Skip to main content

AI-Based Cybersecurity Systems

  • Conference paper
  • First Online:
Advanced Information Networking and Applications (AINA 2024)

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 202))

  • 163 Accesses

Abstract

Cybersecurity systems that guarantee the confidentiality and integrity of sensitive data use strong cryptography techniques based on public key infrastructure and data encryption systems. These techniques use protocols and user keys used to encrypt data and transmit it over VPNs or unsecured transmission networks. This work will describe new possibilities of using AI to create new solutions in the field of cybersecurity of data and computer systems. In this respect, AI techniques can be used to analyze the security of procedures used, as well as to create new protocols focused on specific systems, services or users, which will offer a higher level of data security and enable better protection against data leaks and cyberattacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ogiela, U., Takizawa, M., Ogiela, L.: Classification of cognitive service management systems in cloud computing. Lect. Notes Data Eng. Commun. Technol. 12, 309–313 (2018). https://doi.org/10.1007/978-3-319-69811-3_28

    Article  Google Scholar 

  2. Ogiela, L.: Data management in cognitive financial systems. Int. J. Inf. Manage. 33(2), 263–270 (2013). https://doi.org/10.1016/j.ijinfomgt.2012.11.008

    Article  Google Scholar 

  3. Ogiela, L., Ogiela, M.R., Ko, H.: Intelligent data management and security in cloud computing. Sensors 20(12), 3458 (2020). https://doi.org/10.3390/s20123458

    Article  Google Scholar 

  4. Ogiela, L., Ogiela, M.R.: Advances in Cognitive Information Systems, Cognitive Systems Monographs, Cosmos 17. Springer, Heidelberg (2012)

    Book  Google Scholar 

  5. Ogiela, L.: Towards cognitive economy. Soft Comput. 18(9), 1675–1683 (2014)

    Article  Google Scholar 

  6. Ferguson, N., Schneier, B.: Practical Cryptography. Wiley (2003)

    Google Scholar 

  7. Ogiela, M.R., Ogiela, U. Secure Information Splitting Using Grammar Schemes, Studies in Computational Intelligence, vol. 244, pp. 327–336. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-03958-4_28

  8. Ogiela, L.: Cognitive systems for medical pattern understanding and diagnosis. In: Lovrek, I., Howlett, R.J., Jain, L.C. (eds.) Knowledge-Based Intelligent Information and Engineering Systems. LNAI, vol. 5177, pp. 394–400, Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-85563-7_51

  9. Albus, J.S., Meystel, A.M.: Engineering of Mind – An Introduction to the Science of Intelligent Systems. A Wiley-Interscience Publication John Wiley & Sons Inc. (2001)

    Google Scholar 

  10. Branquinho, J. (ed.): The Foundations of Cognitive Science. Clarendon Press, Oxford (2001)

    Google Scholar 

  11. Perconti, P., Plebe, A.: Deep learning and cognitive science. Cognition 203, 104365 (2020). https://doi.org/10.1016/j.cognition.2020.104365

    Article  Google Scholar 

  12. Zhang, H., Liu, F., Li, B., Zhang, L., Zhu, Y., Wang, Z.: Deep discriminative image feature learning for cross-modal semantics understanding. Knowl.-Based Syst. 216, 106812 (2021). https://doi.org/10.1016/j.knosys.2021.106812

    Article  Google Scholar 

  13. Ogiela, M.R., Koptyra, K.: False and multi-secret steganography in digital images. Soft. Comput. 19(11), 3331–3339 (2015). https://doi.org/10.1007/s00500-015-1728-z

    Article  Google Scholar 

  14. Weiland, L., Hulpuş, I., Ponzetto, S.P., Effelsberg, W., Dietz, L.: Knowledge-rich image gist understanding beyond literal meaning. Data Knowl. Eng. 117, 114–132 (2018). https://doi.org/10.1016/j.datak.2018.07.006

    Article  Google Scholar 

  15. Pizzolante, R., Carpentieri, B., Castiglione, A., Castiglione, A., Palmieri, F.: Text compression and encryption through smart devices for mobile communication. In: Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 672–677 (2013). https://doi.org/10.1109/IMIS.2013.121

  16. Sardar, M.K., Adhikari, A.: A new lossless secret color image sharing scheme with small shadow size. J. Vis. Commun. Image Represent. 68, 102768 (2020). https://doi.org/10.1016/j.jvcir.2020.102768

    Article  Google Scholar 

Download references

Acknowledgments

The research project was supported by the program „Excellence initiative – research university” for the AGH University of Krakow.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marek R. Ogiela .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ogiela, M.R., Ogiela, L. (2024). AI-Based Cybersecurity Systems. In: Barolli, L. (eds) Advanced Information Networking and Applications. AINA 2024. Lecture Notes on Data Engineering and Communications Technologies, vol 202. Springer, Cham. https://doi.org/10.1007/978-3-031-57916-5_15

Download citation

Publish with us

Policies and ethics