AI for Cybersecurity: Robust models for Authentication, Threat and Anomaly Detection
Cybersecurity models include provisions for legitimate user and agent authentication, as well as algorithms for detecting external threats, such as intruders and malicious software. In particular, we can define a continuum of cybersecurity measures ranging from user identification to risk-based and...
Saved in:
Other Authors: | , |
---|---|
Format: | Electronic Book Chapter |
Language: | English |
Published: |
Basel
MDPI - Multidisciplinary Digital Publishing Institute
2023
|
Subjects: | |
Online Access: | DOAB: download the publication DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_112521 | ||
005 | 20230808 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20230808s2023 xx |||||o ||| 0|eng d | ||
020 | |a books978-3-0365-8265-8 | ||
020 | |a 9783036582641 | ||
020 | |a 9783036582658 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.3390/books978-3-0365-8265-8 |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
072 | 7 | |a TB |2 bicssc | |
072 | 7 | |a TBX |2 bicssc | |
072 | 7 | |a TG |2 bicssc | |
100 | 1 | |a Bergadano, Francesco |4 edt | |
700 | 1 | |a Giacinto, Giorgio |4 edt | |
700 | 1 | |a Bergadano, Francesco |4 oth | |
700 | 1 | |a Giacinto, Giorgio |4 oth | |
245 | 1 | 0 | |a AI for Cybersecurity: Robust models for Authentication, Threat and Anomaly Detection |
260 | |a Basel |b MDPI - Multidisciplinary Digital Publishing Institute |c 2023 | ||
300 | |a 1 electronic resource (208 p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a Cybersecurity models include provisions for legitimate user and agent authentication, as well as algorithms for detecting external threats, such as intruders and malicious software. In particular, we can define a continuum of cybersecurity measures ranging from user identification to risk-based and multilevel authentication, complex application and network monitoring, and anomaly detection. We refer to this as the "anomaly detection continuum". Machine learning and other artificial intelligence technologies can provide powerful tools for addressing such issues, but the robustness of the obtained models is often ignored or underestimated. On the one hand, AI-based algorithms can be replicated by malicious opponents, and attacks can be devised so that they will not be detected (evasion attacks). On the other hand, data and system contexts can be modified by attackers to influence the countermeasures obtained from machine learning and render them ineffective (active data poisoning). This Special Issue presents ten papers that can be grouped under five main topics: (1) Cyber-Physical Systems (CPSs), (2) Intrusion Detection, (3) Malware Analysis, (4) Access Control, and (5) Threat intelligence.AI is increasingly being used in cybersecurity, with three main directions of current research: (1) new areas of cybersecurity are being addressed, such as CPS security and threat intelligence; (2) more stable and consistent results are being presented, sometimes with surprising accuracy and effectiveness; and (3) the presence of an AI-aware adversary is recognized and analyzed, producing more robust solutions. | ||
540 | |a Creative Commons |f https://creativecommons.org/licenses/by/4.0/ |2 cc |4 https://creativecommons.org/licenses/by/4.0/ | ||
546 | |a English | ||
650 | 7 | |a Technology: general issues |2 bicssc | |
650 | 7 | |a History of engineering & technology |2 bicssc | |
650 | 7 | |a Mechanical engineering & materials |2 bicssc | |
653 | |a Internet of Things | ||
653 | |a cybersecurity | ||
653 | |a cyber threats | ||
653 | |a malware detection | ||
653 | |a machine learning | ||
653 | |a network traffic | ||
653 | |a cooperative intelligent transportation systems (cITSs) | ||
653 | |a IDS | ||
653 | |a vehicular ad-hoc networks (VANET) | ||
653 | |a adaptive model | ||
653 | |a deep belief network (DBN) | ||
653 | |a NIDS | ||
653 | |a deep learning | ||
653 | |a false negative rate | ||
653 | |a artificial neural network | ||
653 | |a MITRE ATT&CK Matrix | ||
653 | |a techniques classification | ||
653 | |a BERT-based multi-labeling | ||
653 | |a formal ontology | ||
653 | |a risk identification | ||
653 | |a vulnerability | ||
653 | |a portable executable malware | ||
653 | |a tree-based ensemble | ||
653 | |a performance comparison | ||
653 | |a statistical significance test | ||
653 | |a adversarial examples | ||
653 | |a face recognition | ||
653 | |a mask matrix | ||
653 | |a targeted attack | ||
653 | |a non-targeted attack | ||
653 | |a anomaly detection | ||
653 | |a attack detection | ||
653 | |a cyber-physical system | ||
653 | |a datasets | ||
653 | |a evaluation metrics | ||
653 | |a biometric cryptosystem | ||
653 | |a iris identification | ||
653 | |a error-correcting codes | ||
653 | |a intrusion detection | ||
653 | |a smart grid | ||
653 | |a neural networks | ||
653 | |a n/a | ||
856 | 4 | 0 | |a www.oapen.org |u https://mdpi.com/books/pdfview/book/7647 |7 0 |z DOAB: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/112521 |7 0 |z DOAB: description of the publication |