Knowledge-Based Programming for the Cybersecurity Solution

Received: August 7, 2018 Revised: October 22, 2018 Accepted: November 25, 2018 Abstract: Introduction: The problem of cyberattacks reduces to the unwanted infiltration of software through latent vulnerable access points. There are several approaches to protection here. First, unknown or improper system states can be detected through their characterization (using neural nets and/or symbolic codes), then interrupting the execution to run benchmarks and observe if they produce the states they should. If not, the execution can be rewound to the last successful benchmark, all states restored, and rerun.

[1]  Leslie Pack Kaelbling,et al.  Efficient Bayesian Task-Level Transfer Learning , 2007, IJCAI.

[2]  Abdelouahed Gherbi,et al.  Software Diversity for Future Systems Security , 2011 .

[3]  Rich Caruana,et al.  Multitask Learning , 1997, Machine Learning.

[4]  Yifan Gong,et al.  Cross-language knowledge transfer using multilingual deep neural network with shared hidden layers , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[5]  Jie Lu,et al.  Long term bank failure prediction using Fuzzy Refinement-based Transductive Transfer learning , 2011, 2011 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE 2011).

[6]  Rich Caruana,et al.  Multitask Learning: A Knowledge-Based Source of Inductive Bias , 1993, ICML.

[7]  David H. Ackley,et al.  Building diverse computer systems , 1997, Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133).

[8]  Stuart Harvey Rubin,et al.  Randomization for testing systems of systems , 2009, 2009 IEEE International Conference on Information Reuse & Integration.

[9]  Edward A. Feigenbaum,et al.  The fifth generation - artificial intelligence and Japan's computer challenge to the world , 1991 .

[10]  Saul Amarel,et al.  On representations of problems of reasoning about actions , 1968 .

[11]  Peng Hao,et al.  Transfer learning using computational intelligence: A survey , 2015, Knowl. Based Syst..

[12]  Jie Lu,et al.  Text categorization by fuzzy domain adaptation , 2013, 2013 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).

[13]  Sumit Chopra,et al.  DLID: Deep Learning for Domain Adaptation by Interpolating between Domains , 2013 .

[14]  Thouraya Bouabana-Tebibel,et al.  Integration of Reusable Systems [extended versions of the best papers which were presented at IEEE International Conference on Information Reuse and Integration and IEEE International Workshop on Formal Methods Integration, San Francisco, CA, USA, August 2013] , 2014, IRI.

[15]  S. A. Rubin Computing with words , 1999, IEEE Trans. Syst. Man Cybern. Part B.

[16]  Ray J. Solomonoff,et al.  A Formal Theory of Inductive Inference. Part II , 1964, Inf. Control..

[17]  King-Sun Fu,et al.  Syntactic Pattern Recognition And Applications , 1968 .

[18]  A. J. Kfoury,et al.  A Programming Approach to Computability , 1982, Texts and Monographs in Computer Science.

[19]  Qiang Yang,et al.  Transferring Naive Bayes Classifiers for Text Classification , 2007, AAAI.

[20]  Radha Poovendran,et al.  Deceiving Google's Perspective API Built for Detecting Toxic Comments , 2017, ArXiv.

[21]  Simon Coupland,et al.  Towards Fuzzy Transfer Learning for Intelligent Environments , 2012, AmI.

[22]  Philip S. Yu,et al.  Text classification without negative examples revisit , 2006, IEEE Transactions on Knowledge and Data Engineering.

[23]  Steve Renals,et al.  Unsupervised cross-lingual knowledge transfer in DNN-based LVCSR , 2012, 2012 IEEE Spoken Language Technology Workshop (SLT).

[24]  Ray J. Solomonoff,et al.  A new method for discovering the grammars of phrase structure languages , 1959, IFIP Congress.

[25]  Jie Lu,et al.  Fuzzy bridged Refinement Domain Adaptation: Long-Term Bank Failure Prediction , 2013, Int. J. Comput. Intell. Appl..

[26]  Simon Coupland,et al.  Fuzzy Transfer Learning: Methodology and application , 2015, Inf. Sci..

[27]  Stuart Harvey Rubin Is the Kolmogorov complexity of computational intelligence bounded above? , 2011, 2011 IEEE International Conference on Information Reuse & Integration.

[28]  Daniel L. Silver,et al.  Context-Sensitive MTL Networks for Machine Lifelong Learning , 2007, FLAIRS Conference.

[29]  Jethro Shell,et al.  Fuzzy transfer learning , 2013 .

[30]  ZhangGuangquan,et al.  Transfer learning using computational intelligence , 2015 .

[31]  Rich Caruana,et al.  Inductive Transfer for Bayesian Network Structure Learning , 2007, ICML Unsupervised and Transfer Learning.

[32]  Mark Stefik,et al.  The Fifth Generation: Artificial Intelligence and Japan's Computer Challenge to the World , 1983 .

[33]  Alan W. Biermann,et al.  Automatic Programming: A Tutorial on Formal Methodologies , 1985, J. Symb. Comput..

[34]  Stuart Harvey Rubin On randomization and discovery , 2007, Inf. Sci..

[35]  Luis Enrique Sucar,et al.  Inductive transfer for learning Bayesian networks , 2010, Machine Learning.

[36]  Qiang Yang,et al.  A Survey on Transfer Learning , 2010, IEEE Transactions on Knowledge and Data Engineering.

[37]  Reinaldo A. C. Bianchi,et al.  Using Cases as Heuristics in Reinforcement Learning: A Transfer Learning Application , 2011, IJCAI.

[38]  Guangchun Luo,et al.  Transfer learning for cross-company software defect prediction , 2012, Inf. Softw. Technol..

[39]  Ahmet Arslan,et al.  Genetic transfer learning , 2010, Expert Syst. Appl..

[40]  Luís A. Alexandre,et al.  Improving Deep Neural Network Performance by Reusing Features Trained with Transductive Transference , 2014, ICANN.

[41]  G. Chaitin Randomness and Mathematical Proof , 1975 .

[42]  Harvey M. Deitel Chapter 12 – Operating Systems , 1986 .

[43]  Nils J. Nilsson,et al.  Principles of Artificial Intelligence , 1980, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[44]  Roland J. Zito-Wolf,et al.  Learning search control knowledge: An explanation-based approach , 1991, Machine Learning.

[45]  Radha Poovendran,et al.  Deep Neural Networks Do Not Recognize Negative Images , 2017, ArXiv.

[46]  Jie Lu,et al.  Fuzzy Refinement Domain Adaptation for Long Term Prediction in Banking Ecosystem , 2014, IEEE Transactions on Industrial Informatics.

[47]  Michael A. Arbib,et al.  A Basis for Theoretical Computer Science , 1981, Texts and Monographs in Computer Science.

[48]  Lanfang Yang A Cased-Based Reasoning Decision Support System , 2009 .

[49]  Jürgen Schmidhuber,et al.  Transfer learning for Latin and Chinese characters with Deep Neural Networks , 2012, The 2012 International Joint Conference on Neural Networks (IJCNN).

[50]  Terran Lane,et al.  Bayesian Discovery of Multiple Bayesian Networks via Transfer Learning , 2013, 2013 IEEE 13th International Conference on Data Mining.

[51]  Harvey M. Deitel,et al.  An introduction to operating systems , 1984 .

[52]  Sanjay Silakari,et al.  A Survey of Cyber Attack Detection Systems , 2009 .