A Review of use of Artificial Intelligence on Cyber Security and the Fifth-Generation Cyber-attacks and its analysis

Not only have there been a lot more cyberattacks in recent years, but they have also gotten much more advanced. Therefore, developing a cyber-resilient strategy is of utmost significance. In the event of a cyberattack, traditional security measures are insufficient to prevent data leaks. Cybercriminals have mastered the use of cutting-edge methods and powerful tools for data intrusion, hacking, and assault. Fortunately, applications of artificial intelligence (AI) technology the creation of intelligent models for securing systems against attackers. AI technologies can quickly advance to meet complicated problems, making them useful as fundamental cybersecurity tools. In order to identify malware attacks, AI-based systems are capable of providing efficient and robust cyber security against phishing and spam emails, network intrusions, and data breaches capabilities and alert the security during the impact. In this essay, we examine AI's place in cybersecurity and analyze the pertinent literature in terms of its advantages.

[1]  Kanhaiyalal Sharma,et al.  Real time social distance detection using Deep Learning , 2022, 2022 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES).

[2]  Rammanohar Das,et al.  Artificial Intelligence in Cyber Security , 2021, Journal of Physics: Conference Series.

[3]  Ivan Zelinka,et al.  Artificial Intelligence in the Cyber Domain: Offense and Defense , 2020, Symmetry.

[4]  Thomas G. Dietterich What is machine learning? , 2015, Archives of Disease in Childhood.

[5]  Fang Feng,et al.  The application of a novel neural network in the detection of phishing websites , 2018, J. Ambient Intell. Humaniz. Comput..

[6]  Taufik Abrão,et al.  Network Anomaly Detection System using Genetic Algorithm and Fuzzy Logic , 2018, Expert Syst. Appl..

[7]  Marc Peter Deisenroth,et al.  Deep Reinforcement Learning: A Brief Survey , 2017, IEEE Signal Processing Magazine.

[8]  Xiaojiang Du,et al.  Achieving Efficient and Secure Data Acquisition for Cloud-Supported Internet of Things in Smart Grid , 2017, IEEE Internet of Things Journal.

[9]  Adam Doupé,et al.  Deep Android Malware Detection , 2017, CODASPY.

[10]  Yu-Lin He,et al.  Fuzziness based semi-supervised learning approach for intrusion detection system , 2017, Inf. Sci..

[11]  Arthur L. Samuel,et al.  Some Studies in Machine Learning Using the Game of Checkers , 1967, IBM J. Res. Dev..

[12]  M. Rege,et al.  Machine Learning for Cyber Defense and Attack , 2018 .

[13]  Wathiq Laftah Al-Yaseen,et al.  Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system , 2017, Expert Syst. Appl..

[14]  John McCarthy,et al.  Artificial Intelligence, Logic and Formalizing Common Sense , 1989 .