Artificial intelligence in cyber security: research advances, challenges, and opportunities

被引:115
作者
Zhang, Zhimin [1 ]
Ning, Huansheng [1 ,2 ]
Shi, Feifei [1 ]
Farha, Fadi [1 ]
Xu, Yang [1 ]
Xu, Jiabo [3 ]
Zhang, Fan [1 ]
Choo, Kim-Kwang Raymond [4 ]
机构
[1] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing 100083, Peoples R China
[2] Beijing Engn Res Ctr Cyberspace Data Anal & Appli, Beijing 100083, Peoples R China
[3] Xinjiang Inst Engn, Sch Informat Engn, Xinjiang, Peoples R China
[4] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
基金
中国国家自然科学基金;
关键词
Cyber Security; Artificial Intelligence; Security Methods; Human-in-the-Loop; AUTHENTICATION; SYSTEMS;
D O I
10.1007/s10462-021-09976-0
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent times, there have been attempts to leverage artificial intelligence (AI) techniques in a broad range of cyber security applications. Therefore, this paper surveys the existing literature (comprising 54 papers mainly published between 2016 and 2020) on the applications of AI in user access authentication, network situation awareness, dangerous behavior monitoring, and abnormal traffic identification. This paper also identifies a number of limitations and challenges, and based on the findings, a conceptual human-in-the-loop intelligence cyber security model is presented.
引用
收藏
页码:1029 / 1053
页数:25
相关论文
共 83 条
[1]  
Adekunle YA, 2019, INT J APPL INFORM SY, V12
[2]   A survey of network anomaly detection techniques [J].
Ahmed, Mohiuddin ;
Mahmood, Abdun Naser ;
Hu, Jiankun .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 :19-31
[3]   Keystroke Biometric Systems for User Authentication [J].
Ali, Md Liakat ;
Monaco, John V. ;
Tappert, Charles C. ;
Qiu, Meikang .
JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2017, 86 (2-3) :175-190
[4]  
Aljamal I, 2019, 2019 IEEE/ACIS 17TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT AND APPLICATIONS (SERA), P84, DOI [10.1109/sera.2019.8886794, 10.1109/SERA.2019.8886794]
[5]  
Aljurayban NS, 2015, 2015 2 WORLD S WEB A, P1
[6]  
Amberkar A, 2018, INT C CURR TRENDS CO, P1, DOI [DOI 10.1109/ICCTCT.2018.85-51185, 10.1109/ICCTCT.2018.8551185, DOI 10.1109/ICCTCT.2018.8551185]
[7]  
Bakhshi B, 2019, IRAN CONF ELECTR ENG, P1994, DOI [10.1109/iraniancee.2019.8786720, 10.1109/IranianCEE.2019.8786720]
[8]   Research on Information Security Situation Awareness System Based on Big Data and Artificial Intelligence Technology [J].
Bao Hongrui ;
He Haiguang ;
Liu Zhe ;
Liu Zhongwei .
2019 INTERNATIONAL CONFERENCE ON ROBOTS & INTELLIGENT SYSTEM (ICRIS 2019), 2019, :318-322
[9]  
Benias N., 2017, 2017 South Eastern European Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM), P1, DOI DOI 10.23919/SEEDA-CECNSM.2017.8088234
[10]   Biometric Authentication by Keystroke Dynamics for Remote Evaluation with One-Class Classification [J].
Chang, Chuan ;
Eude, Thierry ;
Carbajal, Luis Eduardo Obando .
ADVANCES IN ARTIFICIAL INTELLIGENCE, AI 2016, 2016, 9673 :21-32