Open Access Open Access  Restricted Access Subscription Access

Performance of Machine Learning and other Artificial Intelligence Paradigms In Cybersecurity


Affiliations
1 Atlantic International University, 900 Fort Street Mall 40, Honolulu, Hawaii 96813, United States
 

Cybersecurity systems are required at the application, network, host, and data levels. The research is purposed to evaluate Artificial Intelligence paradigms for use in network detection and prevention systems. This is purposed to develop a Cybersecurity system that uses artificial intelligence paradigms and can handle a high degree of complexity. The Pragmatism paradigm is elaborately associated with the Mixed Method Research (MMR), and is the research philosophy used in this research. Pragmatism recognizes the full rationale of the congruence between knowledge and action. The Pragmatic paradigm advocates a relational epistemology, a non-singular reality ontology, a mixed methods methodology, and a value-laden axiology. A qualitative approach where Focus Group discussions were held was used. The Artificial Intelligence paradigms evaluated include machine learning methods, autonomous robotic vehicle, artificial neural networks, and fuzzy logic. A discussion was held on the performance of Support Vector Machines, Artificial Neural Network, K-Nearest Neighbour, Naive-Bayes and Decision Tree Algorithms.

Keywords

Artificial Intelligence, Artificial Neural Networks, Bayesian Network, Cybersecurity, Deep Learning, Machine Learning.
User
Notifications
Font Size

  • Acs, (2016).Cybersecurity: Opportunities, Threats and Challenges.
  • Africa Cybersecurity Report, (2016).
  • ht t ps:/ /www.ser ianu.com/downloads/ AfricaCyberSecurityReport2016.pdf
  • Ajayi, A., Idowu, S.A., and Anyahie, A.A., (2013). Comparative Study of Selected Data Mining Algorithms Used For Intrusion Detection, International Journal of Soft Computing and Engineering (IJSCE), ISSN: 2231-2307, Volume-3, Issue-3, July 2013, p.237-241.
  • Aljebreen, M.J., (2018). Towards Intelligent Intrusion Detection Systems for Cloud Computing, Ph.D. Dissertation, Florida Institute of Technology, 2018.
  • Almutairi, A., (2016). Improving intrusion detection systems using data mining techniques, Ph.D Thesis, Loughborough University, 2016.
  • Alocious, C., Abouzakar, N., Xiao, H, and Christianson, B., (2014), Intrusion Detection Framework for Cyber Crimes using Bayesian Network, https://www.researchgate.net/ publication/272999966_Intrusion_Detection_ Framework_for_Cyber_Crimes_using_Bayesian_Network
  • Al Hogail, M., (2015). How is the ministry fostering public-private partnerships (PPPs) with local private developers?, https:// oxfordbusinessgroup.com/interview/right-homeobgtalks-majed-al-hogail-minister-housing
  • Angelini et al., (2017).CRUMBS: a Cybersecurity Framework Browser.
  • Apruzzese, G; Colajanni, M.; Ferretti, L.; Guido, A.; & Marchetti, M.( 2018). "On the effectiveness of machine and deep learning for cyber security," 2018 10th International Conference on Cyber Conflict (CyCon), Tallinn, 2018, pp.371390.
  • Azzalini, A., and Scarpa, B., (2012), Data analysis and data mining : an Introduction, Oxford University Press, Inc., ISBN 978-0-19976710-6.
  • Berman, D.S., Buczak, A.L., Chavis, J.S., and Corbett, C.L. (2019). “Survey of Deep Learning Methods for Cyber Security”, Information 2019, 10, 122; doi:10.3390/info10040122
  • Bezemskij, A., Loukas, G., Gan, D., and Anthony, R.J., (2017). Detecting cyber-physical threats in an autonomous robotic vehicle using Bayesian Networks, 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 21-23 June 2017, IEEE, United Kingdom, https://ieeexplore.ieee.org/ document/8276737
  • Bolzoni, D., (2009). Revisiting Anomaly-based Network Intrusion Detection Systems, Ph.D Thesis, University of Twente, The Netherlands, ISBN: 978-90-365-2853-5, ISSN: 1381-3617, DOI: 10.3990/1.9789036528535,
  • Bringas, P.B., and Santos, I., (2010). Bayesian Networks for Network Intrusion Detection, Bayesian Network, Ahmed Rebai (Ed.), ISBN: 978-953-307-124-4, InTech, Available from: http://www.intechopen.com/books/bayesiannetwork/ bayesian-networks-for-networkintrusiondetection
  • Concierge, (2018). Concierge Security Report. Cybersecurity: Trends from 2017 and Predictions for 2018.
  • Cornmen, T.H, Leiserson, C.E, Rivest, A.L, Stein, C. (2009). 3rd ed. Introduction to Algorithms. Cambridge: MIT Press.
  • Crewell, J.W., (2014). Research Design: Qualitative, quantitative and mixed methods .4rd edition, Sage Publications,Inc.
  • Demir, N., and Dalkilic, G., (2017). Modified stacking ensemble approach to detect network intrusion, Turkish Journal of Electrical Engineering & Computer Sciences, Accepted/ Published Online: 15.11.2017, http://journals.tubitak.gov.tr/elektrik/
  • European Union Agency for Network and Information Society (2017) https://openarchive.cbs.dk/bitstream/handle/10398/9524/Evaluation of ENISA- Final Report.pdf?sequence=1
  • Fehling, C., Leymann, F., Retter, R., Schupeck, W., Arbitter, P. (2014). Cloud Computing Patterns. Fundamentals to Design, Build, and Manage Cloud Applications. Springer-Verlag Wien .
  • Flick, U., (2013). The SAGE Handbook of Qualitative Data Analysis: Mapping the Field, New York, 2013.
  • Gcaza, N., Solms, R. Von, & Vuuren, J. Van.(2015). An Ontology for a National CyberSecurity Culture Environment. In Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2015) (1-10).
  • Gercke, M. (2012). ‘Cybercrime Understanding Cybercrime’, Understanding cybercrime: phenomena, challenges and legal response.
  • Ghafouri, A., (2018). Resilient Anomaly Detection in Cyber-Physical Systems, Ph.D. Dissertation, Faculty of the Graduate School of Vanderbilt University, February 2018.
  • Karimpour, J., Lotfi, S., and Siahmarzkooh, A.T., (2016). Intrusion detection in network flows based on an optimized clustering criterion, Turkish Journal of Electrical Engineering & Computer Sciences, Accepted/Published Online: 17.07.2016, http://journals.tubitak.gov.tr/elektrik
  • Kothari, C., (2004). Research Methodology Methods and Techniques, 2nd Edition. New Age International Publishers.
  • Kpmg, (2018).Clarity on Cybersecurity. Driving growth with confidence.
  • MacAfee, (2018). https://www.mcafee.com/ consumer/en-sg/store/m0/catalog.html 30. Malyuk and Miloslavskaya, (2016). Cybersecurity Culture as an Element of IT Professional Training, TBA.
  • Murugan, S., and Rajan, M.S., (2014). Detecting Anomaly IDS in Network using Bayesian Network, IOSR Journal of Computer Engineering (IOSR-JCE), e-ISSN: 2278-0661, p- ISSN: 2278-8727, Volume 16, Issue 1, Ver. III (Jan. 2014), PP 01-07, www.iosrjournals.org
  • National Institute of Standards and Technology, (2018). Framework for Improving Critical Infrastructure Cybersecurity Version 1.1.
  • Napanda, K., Shah, H., and Kurup, L., (2015). Artificial Intelligence Techniques for Network Intrusion Detection, International Journal of Engineering Research & Technology (IJERT), ISSN: 2278-0181, IJERTV4IS110283 www.ijert.org, Vol. 4 Issue 11, November-2015.
  • Nielsen, R. (2015). CS651 Computer Systems Security Foundations 3d Imagination Cyber Security Management Plan, Technical Report January 2015, Los Alamos National Laboratory, USA.
  • Norton Symantec (2017) ‘2017 Norton Cyber Security Insights Report - Global Results’, p.2018.
  • Oxford English Dictionary (2019). Oxford: Oxford University Press. Available at: https://en.oxforddictionaries.com.
  • Saunders, M.N.K., Thornhill, A., and Lewis, P., (2009). Research Methods for Business Students (5th Edition),Publisher: Pearson; ISBN13: 978-0273716860, ISBN-10: 0273716867, https://www.amazon.com/Research-MethodsBusiness-Students-5th/dp/0273716867
  • Stefanova, Z.S., (2018). "Machine Learning Methods for Network Intrusion Detection and Intrusion Prevention Systems", Graduate Theses and Dissertations, 2018, https:// scholarcommons.usf.edu/etd/7367
  • Sharma, R. (2012). Study of Latest Emerging Trends on Cybersecurity and its Challenges to Society. International Journal of Scientific and Engineering Research .Vol 3 Issue 6, June 2012.
  • Stallings, W., (2015). Operating System Stability. Accessed on 27th March, 2019. https://www.unf.edu/public/cop4610/ree/Notes/PPT/PPT8E/ CH15-OS8e.pdf
  • Symantec Annual Report (2016), https:// s1.q4cdn.com/doc_financials
  • Tran, T.M., Ko, D.W., Ryul, C., and Dinh, H., (2019). A bayesian network analysis of reforestation decisions by rural mountain communities in Vietnam, Forest Science and Technology, DOI: 10.1080/21580103.2019.1581665.
  • Tran, T.P., (2009). Innovative machine learning techniques for security detection problems, Ph.D. Dissertation, University of Technology, Sydney, Australia, 2009.
  • Truong, T.C; Diep, Q.B.; & Zelinka, I. (2020).Artificial Intelligence in the Cyber Domain: Offense and Defense. Symmetry 2020, 12, 410.
  • Umamaheswari, K., and Sujatha, S., (2017). Impregnable Defence Architecture using Dynamic Correlation-based Graded Intrusion Detection System for Cloud, Defence Science Journal, Vol. 67, No. 6, November 2017, pp.645-653, DOI : 10.14429/dsj.67.11118.
  • United Nations Economic Commission for Africa. (2014).Tackling the challenges of cybersecurity in Africa.
  • Yedaly, M. and Wright, B. (2016) ‘Cyber Crime & Cyber Security Trends in Africa’, Symantec.
  • YU, J., Chang, G.K., Kooning, A.M.J, and Ellinas, G., (2009). Radio-over-optical-fiber Networks: Introduction to the feature issue, Journal of Optical Networking,
  • Williams, B. T., (2014). The joint force commander’s guide to cyberspace operations. Joint Force Quarterly, 73(2), 12–19. Retrieved from http://ndupress.ndu.edu/ Portals/68/Documents/jfq/jfq-73/jfq-73_12-19_Williams.pdf.
  • Zekrifa, D.M.S., (2014). Hybrid Intrusion Detection System, Ph.D Thesis in Computer Science, School of Information Technology & Mathematical Sciences, 2014, University of South Australia, https://tel.archives-ouvertes.fr/tel-01584217.

Abstract Views: 337

PDF Views: 1




  • Performance of Machine Learning and other Artificial Intelligence Paradigms In Cybersecurity

Abstract Views: 337  |  PDF Views: 1

Authors

Gabriel Kabanda
Atlantic International University, 900 Fort Street Mall 40, Honolulu, Hawaii 96813, United States

Abstract


Cybersecurity systems are required at the application, network, host, and data levels. The research is purposed to evaluate Artificial Intelligence paradigms for use in network detection and prevention systems. This is purposed to develop a Cybersecurity system that uses artificial intelligence paradigms and can handle a high degree of complexity. The Pragmatism paradigm is elaborately associated with the Mixed Method Research (MMR), and is the research philosophy used in this research. Pragmatism recognizes the full rationale of the congruence between knowledge and action. The Pragmatic paradigm advocates a relational epistemology, a non-singular reality ontology, a mixed methods methodology, and a value-laden axiology. A qualitative approach where Focus Group discussions were held was used. The Artificial Intelligence paradigms evaluated include machine learning methods, autonomous robotic vehicle, artificial neural networks, and fuzzy logic. A discussion was held on the performance of Support Vector Machines, Artificial Neural Network, K-Nearest Neighbour, Naive-Bayes and Decision Tree Algorithms.

Keywords


Artificial Intelligence, Artificial Neural Networks, Bayesian Network, Cybersecurity, Deep Learning, Machine Learning.

References