AI has many applications in network security. Network security is one of the most challenging situations. The paper carries out AI based network security analysis and prevention ways of the deep learning models in the network security. We focus on some specific AI applications including voice supervision of public network, malicious code monitoring, smartphone intrusion monitoring, HTTP security monitoring, mobile phone malicious APK code monitoring are bringing the solutions for network security. We studied there are powerful methods such as mobile phone malicious APR code monitoring employed Artificial Neural Network (ANN) model which detects and mitigates predictable and unpredictable DDoS attacks (TCP, UDP, and ICMP protocols). HTTP is running over TCP, then the web server can face many TCP-related attacks, therefore, we have an experiment of HTTP security monitoring, mobile phone malicious APK code monitoring. This paper presents a potential security threats from malicious uses of AI, and proposes ways to better prevent, and mitigate these threats. When planning HTTP service protection, we present it is important to keep in mind that the attack surface is much broader than just the HTTP protocol. We suggest promising areas for further research that could expand the AI based solutions for development of cloud computing-related technologies, and the combination of cloud computing and deep learning technology in the security area.
Published in |
American Journal of Computer Science and Technology (Volume 5, Issue 2)
This article belongs to the Special Issue Advances in Computer Science and Future Technology |
DOI | 10.11648/j.ajcst.20220502.22 |
Page(s) | 108-114 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2022. Published by Science Publishing Group |
Network Security, AI Network Security, Deep Learning
[1] | Chaitanya Gupta, Ishita Johri, Kathiravan Srinivasan, Yuh-Chung Hu, et al. (2022). A Systematic Review on Machine Learning and Deep Learning Models for Electronic Information Security in Mobile Networks Sensors, Special Issue Emerging Sensor Communication Network based AI/ML Driven Intelligent IoT), 2022, 22 (5), 2017. https://doi.org/10.3390/s22052017. |
[2] | Ashenden, D. Information Security management: A human challenge? Inf. Secur. Tech. Rep. 2008, 13, 195–201. |
[3] | Suo, H.; Liu, Z.; Wan, J.; Zhou, K. Security and privacy in mobile cloud computing. In Proceedings of the 9th International Wireless Communications and Mobile Computing Conference (IWCMC), Sardinia, Italy, 1–5 July 2013; pp. 655–659. |
[4] | Ahmad, Z.; Khan, A. S.; Shiang, C. W.; Abdullah, J.; Ahmad, F. Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Trans. Emerg. Telecommun. Technol. 2020, 32, e4150. |
[5] | Apruzzese, G.; Colajanni, M.; Ferretti, L.; Guido, A.; Marchetti, M. On the Effectiveness of Machine and Deep Learning for Cyber Security. In Proceedings of the 2018 10th International Conference on Cyber Conflict (CyCon), Tallinn, Estonia, 29 May–1 June 2018. |
[6] | Berman, D. S.; Buczak, A. L.; Chavis, J. S.; Corbett, C. L. A Survey of Deep Learning Methods for Cyber Security. Information 2019, 10, 122. |
[7] | Kong, L.-J. An improved information-security risk assessment algorithm for a hybrid model. Int. J. Adv. Comput. Technol. 2013, 5, 2. |
[8] | Luong, N. C.; Hoang, D. T.; Gong, S.; Niyato, D.; Wang, P.; Liang, Y.-C.; Kim, D. I. Applications of Deep Reinforcement Learning in Communications and Networking: A Survey. IEEE Commun. Surv. Tutor. 2019, 21, 3133–3174. |
[9] | Kim, D.; Ko, M.; Kim, S.; Moon, S.; Cheon, K.-Y.; Park, S.; Kim, Y.; Yoon, H.; Choi, Y.-H. Design and Implementation of Traffic Generation Model and Spectrum Requirement Calculator for Private 5G Network. IEEE Access 2022, 10, 15978–15993. |
[10] | Xiao, A.; Liu, J.; Li, Y.; Song, Q.; Ge, N. Two-phase rate adaptation strategy for improving real-time video QoE in mobile networks. China Commun. 2018, 15, 12–24. |
[11] | Use of Artificial Intelligence Techniques / Applications in Cyber Defense. (n.d.). Retrieved 14 August, 2020, from https://www.researchgate.net/publication/333477899_Use_of_Artificial_Intelligence_Techniques_Applications_in_Cyber_Defense. |
[12] | Parati, N., & Anand, P. (2017). Machine Learning in Cyber Defence. International Journal of Computer Sciences and Engineering, 5 (12), 317–322. |
[13] | Aminanto, M. E.; Kwangjo, K. Deep Learning-based Feature Selection for Intrusion Detection System in Transport Layer 1). In Proceedings of the Korea Institutes of Information Security and Cryptology Conference, Seoul, Korea, 30 November–2 December, 2016. |
[14] | Maimo, L. F.; Gomez, A. L. P.; Clemente, F. J. G.; Gil Pérez, M.; Perez, G. M. A Self-Adaptive Deep Learning-Based System for Anomaly Detection in 5G Networks. IEEE Access 2018, 6, 7700–7712. |
[15] | Arya, G.; Bagwari, A.; Chauhan, D. S. Performance Analysis of Deep Learning-Based Routing Protocol for an Efficient Data Transmission in 5G WSN Communication. IEEE Access 2022, 10, 9340–9356. |
[16] | “Establishing Justified Confidence in AI Systems,” Chapter 8, Report of the National Security Commission on AI, March 2021. https://reports.nscai.gov/final-report/chapter-7/ |
[17] | E. Horvitz J. Young, R. G. Elluru, C. Howell, Key Considerations for the Responsible Development and Fielding of Artificial Intelligence, National Security Commission on AI, April 2021. |
[18] | Kumar, Ram Shankar Siva, et al. Adversarial machine learning-industry perspectives. 2020 IEEE Security and Privacy Workshops (SPW). IEEE, 2020. |
[19] | A. Madry, A. Makelov, L. Schmidt, et al. Towards deep learning models resistant to adversarial attacks, ICLR 2018. https://arxiv.org/pdf/1706.06083.pdf |
[20] | Saied, A.; Overill, R. E.; Radzik, T. Detection of known and unknown DDoS attacks using Artificial Neural Networks. Neurocomputing 2016, 172, 385–393. |
APA Style
Li Peng, Tuyatsetseg Badarch. (2022). Exploring Artificial Intelligence for Network Security: A Case Study of Malware Defence. American Journal of Computer Science and Technology, 5(2), 108-114. https://doi.org/10.11648/j.ajcst.20220502.22
ACS Style
Li Peng; Tuyatsetseg Badarch. Exploring Artificial Intelligence for Network Security: A Case Study of Malware Defence. Am. J. Comput. Sci. Technol. 2022, 5(2), 108-114. doi: 10.11648/j.ajcst.20220502.22
AMA Style
Li Peng, Tuyatsetseg Badarch. Exploring Artificial Intelligence for Network Security: A Case Study of Malware Defence. Am J Comput Sci Technol. 2022;5(2):108-114. doi: 10.11648/j.ajcst.20220502.22
@article{10.11648/j.ajcst.20220502.22, author = {Li Peng and Tuyatsetseg Badarch}, title = {Exploring Artificial Intelligence for Network Security: A Case Study of Malware Defence}, journal = {American Journal of Computer Science and Technology}, volume = {5}, number = {2}, pages = {108-114}, doi = {10.11648/j.ajcst.20220502.22}, url = {https://doi.org/10.11648/j.ajcst.20220502.22}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajcst.20220502.22}, abstract = {AI has many applications in network security. Network security is one of the most challenging situations. The paper carries out AI based network security analysis and prevention ways of the deep learning models in the network security. We focus on some specific AI applications including voice supervision of public network, malicious code monitoring, smartphone intrusion monitoring, HTTP security monitoring, mobile phone malicious APK code monitoring are bringing the solutions for network security. We studied there are powerful methods such as mobile phone malicious APR code monitoring employed Artificial Neural Network (ANN) model which detects and mitigates predictable and unpredictable DDoS attacks (TCP, UDP, and ICMP protocols). HTTP is running over TCP, then the web server can face many TCP-related attacks, therefore, we have an experiment of HTTP security monitoring, mobile phone malicious APK code monitoring. This paper presents a potential security threats from malicious uses of AI, and proposes ways to better prevent, and mitigate these threats. When planning HTTP service protection, we present it is important to keep in mind that the attack surface is much broader than just the HTTP protocol. We suggest promising areas for further research that could expand the AI based solutions for development of cloud computing-related technologies, and the combination of cloud computing and deep learning technology in the security area.}, year = {2022} }
TY - JOUR T1 - Exploring Artificial Intelligence for Network Security: A Case Study of Malware Defence AU - Li Peng AU - Tuyatsetseg Badarch Y1 - 2022/05/24 PY - 2022 N1 - https://doi.org/10.11648/j.ajcst.20220502.22 DO - 10.11648/j.ajcst.20220502.22 T2 - American Journal of Computer Science and Technology JF - American Journal of Computer Science and Technology JO - American Journal of Computer Science and Technology SP - 108 EP - 114 PB - Science Publishing Group SN - 2640-012X UR - https://doi.org/10.11648/j.ajcst.20220502.22 AB - AI has many applications in network security. Network security is one of the most challenging situations. The paper carries out AI based network security analysis and prevention ways of the deep learning models in the network security. We focus on some specific AI applications including voice supervision of public network, malicious code monitoring, smartphone intrusion monitoring, HTTP security monitoring, mobile phone malicious APK code monitoring are bringing the solutions for network security. We studied there are powerful methods such as mobile phone malicious APR code monitoring employed Artificial Neural Network (ANN) model which detects and mitigates predictable and unpredictable DDoS attacks (TCP, UDP, and ICMP protocols). HTTP is running over TCP, then the web server can face many TCP-related attacks, therefore, we have an experiment of HTTP security monitoring, mobile phone malicious APK code monitoring. This paper presents a potential security threats from malicious uses of AI, and proposes ways to better prevent, and mitigate these threats. When planning HTTP service protection, we present it is important to keep in mind that the attack surface is much broader than just the HTTP protocol. We suggest promising areas for further research that could expand the AI based solutions for development of cloud computing-related technologies, and the combination of cloud computing and deep learning technology in the security area. VL - 5 IS - 2 ER -