Artificial Intelligence as a Support Tool to Cybersecurity Activities

Authors

DOI:

https://doi.org/10.56394/aris2.v2i1.9

Keywords:

cybersecurity, artificial intelligence, Vulnerabilities, Covid19, Fuzzy Logic

Abstract

The present study is based on the analysis of the concepts of Cybersecurity and Artificial Intelligence, focusing on how both relate to each other. The COVID-19 pandemic and the fact that the world was forced into confinement had a huge impact on the increase of cyber-attacks and the birth of new threats. Currently, Cybersecurity is becoming an extremely complicated task, as we can no longer think of blocking an attack only by resorting to humans. The advanced and automated ways in which attacks have been developing mean that the task of defence must also be automated. Artificial Intelligence, due to its particularities, meets this need. This technology has been playing an increasingly important role in Cybersecurity, even though we may still consider it to be at an early stage

References

Russell, S. J., & Norvig, P. (2010). Artificial Intelligence: A Modern Approach 3rd Edition. Upper Saddle River, New Jersey 07458: Pearson Education, Inc

Gourisetti, S., Mylrea, M., & Patangia, H. (2020, 41). Cybersecurity vulnerability mitigation framework through empirical paradigm: Enhanced prioritized gap analysis. Future Generation Computer Systems, 105, 410-431

Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. Computers and Security, 38, 97-102

L. Ferreira, H. Lopes, C. Abreu, M. Cruz-Cunha, and N. Mateus-Coelho, “Secure Services Integration and Edge Computing for Effective Beekeeping”, ARIS2-Journal, vol. 1, no. 1, pp. 62–79, Dec. 2021

A. Almeida, N. Coelho, and N. Lopes, “Paranoid OS: Wearable Trackers”, ARIS2-Journal, vol. 1, no. 1, pp. 24–40, Dec. 2021

V. Kanimozhi and T. P. Jacob, "Artificial Intelligence based Network Intrusion Detection with Hyper-Parameter Optimization Tuning on the Realistic Cyber Dataset CSE-CIC-IDS2018 using Cloud Computing," 2019 International Conference on Communication and Signal Processing (ICCSP), 2019, pp. 0033-0036, doi: 10.1109/ICCSP.2019.8698029

Miller, L. C., & CISSP. (2016). Cybersecurity For Dummies, Palo Alto Networks 2nd Edition. Hoboken, New Jersey: John Wiley & Sons, Inc

Shiode, N. (2000). Urban Planning, Information Technology, and Cyberspace. Journal of Urban Technology, 7(2), 105-126.

R. Arnone, “Hackers Cybercrime -Computer Security: Ethical Hacking: Learn the attack for better defence”,ARIS2-Journal, vol. 1, no. 1, pp. 50–61, Dec. 2021

Zúquete, A. (2018). Segurança em Redes Informáticas, 5º Edição [Security in Computer Networks, 5thEdition (in Portuguese)]. Lisbon: FCA

Downloads

Published

2022-06-14

How to Cite

[1]
J. Arnaud and P. Matos, “Artificial Intelligence as a Support Tool to Cybersecurity Activities”, ARIS2-Journal, vol. 2, no. 1, pp. 2–12, Jun. 2022.