• Title/Summary/Keyword: Artificial Intelligent Security

Search Result 86, Processing Time 0.026 seconds

Theoretical And Technological Aspects Of Intelligent Systems: Problems Of Artificial Intelligence

  • Frolov, Denys;Radziewicz, Wojciech;Saienko, Volodymyr;Kuchuk, Nina;Mozhaiev, Mykhailo;Gnusov, Yurii;Onishchenko, Yurii
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.35-38
    • /
    • 2021
  • The article discusses approaches to the definition and understanding of artificial intelligence, research directions in the field of artificial intelligence; artificial intelligence in the anthropological dimension; the importance of the systems approach as a methodological basis for the design of intelligent systems; structural and functional components of intelligent systems; intelligent systems in the technological aspect; problems and prospects of relations in the system "man - intellectual system".

Technological Trends in Intelligent Cyber Range (지능형 사이버 훈련장의 기술 동향)

  • Yu, J.H.;Koo, K.J.;Kim, I.K.;Moon, D.S.
    • Electronics and Telecommunications Trends
    • /
    • v.37 no.4
    • /
    • pp.36-45
    • /
    • 2022
  • As the interest in achieving an intelligent society grows with the fourth industrial revolution's development, information and communications technologies technologies like artificial intelligence (AI), Internet of Things, virtual reality, information security, and blockchain technology are being actively employed in different fields for achieving an intelligent society. With these modifications, the information security paradigm in industrial and public institutions, like personal sensitive data, is quickly changing, and it is exposed to different cyber threats and breaches. Furthermore, as the number of cyber threats and breaches grows, so does the need for rapid detection and response. This demand can be satisfied by establishing cyber training programs and fostering experts that can improve cyber security abilities. In this study, we explored the domestic and international technology trends in cyber security education and training facilities for developing experts in information security. Additionally, the AI technology application in the cyber training ground, which can be established to respond to and deter cyber threats that are becoming more intelligent, was examined.

AI-Based Intelligent CCTV Detection Performance Improvement (AI 기반 지능형 CCTV 이상행위 탐지 성능 개선 방안)

  • Dongju Ryu;Kim Seung Hee
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.117-123
    • /
    • 2023
  • Recently, as the demand for Generative Artificial Intelligence (AI) and artificial intelligence has increased, the seriousness of misuse and abuse has emerged. However, intelligent CCTV, which maximizes detection of abnormal behavior, is of great help to prevent crime in the military and police. AI performs learning as taught by humans and then proceeds with self-learning. Since AI makes judgments according to the learned results, it is necessary to clearly understand the characteristics of learning. However, it is often difficult to visually judge strange and abnormal behaviors that are ambiguous even for humans to judge. It is very difficult to learn this with the eyes of artificial intelligence, and the result of learning is very many False Positive, False Negative, and True Negative. In response, this paper presented standards and methods for clarifying the learning of AI's strange and abnormal behaviors, and presented learning measures to maximize the judgment ability of intelligent CCTV's False Positive, False Negative, and True Negative. Through this paper, it is expected that the artificial intelligence engine performance of intelligent CCTV currently in use can be maximized, and the ratio of False Positive and False Negative can be minimized..

The Intelligent Blockchain for the Protection of Smart Automobile Hacking

  • Kim, Seong-Kyu;Jang, Eun-Sill
    • Journal of Multimedia Information System
    • /
    • v.9 no.1
    • /
    • pp.33-42
    • /
    • 2022
  • In this paper, we have recently created self-driving cars and self-parking systems in human-friendly cars that can provide high safety and high convenience functions by recognizing the internal and external situations of automobiles in real time by incorporating next-generation electronics, information communication, and function control technologies. And with the development of connected cars, the ITS (Intelligent Transportation Systems) market is expected to grow rapidly. Intelligent Transportation System (ITS) is an intelligent transportation system that incorporates technologies such as electronics, information, communication, and control into the transportation system, and aims to implement a next-generation transportation system suitable for the information society. By combining the technologies of connected cars and Internet of Things with software features and operating systems, future cars will serve as a service platform to connect the surrounding infrastructure on their own. This study creates a research methodology based on the Enhanced Security Model in Self-Driving Cars model. As for the types of attacks, Availability Attack, Man in the Middle Attack, Imperial Password Use, and Use Inclusive Access Control attack defense methodology are used. Along with the commercialization of 5G, various service models using advanced technologies such as autonomous vehicles, traffic information sharing systems using IoT, and AI-based mobility services are also appearing, and the growth of smart transportation is accelerating. Therefore, research was conducted to defend against hacking based on vulnerabilities of smart cars based on artificial intelligence blockchain.

MalDC: Malicious Software Detection and Classification using Machine Learning

  • Moon, Jaewoong;Kim, Subin;Park, Jangyong;Lee, Jieun;Kim, Kyungshin;Song, Jaeseung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1466-1488
    • /
    • 2022
  • Recently, the importance and necessity of artificial intelligence (AI), especially machine learning, has been emphasized. In fact, studies are actively underway to solve complex and challenging problems through the use of AI systems, such as intelligent CCTVs, intelligent AI security systems, and AI surgical robots. Information security that involves analysis and response to security vulnerabilities of software is no exception to this and is recognized as one of the fields wherein significant results are expected when AI is applied. This is because the frequency of malware incidents is gradually increasing, and the available security technologies are limited with regard to the use of software security experts or source code analysis tools. We conducted a study on MalDC, a technique that converts malware into images using machine learning, MalDC showed good performance and was able to analyze and classify different types of malware. MalDC applies a preprocessing step to minimize the noise generated in the image conversion process and employs an image augmentation technique to reinforce the insufficient dataset, thus improving the accuracy of the malware classification. To verify the feasibility of our method, we tested the malware classification technique used by MalDC on a dataset provided by Microsoft and malware data collected by the Korea Internet & Security Agency (KISA). Consequently, an accuracy of 97% was achieved.

Introducing the Concept of Intelligent Financial Inclusion

  • Anam Yasir;Alia Ahmed
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.103-110
    • /
    • 2023
  • Financial inclusion is the safe and timely access of formal financial services to people at affordable costs. Various barriers of legacy financial system hinder the involvement of all segments of populations in the financial sector. The journey from financial exclusion to financial inclusion has to be achieved with the implementation of technological breakthroughs. Covid-19 has also raised the need for technology in all sectors of the economy. This research paper introduces the concept of intelligent financial inclusion which is the provision of financial services to people with the help of intelligent systems. This intelligent system will take the concepts from the human mind, cognitive sciences, and artificial intelligence tools and techniques. For achieving the optimal level of financial inclusion, economies must shift their financial sector from traditional means to intelligent financial systems. In this way, intelligent financial inclusion will achieve the target of involving all people in the financial sector.

Artificial Intelligence in Personalized ICT Learning

  • Volodymyrivna, Krasheninnik Iryna;Vitaliiivna, Chorna Alona;Leonidovych, Koniukhov Serhii;Ibrahimova, Liudmyla;Iryna, Serdiuk
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.159-166
    • /
    • 2022
  • Artificial Intelligence has stimulated every aspect of today's life. Human thinking quality is trying to be involved through digital tools in all research areas of the modern era. The education industry is also leveraging artificial intelligence magical power. Uses of digital technologies in pedagogical paradigms are being observed from the last century. The widespread involvement of artificial intelligence starts reshaping the educational landscape. Adaptive learning is an emerging pedagogical technique that uses computer-based algorithms, tools, and technologies for the learning process. These intelligent practices help at each learning curve stage, from content development to student's exam evaluation. The quality of information technology students and professionals training has also improved drastically with the involvement of artificial intelligence systems. In this paper, we will investigate adopted digital methods in the education sector so far. We will focus on intelligent techniques adopted for information technology students and professionals. Our literature review works on our proposed framework that entails four categories. These categories are communication between teacher and student, improved content design for computing course, evaluation of student's performance and intelligent agent. Our research will present the role of artificial intelligence in reshaping the educational process.

Technological Aspects of the Use of Modern Intelligent Information Systems in Educational Activities by Teachers

  • Tkachuk, Stanislav;Poluboiaryna, Iryna;Lapets, Olha;Lebid, Oksana;Fadyeyeva, Kateryna;Udalova, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.99-102
    • /
    • 2021
  • The article considers one of the areas of development of artificial intelligence where there is the development of computer intelligent systems capable of performing functions traditionally considered intelligent - language comprehension, inference, use of accumulated knowledge, learning, pattern recognition, as well as learn and explain their decisions. It is found that informational intellectual systems are promising in their development. The article is devoted to intelligent information systems and technologies in educational activities, ie issues of organization, design, development and application of systems designed for information processing, which are based on the use of artificial intelligence methods.

Study on Machine Learning Techniques for Malware Classification and Detection

  • Moon, Jaewoong;Kim, Subin;Song, Jaeseung;Kim, Kyungshin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4308-4325
    • /
    • 2021
  • The importance and necessity of artificial intelligence, particularly machine learning, has recently been emphasized. In fact, artificial intelligence, such as intelligent surveillance cameras and other security systems, is used to solve various problems or provide convenience, providing solutions to problems that humans traditionally had to manually deal with one at a time. Among them, information security is one of the domains where the use of artificial intelligence is especially needed because the frequency of occurrence and processing capacity of dangerous codes exceeds the capabilities of humans. Therefore, this study intends to examine the definition of artificial intelligence and machine learning, its execution method, process, learning algorithm, and cases of utilization in various domains, particularly the cases and contents of artificial intelligence technology used in the field of information security. Based on this, this study proposes a method to apply machine learning technology to the method of classifying and detecting malware that has rapidly increased in recent years. The proposed methodology converts software programs containing malicious codes into images and creates training data suitable for machine learning by preparing data and augmenting the dataset. The model trained using the images created in this manner is expected to be effective in classifying and detecting malware.

A situation-Flexible and Action-Oriented Cyber Response Mechanism against Intelligent Cyber Attack (지능형 사이버공격 대비 상황 탄력적 / 실행 중심의 사이버 대응 메커니즘)

  • Kim, Namuk;Eom, Jungho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.3
    • /
    • pp.37-47
    • /
    • 2020
  • The In the 4th industrial revolution, cyber space will evolve into hyper-connectivity, super-convergence, and super-intelligence due to the development of advanced information and communication technologies, which will connect the nation's core infrastructure into a single network. As applying the 4th industrial revolution technology to the cyber attack technique, it is evolving in an intelligent and sophisticate method. In order to response intelligent cyber attacks, it is difficult to guarantee self-defense in cyberspace by policy-oriented, preplanned-centric and hierarchical cyber response strategies. Therefore, this research aims to propose a situation-flexible & action-oriented cyber response mechanism that can respond flexibly by selecting the most optimal smart security solution according to changes in the cyber attack steps. The proposed cyber response mechanism operates the smart security solutions according to the action-oriented detailed strategies. In addition, artificial intelligence-based decision-making systems are used to select the smart security technology with the best responsiveness.