Artificial Intelligence as a Support Tool to Cybersecurity Activities
Keywords:cybersecurity, artificial intelligence, Vulnerabilities, Covid19, Fuzzy Logic
The present study is based on the analysis of the concepts of Cybersecurity and Artificial Intelligence, focusing on how both relate to each other. The COVID-19 pandemic and the fact that the world was forced into confinement had a huge impact on the increase of cyber-attacks and the birth of new threats. Currently, Cybersecurity is becoming an extremely complicated task, as we can no longer think of blocking an attack only by resorting to humans. The advanced and automated ways in which attacks have been developing mean that the task of defence must also be automated. Artificial Intelligence, due to its particularities, meets this need. This technology has been playing an increasingly important role in Cybersecurity, even though we may still consider it to be at an early stage
Russell, S. J., & Norvig, P. (2010). Artificial Intelligence: A Modern Approach 3rd Edition. Upper Saddle River, New Jersey 07458: Pearson Education, Inc
Gourisetti, S., Mylrea, M., & Patangia, H. (2020, 41). Cybersecurity vulnerability mitigation framework through empirical paradigm: Enhanced prioritized gap analysis. Future Generation Computer Systems, 105, 410-431
Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. Computers and Security, 38, 97-102
L. Ferreira, H. Lopes, C. Abreu, M. Cruz-Cunha, and N. Mateus-Coelho, “Secure Services Integration and Edge Computing for Effective Beekeeping”, ARIS2-Journal, vol. 1, no. 1, pp. 62–79, Dec. 2021
A. Almeida, N. Coelho, and N. Lopes, “Paranoid OS: Wearable Trackers”, ARIS2-Journal, vol. 1, no. 1, pp. 24–40, Dec. 2021
V. Kanimozhi and T. P. Jacob, "Artificial Intelligence based Network Intrusion Detection with Hyper-Parameter Optimization Tuning on the Realistic Cyber Dataset CSE-CIC-IDS2018 using Cloud Computing," 2019 International Conference on Communication and Signal Processing (ICCSP), 2019, pp. 0033-0036, doi: 10.1109/ICCSP.2019.8698029
Miller, L. C., & CISSP. (2016). Cybersecurity For Dummies, Palo Alto Networks 2nd Edition. Hoboken, New Jersey: John Wiley & Sons, Inc
Shiode, N. (2000). Urban Planning, Information Technology, and Cyberspace. Journal of Urban Technology, 7(2), 105-126.
R. Arnone, “Hackers Cybercrime -Computer Security: Ethical Hacking: Learn the attack for better defence”,ARIS2-Journal, vol. 1, no. 1, pp. 50–61, Dec. 2021
Zúquete, A. (2018). Segurança em Redes Informáticas, 5º Edição [Security in Computer Networks, 5thEdition (in Portuguese)]. Lisbon: FCA
How to Cite
Copyright (c) 2022 José Aurnauth, Paulo Matos
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.