Abstract
Expert systems possess human-like expertise for data analyzing as well as for decision-making. These systems are suitable in a situation, where a high level of uncertainty exists. In expert systems, for protecting sensitive information, various encryption techniques such as classical encryption and quantum encryption are used. In these systems, Artificial Intelligence (AI) is used to analyze the data at runtime and to detect unauthorized users in the early stage especially for tracking online harms. These systems are not completely secured, because the encryption techniques have some loopholes such as the algorithm’s short life expectancy and less computation power. An unauthorized user destroys the precious data, as well as the system, might access these loopholes. As the confidentiality and integrity of expert systems are threatened by intrusions and real-time attacks related to privacy and cyber-security, there is a need for proposing novel methodologies to predict future attacks and identify new threat patterns. To analyze the behavior of the intruder and overcome the encryption weaknesses, this paper presents an Artificial General Intelligence-based Rational Behavior Detection Agent (AGI-RBDA). The proposed system possesses human-like rationality for protecting the information like a human mind. It is exposed that the human mind does not apply any kind of encryption technique; instead, it used various cognitive correlates such as intention, perception, motivation, emotions, and implicit and explicit knowledge for the secrecy of sensitive information. In the end, the behavior of different cognitive correlates is exposed and stimulated.


















Similar content being viewed by others
Explore related subjects
Discover the latest articles and news from researchers in related subjects, suggested using machine learning.References
Abdel-Fattah AM, Besold TR, Gust H, Krumnack U, Schmidt M, Kuhnberger K-U, Wang P (2012) Rationality-guided AGI as cognitive systems. In: Proceedings of the Annual Meeting of the Cognitive Science Society 34(34)
Khan MM, Ghani I, Jeong SR, Ibrahim R, Qureshi KN (2016) Facebook’s public social interaction utilization to assist recommendation across system domain. J Theoret Appl Inf Technol 88(3):392
Oravec J (2014) Expert systems and knowledge-based engineering (1984–1991): Implications for Instructional Systems Research. Int J Des Learn 5(2)
Qazi R, Qureshi KN, Bashir F, Islam NU, Iqbal S, Arshad A (2020) Security protocol using elliptic curve cryptography algorithm for wireless sensor networks. J Ambient Intell Human Comput 12:547
Kaimal LB, Metkar AR, Rakesh G (2014) Self learning real time expert system. Int J Soft Comput Artif Intell Appl 3(2):13–25
Ahmad A, Paul A, Rathore MM (2016) An efficient divide-and-conquer approach for big data analytics in machine-to-machine communication. Neurocomputing 174:439–453
Ogu EC, Adekunle Y (2013) Basic concepts of expert system shells and an efficient model for knowledge acquisition. Int J Sci Res India Online 2(4)
Ahmad A, Paul A, Rathore M, Chang H (2016) An efficient multidimensional big data fusion approach in machine-to-machine communication. ACM Trans Embedded Comput Syst 15(2):1–25
Shehata AER, El-Arsh HY (2018) Lightweight joint compression-encryption-authentication-integrity framework based on arithmetic coding. arXiv preprint arXiv:1804.04300
Ahmad A, Paul A, Din S, Rathore MM, Choi GS, Jeon G (2018) Multilevel data processing using parallel algorithms for analyzing big data in high-performance computing. Int J Parallel Prog 46(3):508–527
Qureshi KN, Bashir F, Abdullah AH (2017) Provision of security in vehicular ad hoc networks through an intelligent secure routing scheme. in 2017 international conference on frontiers of information technology (FIT). IEEE, pp 200–205
Iwakoshi T (2017) On problems in security of quantum key distribution raised by Yuen. In Quantum Information Science and Technology III, vol 10442. International Society for Optics and Photonics, p 1044203
Khan IA, Qazi R (2019) Data security in cloud computing using elliptic curve cryptography. Int J Comput Commun Netw 1(1):46–52
Qayyum S, Naveed A (2019) Cyber physical system based crime resistant model for smart cities. Int J Comput Commun Netw 1(2):19–26
Kumar SN (2015) Review on network security and cryptography. Int Trans Electr Comput Eng Syst 3(1):1–11
Crandall D, Cosley D, Huttenlocher D, Kleinberg J, Suri S (2008) Feedback effects between similarity and social influence in online communities. In Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining, pp 160–168
Russel S, Norvig P (2013) Artificial intelligence: a modern approach. Pearson Education Limited
Al Sabbagh B (2019) Cybersecurity incident response: a socio-technical approach. Department of Computer and Systems Sciences, Stockholm University
Esser S, Haider H (2017) The emergence of explicit knowledge in a serial reaction time task: The role of experienced fluency and strength of representation. Front Psychol 8:502
Young-Eisendrath P (2018) The Buddhist unconscious (Alaya-vijnana) and Jung’s collective unconscious: what does it mean to be liberated from the self? In Depth Psychology and Mysticism. Springer, pp 269–282
Dennett D (2010) Will AI achieve consciousness? Wrong question. Wired (Feb 9) https://www.wired.com/story/will-ai-achieve-consciousness-wrong-question/. Accessed on 13 June 2019
Burr C, Cristianini N, Ladyman J (2018) An analysis of the interaction between intelligent software agents and human users. Mind Mach 28(4):735–774
Li D, Gao H (2018) A hardware platform framework for an intelligent vehicle based on a driving brain. Engineering 4(4):464–470
Rolls ET (2014) Emotion and decision-making explained: a précis. Cortex 59(185):93
Wang P, Liu K, Dougherty Q (2018) Conceptions of artificial intelligence and singularity. Information 9(4):79
Fuchs T (2006) Ethical issues in neuroscience. Curr Opin Psychiatry 19(6):600–607
Vernon D (2016) Reconciling constitutive and behavioural autonomy. The challenge of modelling development in enactive cognition. Intellectica 65(1):63–79
Öğmen H, Herzog MH (2016) A new conceptualization of human visual sensory-memory. Front Psychol 7:830
Cooper D (2003) Psychology, risk and safety. Prof Saf 48(11):39–46
Banich MT, Mackiewicz KL, Depue BE, Whitmer AJ, Miller GA, Heller W (2009) Cognitive control mechanisms, emotion and memory: a neural perspective with implications for psychopathology. Neurosci Biobehav Rev 33(5):613–630
Ramos T, Marques J, Garcia-Marques L (2017) The memory of what we do not recall: dissociations and theoretical debates in the study of implicit memory. Psicológica
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Naseem, S., Alhudhaif, A., Anwar, M. et al. Artificial general intelligence-based rational behavior detection using cognitive correlates for tracking online harms. Pers Ubiquit Comput 27, 119–137 (2023). https://doi.org/10.1007/s00779-022-01665-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00779-022-01665-1