DOI QR코드

DOI QR Code

Maritime Cybersecurity Leveraging Artificial Intelligence Mechanisms Unveiling Recent Innovations and Projecting Future Trends

  • Parasuraman Kumar (Department of Information Technology and Engineering, Manonmaniam Sundaranar University (School of Computer Science and Engineering)) ;
  • Arumugam Maharajan (Department of Information Technology and Engineering, Manonmaniam Sundaranar University, (School of Computer Science and Engineering))
  • Received : 2024.06.14
  • Accepted : 2024.09.25
  • Published : 2024.10.31

Abstract

This research delves into the realm of Maritime Cybersecurity, focusing on the application of Artificial Intelligence (AI) mechanisms, namely K-Nearest Neighbors (KNN), Random Forest (RF), and Artificial Neural Networks (ANN). The maritime industry faces evolving cyber threats, necessitating innovative approaches for robust defense. The maritime sector is increasingly reliant on digital technologies, making it susceptible to cyber threats. Traditional security measures are insufficient against sophisticated attacks, necessitating the integration of AI mechanisms. This research aims to evaluate the effectiveness of KNN, RF, and ANN in fortifying maritime cybersecurity, providing a proactive defense against emerging threats. Investigate the application of KNN, RF, and ANN in the maritime cybersecurity landscape. Assess the performance of these AI mechanisms in detecting and mitigating cyber threats. Explore the adaptability of KNN, RF, and ANN to the dynamic maritime environment. Provide insights into the strengths and limitations of each algorithm for maritime cybersecurity. The study employs these AI algorithms to analyze historical maritime cybersecurity data, evaluating their accuracy, precision, and recall in threat detection. Results demonstrate the effectiveness of KNN in identifying localized anomalies, RF in handling complex threat landscapes, and ANN in learning intricate patterns within maritime cybersecurity data. Comparative analyses reveal the strengths and weaknesses of each algorithm, offering valuable insights for implementation. In conclusion, the integration of KNN, RF, and ANN mechanisms presents a promising avenue for enhancing maritime cybersecurity. The study underscores the importance of adopting AI solutions to the maritime domain's unique challenges. While each algorithm demonstrates efficacy in specific scenarios, a hybrid approach may offer a comprehensive defense strategy. As the maritime industry continues to evolve, leveraging AI mechanisms becomes imperative for staying ahead of cyber threats and safeguarding critical assets. This research contributes to the ongoing discourse on maritime cybersecurity, providing a foundation for future developments in the field.

Keywords

References

  1. M. Balduzzi, A. Pasta, and K. Wilhoit, "A security evaluation of AIS automated identification system," in Proc. of the 30th Annual Computer Security Applications Conference (ACSAC '14), pp.436-445, Association for Computing Machinery, New York, NY, USA, Dec. 2014.
  2. R. Neware and A. Khan, "Cloud Computing Digital Forensic challenges," in Proc. of 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA), pp.1090-1092, Mar. 2018.
  3. R. Dremliuga and M. H. B. M. Rusli, "The Development of the Legal Framework for Autonomous Shipping: Lessons Learned from a Regulation for a Driverless Car," Journal of Politics and Law, vol.13, no.3, Aug. 2020.
  4. A. L. Buczak and E. Guven, "A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection," IEEE Communications Surveys & Tutorials, vol.18, no.2, pp.1153-1176, Secondquarter 2016. https://doi.org/10.1109/COMST.2015.2494502
  5. G. Karatas, O. Demir, and O. K. Sahingoz, "Increasing the Performance of Machine LearningBased IDSs on an Imbalanced and Up-to-Date Dataset," IEEE Access, vol.8, pp.32150-32162, Feb. 2020. https://doi.org/10.1109/ACCESS.2020.2973219
  6. R. Kaur, D. Gabrijelcic, and T. Klobucar, "Artificial intelligence for cybersecurity: Literature review and future research directions," Information Fusion, vol.97, Sep. 2023.
  7. A. Corallo, M. Lazoi, M. Lezzi, and A. Luperto, "Cybersecurity awareness in the context of the Industrial Internet of Things: A systematic literature review," Computers in Industry, vol.137, May 2022.
  8. A. Amro and V. Gkioulos, "Cyber risk management for autonomous passenger ships using threatinformed defense-in-depth," International Journal of Information Security, vol.22, no.1, pp.249-288, Feb. 2022. https://doi.org/10.1007/s10207-022-00638-y
  9. J. M. Torres, C. I. Comesana, and P. J. Garcia-Nieto, "Review: machine learning techniques applied to cybersecurity," International Journal of Machine Learning and Cybernetics, vol.10, no.10, pp.2823-2836, Oct. 2019. https://doi.org/10.1007/s13042-018-00906-1
  10. S. Smadi, N. Aslam, and L. Zhang, "Detection of online phishing email using dynamic evolving neural network based on reinforcement learning," Decision Support Systems, vol.107, pp.88-102, Mar. 2018. https://doi.org/10.1016/j.dss.2018.01.001
  11. F. Feng, Q. Zhou, Z. Shen, X. Yang, L. Han, and J. Wang, "The application of a novel neural network in the detection of phishing websites," Journal of Ambient Intelligence and Humanized Computing, vol.15, no.3, pp.1865-1879, Mar. 2024. https://doi.org/10.1007/s12652-018-0786-3
  12. L. Yang et al., "Detecting Word-Based Algorithmically Generated Domains Using Semantic Analysis," Symmetry, vol.11, no.2, Feb. 2019.
  13. M. Taddeo, D. McNeish, A. Blanchard, and E. Edgar, "Ethical Principles for Artificial Intelligence in National Defence," Philosophy & Technology, vol.34, no.4, pp.1707-1729, Dec. 2021. https://doi.org/10.1007/s13347-021-00482-3
  14. H. S. Anderson, J. Woodbridge, and B. Filar, "DeepDGA: Adversarially-Tuned Domain Generation and Detection," in Proc. of the 2016 ACM Workshop on Artificial Intelligence and Security (AISec '16), pp.13-21, Association for Computing Machinery, New York, NY, USA, Oct. 2016.
  15. R. Prasad and V. Rohokale, Artificial Intelligence and Machine Learning in Cyber Security, Springer Series in Wireless Technology, pp.231-247, Springer, Cham, 2019.
  16. M. Krzyszton and M. Marks, "Simulation of watchdog placement for cooperative anomaly detection in Bluetooth Mesh Intrusion Detection System," Simulation Modelling Practice and Theory, vol.101, May 2020.
  17. P. Xiong, H. Liu, Y. Tian, Z. Chen, B. Wang, and H. Yang, "Helicopter maritime search area planning based on a minimum bounding rectangle and K-means clustering," Chinese Journal of Aeronautics, vol.34, no.2, pp.554-562, Feb. 2021.
  18. M. A. B. Farah et al., "Cyber Security in the Maritime Industry: A Systematic Survey of Recent Advances and Future Trends," Information, vol.13, no.1, Jan. 2022.
  19. P. O. Shoetan, O. O. Amoo, E. S. Okafor, and O. L. Olorunfemi, "Synthesizing AI's Impact on Cybersecurity in Telecommunications: A Conceptual Framework," Computer Science & IT Research Journal, vol.5, no.3, pp.594-605, Mar. 2024. https://doi.org/10.51594/csitrj.v5i3.908
  20. A. J. G. de Azambuja, C. Plesker, K. Schutzer, R. Anderl, B. Schleich, and V. R. Almeida, "Artificial Intelligence-Based Cyber Security in the Context of Industry 4.0-A Survey," Electronics, vol.12, no.8, Apr. 2023.
  21. J. Yoo and Y. Jo, "Formulating Cybersecurity Requirements for Autonomous Ships Using the SQUARE Methodology," Sensors, vol.23, no.11, May 2023.
  22. J. Guo, X. Li, Z. Liu, J. Ma, C. Yang, J. Zhang, D. Wu, "TROVE: A Context-Awareness Trust Model for VANETs Using Reinforcement Learning," IEEE Internet of Things Journal, vol.7, no.7, pp.6647-6662, Jul. 2020. https://doi.org/10.1109/JIOT.2020.2975084
  23. J. Guo, Z. Liu, S. Tian, F. Huang, J. Li, X. Li, K. K. Igorevich, J. Ma, "TFL-DT: A Trust Evaluation Scheme for Federated Learning in Digital Twin for Mobile Networks," IEEE Journal on Selected Areas in Communications, vol.41 no.11, pp.3548-3560, Nov. 2023. https://doi.org/10.1109/JSAC.2023.3310094
  24. J. Guo, H. Gao, Z. Liu, F. Huang, J. Zhang, X. Li, J. Ma, "ICRA: An Intelligent Clustering Routing Approach for UAV Ad Hoc Networks," IEEE Transactions on Intelligent Transportation Systems, vol.24, no.2, pp.2447-2460, Feb. 2023. https://doi.org/10.1109/TITS.2022.3145857