Securing fog-assisted IoT smart homes: a federated learning-based intrusion detection approach DOI
Radjaa Bensaid, Nabila Labraoui, Hafida Saidi

et al.

Cluster Computing, Journal Year: 2024, Volume and Issue: 28(1)

Published: Oct. 28, 2024

Language: Английский

AI-driven fusion with cybersecurity: Exploring current trends, advanced techniques, future directions, and policy implications for evolving paradigms– A comprehensive review DOI
Sijjad Ali, Jia Wang,

Victor Chung Ming Leung

et al.

Information Fusion, Journal Year: 2025, Volume and Issue: unknown, P. 102922 - 102922

Published: Jan. 1, 2025

Language: Английский

Citations

2

Data Guardianship: Safeguarding Compliance in AI/ML Cloud Ecosystems DOI Creative Commons
Samir Vinayak Bayani,

Sanjeev Prakash,

Lavanya Shanmugam

et al.

Journal of Knowledge Learning and Science Technology ISSN 2959-6386 (online), Journal Year: 2023, Volume and Issue: 2(3), P. 436 - 456

Published: Sept. 29, 2023

AI has found widespread application across various sectors, including security, healthcare, finance, and national defense. However, alongside its transformative advancements, there been an unfortunate trend of malicious exploitation capabilities. Concurrently, the rapid evolution cloud computing technology introduced cloud-based systems. Regrettably, vulnerabilities inherent in infrastructure also pose risks to security services. We observe that integrity training data is pivotal, as any compromise therein directly impacts efficacy Against this backdrop, we assert paramount importance preserving within To address imperative, propose a architecture guided by National Institute Standards Technology (NIST) cyber framework. Leveraging block chain smart contracts emerges fitting solution tackle challenges, owing their characteristics shared decentralized ledgers. Smart facilitate automated policy enforcement, enable continuous monitoring integrity, mitigate risk tampering.

Language: Английский

Citations

26

Unifying Assurance A Framework for Ensuring Cloud Compliance in AIML Deployment DOI Creative Commons
Samir Vinayak Bayani,

Sanjeev Prakash,

Jesu Narkarunai Arasu Malaiyappan

et al.

Journal of Knowledge Learning and Science Technology ISSN 2959-6386 (online), Journal Year: 2023, Volume and Issue: 2(3), P. 457 - 472

Published: Nov. 30, 2023

Intrusion poses a significant challenge in Cloud networks, necessitating the development of efficient mechanisms to mitigate intrusions and enhance system security. To address this, we propose novel Artificial Bee-based Elman Neural Security Framework (ABENSF). This framework involves rescaling raw dataset using preprocessing functions integrating an optimal fitness function based on artificial bees into feature extraction phase identify extract attack features. Additionally, monitoring mechanism ABENSF enhances network security by proactively preventing attacks. By employing tracking functions, known unknown attacks can be effectively thwarted. We validate proposed NSL-KDD Python software conduct comparative analysis assess its performance against existing techniques. Our results demonstrate that developed model outperforms other methods terms prevention overall enhancement.

Language: Английский

Citations

25

Contribution of Artificial Intelligence in Improving Accessibility for Individuals with Disabilities DOI Creative Commons

Jeff Shuford

Journal of Knowledge Learning and Science Technology ISSN 2959-6386 (online), Journal Year: 2023, Volume and Issue: 2(2), P. 421 - 433

Published: Nov. 12, 2023

Artificial intelligence (AI) stands as a revolutionary force with profound implications for society, offering considerable advantages individuals disabilities. Yet, alongside its promise, AI brings inherent risks, including ethical dilemmas that could heighten discrimination against marginalized communities. This article conducts thorough analysis of the benefits and drawbacks people disabilities, specific focus on algorithmic biases. These biases, capable molding societal frameworks influencing decision-making, hold potential to perpetuate unfair treatment bias. Given these challenges, delves into remedies mitigate concerns ensure effectively caters needs all individuals, irrespective disability status.

Language: Английский

Citations

23

Enhancing Cybersecurity through AI and ML: Strategies, Challenges, and Future Directions DOI Open Access
Maryam Roshanaei,

Mahir R. Khan,

Natalie N. Sylvester

et al.

Journal of Information Security, Journal Year: 2024, Volume and Issue: 15(03), P. 320 - 339

Published: Jan. 1, 2024

The landscape of cybersecurity is rapidly evolving due to the advancement and integration Artificial Intelligence (AI) Machine Learning (ML). This paper explores crucial role AI ML in enhancing defenses against increasingly sophisticated cyber threats, while also highlighting new vulnerabilities introduced by these technologies. Through a comprehensive analysis that includes historical trends, technological evaluations, predictive modeling, dual-edged nature examined. Significant challenges such as data privacy, continuous training models, manipulation risks, ethical concerns are addressed. emphasizes balanced approach leverages innovation alongside rigorous standards robust practices. facilitates collaboration among various stakeholders develop guidelines ensure responsible effective use cybersecurity, aiming enhance system integrity privacy without compromising security.

Language: Английский

Citations

13

Cyber security Vulnerabilities and Remediation Through Cloud Security Tools DOI Creative Commons

FNU Jimmy

Deleted Journal, Journal Year: 2024, Volume and Issue: 3(1), P. 196 - 233

Published: April 12, 2024

The proliferation of internet usage has surged dramatically, prompting individuals and businesses to conduct myriad transactions online rather than in physical spaces. onset the COVID-19 pandemic further propelled this trend. Consequently, traditional forms crime have migrated digital realm alongside widespread adoption technologies such as cloud computing, Internet Things (IoT), social media, wireless communication, crypto currencies, amplifying security concerns cyberspace. Notably, cybercriminals begun offering cyber attacks a service, automating magnify their impact. These attackers exploit vulnerabilities across hardware, software, communication layers, perpetrating various including distributed denial service (DDoS), phishing, man-in-the-middle, password, remote, privilege escalation, malware attacks. sophistication these renders conventional protection systems, firewalls, intrusion detection antivirus access control lists, ineffective detection. there is an urgent imperative devise innovative pragmatic solutions thwart This paper elucidates primary drivers behind attacks, surveys recent attack instances, patterns, methodologies, explores contemporary technical non-technical strategies for preemptively identifying mitigating Leveraging cutting-edge like machine learning, deep platforms, big data analytics, blockchain holds promise combating present future threats. technological interventions can aid detection, spam filtering, DNS classification, fraud identification covert channels, discernment advanced persistent Nonetheless, it's crucial acknowledge that some promising solutions, notably learning are susceptible evasion techniques, necessitating careful consideration when formulating defenses against sophisticated

Language: Английский

Citations

10

Cyber security Vulnerabilities and Remediation Through Cloud Security Tools DOI Creative Commons

FNU Jimmy

Deleted Journal, Journal Year: 2024, Volume and Issue: 3(1), P. 196 - 233

Published: April 12, 2024

The proliferation of internet usage has surged dramatically, prompting individuals and businesses to conduct myriad transactions online rather than in physical spaces. onset the COVID-19 pandemic further propelled this trend. Consequently, traditional forms crime have migrated digital realm alongside widespread adoption technologies such as cloud computing, Internet Things (IoT), social media, wireless communication, crypto currencies, amplifying security concerns cyberspace. Notably, cybercriminals begun offering cyber attacks a service, automating magnify their impact. These attackers exploit vulnerabilities across hardware, software, communication layers, perpetrating various including distributed denial service (DDoS), phishing, man-in-the-middle, password, remote, privilege escalation, malware attacks. sophistication these renders conventional protection systems, firewalls, intrusion detection antivirus access control lists, ineffective detection. there is an urgent imperative devise innovative pragmatic solutions thwart This paper elucidates primary drivers behind attacks, surveys recent attack instances, patterns, methodologies, explores contemporary technical non-technical strategies for preemptively identifying mitigating Leveraging cutting-edge like machine learning, deep platforms, big data analytics, blockchain holds promise combating present future threats. technological interventions can aid detection, spam filtering, DNS classification, fraud identification covert channels, discernment advanced persistent Nonetheless, it's crucial acknowledge that some promising solutions, notably learning are susceptible evasion techniques, necessitating careful consideration when formulating defenses against sophisticated

Language: Английский

Citations

8

Privacy-Preserving Architectures for AI/ML Applications: Methods, Balances, and Illustrations DOI Creative Commons

Harish Padmanaban

Deleted Journal, Journal Year: 2024, Volume and Issue: 3(1), P. 235 - 245

Published: April 2, 2024

With the widespread integration of artificial intelligence (AI) and blockchain technologies, safeguarding privacy has become paramount importance. These techniques not only ensure confidentiality individuals' data but also maintain integrity reliability information. This study offers an introductory overview AI blockchain, highlighting their fusion subsequent emergence protection methodologies. It explores various application contexts, such as encryption, de-identification, multi-tier distributed ledgers, k-anonymity techniques. Moreover, paper critically evaluates five essential dimensions systems within AI-blockchain integration: authorization management, access control, security, network integrity, scalability. Additionally, it conducts a comprehensive analysis existing shortcomings, identifying root causes suggesting corresponding remedies. The categorizes synthesizes methodologies based on contexts technical frameworks. In conclusion, outlines prospective avenues for evolution technologies resulting from emphasizing need to enhance efficiency security more privacy.

Language: Английский

Citations

4

Artificial Intelligence (AI) in Cybersecurity: A Revolution in Threat Detection and Prevention DOI
Sandeep Sengupta, Subhajit Roy

Lecture notes in networks and systems, Journal Year: 2025, Volume and Issue: unknown, P. 497 - 514

Published: Jan. 1, 2025

Language: Английский

Citations

0

AI-Powered Threat Detection DOI

Vagisha Gupta

Lecture notes in computer science, Journal Year: 2025, Volume and Issue: unknown, P. 338 - 352

Published: Jan. 1, 2025

Language: Английский

Citations

0