Systems
People, organizations and governments are ready to pay Engineering, pp. 5, 24-26
more in order to secure their personal, financial and other 10. Ionita and L. Ionita, "An agent-based approach for building an
official data. intrusion detection system",RoEduNet International Conference 12th
Edition: Networking in Education and Research, pp. 1-6, 26-28, 2013

VII. CONCLUSION
AUTHORS PROFILE
Today, people are living in cyber world where total data or Dr. Arab Mohammed Shamiulla, Associate Professor
information is maintained in digital/online form. The School of Law, Presidency University, Bangalore,
information may be related to personal life, financial India Email ID: arabmohammedshamiulla@gmail.com
transactions, intellectual property or any other official Contact Number: 7702277901
information which is important in nature. Even lot of
information has been posted on social networking sites
without knowing the safety measures. This is the fruit for
cyber criminals as the information is in open access. Cyber
security is not only a problem related to a person. It is even
for an organization and for a government also. Not
necessary that each time one can protect data or
information on social networking sites but also the
information related to bank transactions must have enough
security measures. There are several techniques available
to protect information on net naming a few are password
security, authentication of data, malware scanners,
firewalls, antivirus software etc. By implementing proper
cyber ethics, majority of cyber attacks can be prevented. In
a nut shell, computer security is a very broad area which is
becoming significantly important as the world itself
turning into digital mode with networks being used to
carry out vital transactions. Cyber crimes or attacks are
also continuing to diverge down various paths time to
time. There is no perfect solution or universal remedy for
cyber crimes/attacks as they are unprecedented in nature,
but latest tools are used on par to minimize them in order
to have a safe and secure future in cyber world.

Retrieval Number: A615119119/2019©BEIESP


Published By:
DOI: 10.35940/ijitee.A6115.119119
4630 Blue Eyes Intelligence Engineering
Journal Website: www.ijitee.org
& Sciences Publication

You might also like