Open Access Open Access  Restricted Access Subscription Access

The Adoption of Artificial Intelligence in Different Network Security Concepts

Qutaiba I. Ali, Mamoon A. Al Jbaar, Adel Jalal Yousif

Abstract


The obstacles of each security system combined with the increase of cyber-attacks, negatively affect the effectiveness of network security management and rise the activities to be taken by the security staff and network administrators. So, there is a growing need for automated auditing and intelligent reporting strategies for reliable network security with as less model complexity as possible. Newly, artificial intelligence has been effectively applied to various network security issues, and numerous studies have been conducted that utilize various artificial intelligence techniques for the purposes of encryption and secure communication, in addition to using artificial intelligence to perform a large number of data encryption operations in record time. The study aims to showcase and discuss the leading artificial intelligence methods currently employed in network security. This includes aspects such as user authentication, key exchange, encryption/decryption, data integrity, and intrusion detection systems.


Keywords


Artificial intelligence, network security, neural networks, machine learning, encryption/ decryption, data integrity

Full Text:

PDF

References


Taylor CR, Lanson JP. Network-based classification of authentication attempts using machine learning. In: 2019 International Conference on Computing, Networking and Communications (ICNC); 2019, Feb 18; pp. 669–673. IEEE.

Wu Y, Wei D, Feng J. Network attacks detection methods based on deep learning techniques: a survey, Secur Commun Netw. May 2020.

Mirhoseini SR, Vahedi F, Nasiri JA. E-mail phishing detection using natural language processing and machine learning techniques. Iran, Tech. Rep; 2020.

Wenhui S, Kejin W, Aichun Z. The Development of artificial intelligence technology and its application in communication security. In: 2020 International Conference on Computer Engineering and Application (ICCEA); 2020, Mar 18; pp. 752–756. IEEE.

Cioffi R, et al. Artificial intelligence and machine learning applications in smart production: progress, trends, and directions, Sustainability. 12(2): 2020.

Shaukat K, Luo S, Varadharajan V, Hameed IA, Xu M. A Survey on machine learning techniques for cyber security in the last decade, in IEEE Access, vol. 8, pp. 222310–222354, 2020.

Taher KA, Jisan BM, Rahman MM. Network intrusion detection using supervised machine learning technique with feature selection. In: 2019 International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST); 2019, Jan 10; pp. 643–646. IEEE.

Kiyani AT, Lasebae A, Ali K. Continuous user authentication based on deep neural networks, 2020 International Conference on UK-China Emerging Technologies, pp. 1–4, 2020.

Ali Q, Dawwd S. On demand ciphering engine using artificial neural network, Int Arab Inf Technol (IAJIT). 2016; 13(4): 57–65.

Saraswat P, Garg K, Tripathi R, Agarwal A. Encryption algorithm based on neural network, 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU), pp. 1–5, 2019.

Truong S. Researching neural network and applying for secret key exchange, Bachelor’s Thesis, Metropolia University of Applied Sciences, 2021.

Turčaník M. Using recurrent neural network for hash function generation. In: 2017 International Conference on Applied Electronics (AE); 2017, Sep 5; pp. 1–4. IEEE.

Haggag A, Elsharkawy K, Said E. Utilization of artificial neural networks for fast encryption and decryption of messages. Int J Adv Trends Comput Sci Eng. 2020; 9(4): 4394–4440.

Forgáč R, Očkay M. Contribution to symmetric cryptography by convolutional neural networks. In: 2019 Communication and Information Technologies (KIT); 2019, Oct 9; pp. 1–6. IEEE.

Dahiya M. User authentication mechanism based on neural networks. Int J Comput Sci Mobile Comput. 2016; 5(5): 563–566.

Yayık A, Kutlu Y. Neural network-based cryptography, Neural Netw World. 2014; 2(14): 177–192.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2023 Journal of Network Security

  • eISSN: 2395–6739
  • ISSN: 2321–8517