AI for Cybersecurity: Robust models for Authentication, Threat and Anomaly Detection

Cybersecurity models include provisions for legitimate user and agent authentication, as well as algorithms for detecting external threats, such as intruders and malicious software. In particular, we can define a continuum of cybersecurity measures ranging from user identification to risk-based and...

Full description

Saved in:
Bibliographic Details
Other Authors: Bergadano, Francesco (Editor), Giacinto, Giorgio (Editor)
Format: Electronic Book Chapter
Language:English
Published: Basel MDPI - Multidisciplinary Digital Publishing Institute 2023
Subjects:
Online Access:DOAB: download the publication
DOAB: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000naaaa2200000uu 4500
001 doab_20_500_12854_112521
005 20230808
003 oapen
006 m o d
007 cr|mn|---annan
008 20230808s2023 xx |||||o ||| 0|eng d
020 |a books978-3-0365-8265-8 
020 |a 9783036582641 
020 |a 9783036582658 
040 |a oapen  |c oapen 
024 7 |a 10.3390/books978-3-0365-8265-8  |c doi 
041 0 |a eng 
042 |a dc 
072 7 |a TB  |2 bicssc 
072 7 |a TBX  |2 bicssc 
072 7 |a TG  |2 bicssc 
100 1 |a Bergadano, Francesco  |4 edt 
700 1 |a Giacinto, Giorgio  |4 edt 
700 1 |a Bergadano, Francesco  |4 oth 
700 1 |a Giacinto, Giorgio  |4 oth 
245 1 0 |a AI for Cybersecurity: Robust models for Authentication, Threat and Anomaly Detection 
260 |a Basel  |b MDPI - Multidisciplinary Digital Publishing Institute  |c 2023 
300 |a 1 electronic resource (208 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a Cybersecurity models include provisions for legitimate user and agent authentication, as well as algorithms for detecting external threats, such as intruders and malicious software. In particular, we can define a continuum of cybersecurity measures ranging from user identification to risk-based and multilevel authentication, complex application and network monitoring, and anomaly detection. We refer to this as the "anomaly detection continuum". Machine learning and other artificial intelligence technologies can provide powerful tools for addressing such issues, but the robustness of the obtained models is often ignored or underestimated. On the one hand, AI-based algorithms can be replicated by malicious opponents, and attacks can be devised so that they will not be detected (evasion attacks). On the other hand, data and system contexts can be modified by attackers to influence the countermeasures obtained from machine learning and render them ineffective (active data poisoning). This Special Issue presents ten papers that can be grouped under five main topics: (1) Cyber-Physical Systems (CPSs), (2) Intrusion Detection, (3) Malware Analysis, (4) Access Control, and (5) Threat intelligence.AI is increasingly being used in cybersecurity, with three main directions of current research: (1) new areas of cybersecurity are being addressed, such as CPS security and threat intelligence; (2) more stable and consistent results are being presented, sometimes with surprising accuracy and effectiveness; and (3) the presence of an AI-aware adversary is recognized and analyzed, producing more robust solutions. 
540 |a Creative Commons  |f https://creativecommons.org/licenses/by/4.0/  |2 cc  |4 https://creativecommons.org/licenses/by/4.0/ 
546 |a English 
650 7 |a Technology: general issues  |2 bicssc 
650 7 |a History of engineering & technology  |2 bicssc 
650 7 |a Mechanical engineering & materials  |2 bicssc 
653 |a Internet of Things 
653 |a cybersecurity 
653 |a cyber threats 
653 |a malware detection 
653 |a machine learning 
653 |a network traffic 
653 |a cooperative intelligent transportation systems (cITSs) 
653 |a IDS 
653 |a vehicular ad-hoc networks (VANET) 
653 |a adaptive model 
653 |a deep belief network (DBN) 
653 |a NIDS 
653 |a deep learning 
653 |a false negative rate 
653 |a artificial neural network 
653 |a MITRE ATT&CK Matrix 
653 |a techniques classification 
653 |a BERT-based multi-labeling 
653 |a formal ontology 
653 |a risk identification 
653 |a vulnerability 
653 |a portable executable malware 
653 |a tree-based ensemble 
653 |a performance comparison 
653 |a statistical significance test 
653 |a adversarial examples 
653 |a face recognition 
653 |a mask matrix 
653 |a targeted attack 
653 |a non-targeted attack 
653 |a anomaly detection 
653 |a attack detection 
653 |a cyber-physical system 
653 |a datasets 
653 |a evaluation metrics 
653 |a biometric cryptosystem 
653 |a iris identification 
653 |a error-correcting codes 
653 |a intrusion detection 
653 |a smart grid 
653 |a neural networks 
653 |a n/a 
856 4 0 |a www.oapen.org  |u https://mdpi.com/books/pdfview/book/7647  |7 0  |z DOAB: download the publication 
856 4 0 |a www.oapen.org  |u https://directory.doabooks.org/handle/20.500.12854/112521  |7 0  |z DOAB: description of the publication