Skip to main content

Advertisement

Log in

Evaluation of artificial intelligent techniques to secure information in enterprises

  • Published:
Artificial Intelligence Review Aims and scope Submit manuscript

Abstract

Information security paradigm is under a constant threat in enterprises particularly. The extension of World Wide Web and rapid expansion in size and types of documents involved in enterprises has generated many challenges. Extensive research has been conducted to determine the effective solutions to detect and respond but still the space is felt for improvement. Factors that hinder the development of an accurate detection and response techniques have shown links to the amount of data processing involved, number of protocols and application running across and variation in users’ requirements and responses. This paper is aimed at discussing the current issue in artificial intelligent (A.I.) techniques that could help in developing a better threat detection algorithm to secure information in enterprises. It is also investigated that the current information security techniques in enterprises have shown an inclination towards A.I. Conventional techniques for detection and response mostly requires human efforts to extract characteristics of malicious intent, investigate and analyze abnormal behaviors and later encode the derived results into the detection algorithm. Instead, A.I. can provide a direct solution to these requirements with a minimal human input. We have made an effort in this paper to discuss the current issues in information security and describe the benefits of artificially trained techniques in security process. We have also carried out survey of current A.I. techniques for IDS. Limitations of the techniques are discussed to identify the factors to be taken into account for efficient performance. Lastly, we have provided a possible research direction in this domain.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  • Abu-Nimeh S, Nappa D, Wang X, Nair S (2007) A comparison of A.I. techniques for phishing detection. In: eCrime ’07: Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit, ACM, New York, USA, pp 60–69

  • Ajendaro P (2004) A.I. techniques in masquerade detection, Master’s thesis, University of California, Davis

  • Anderson JP (1980) Computer security threat monitoring and surveillance. In: Technical report published by James P Anderson Co., Fort Washington, April

  • Axelson S (1998) Research in intrusion detection systems: a survey. Chalmers University of Technology, Goteborg, technical report

  • Barbard D, Wu N, Jajodia S (2001) Detecting novel network intrusion using bayes estimators. In: Proceedings of the first SIAM international conference on data mining, pp 24–29

  • Bridges SM, Vaughn RB (2000) Fuzzy data mining and genetic algorithms applied to intrusion detection. In: Proceedings of the National Information Systems security conference, pp 13–31

  • Cannady J (1998) The application of artificial neural networks to misuse detection: initial results. In: Proceedings of the 1st international workshop on the recent advances in intrusion detection (RAID), pp 31–47

  • Cansian AM, Moreira E, Carvalho A, Bonifacio JM (1997) Network intrusion detection using neural networks. In: International conference on computational intelligence and multimedia applications (ICCMA’97), pp 276–80

  • Denning DE, Neuman P (1987) An intrusion-detection model. IEEE Trans Softw Eng 13(2):119–230

    Google Scholar 

  • Elarbi-Boudihir M, Rehman A, Saba T (2011) Video motion perception using operation gabor filter. Int J Phys Sci 6(12):2799–2806

    Google Scholar 

  • Elkan C (2000) Results of the KDD’99 classifier learning contest. ACM Trans Inf Syst Secur 3(4):262–294

    Article  Google Scholar 

  • Fogla P, Sharif M, Perdisci R, Kolersnikov O, Lee W (2006) Polymorphic blending attack. In: Proceedings of 15th USENIX security symposium abstract (USENIX security 2006), Vancouver, July

  • Forrest S, et al (1996) A sense of self for Unix processes. In: Proceedings of IEEE symposium on security and privacy, Oakland, p 120

  • Haron H, Rahim S, Rehman A, Saba T (2010) Curve length estimation using vertix chain code. Int J Comput Sci Eng 2(6):2110–2113

    Google Scholar 

  • Haron H, Rehman A, Wulandhari LA, Saba T (2011) Improved vertex chain code algorithm for curve length estimation. J Comput Sci 7(5):736–743. doi:10.3844/jcssp.2011.736.743

    Article  Google Scholar 

  • Haron H, Rehman A, Adi DIS, Lim SP, Saba T (2012) Parameterization method on B-spline curve. Math Probl Eng 2012: doi:10.1155/2012/640472

  • Hu W et al (2003) Robust support vector machines for anomaly detection in computer security. International conference on A.I. and applications, Los Angeles, July

  • Jha S, Tan K, Maxion R (2001) Markocv chains, classifiers and intrusion detection. In: Proceedings of the 14th IEEE computer security foundation workshops (CSFW), pp 206–219

  • Joachims T (1998) Making large-scale SVM learning practical. LS8-report, University of Dortmund, LS VIII-report

  • Julisch K (2003) Clustering intrusion detection alarms to support root cause analysis. In: ACM transactions on information and system security (TISSEC), pp 443–471

  • KDD-cup 1999 data set: http://kdd.ics.uci.edu/databases/lddcup99/kddcup99.htA.I

  • KDD-CUP-99 task descriptors. Online:http://kdd.ics.uci.edu/databases/kddcup99/task.htm

  • Krugel C, Valeur F, Vigna C, Kemmerer R (2002) Stateful intrusion detection for high-speed networks. In: IEEE symposium on security and privacy, pp 285–94

  • Kurniawan F, Rahim MSM, Daman D, Rehman A, Mohamad D, Mariyam S (2011) Region-based touched character segmentation in handwritten words. Int J Innovative Comput Inf Control 7(6):3107–3120

    Google Scholar 

  • Lippmann R, Cummingham S (1999) Improving intrusion detection performance using keyword selection and neural networks. In: Proceedings of the second international workshops on recent advances in intrusion detection (RAID 99), West Lafayette

  • Markey J, Atlasis A (2009) Using decision tree analysis for intrusion detection. In: SANS Institute Info Sec Reading Room

  • Mitchell T (1997) Does A.I. really work ? In AI Magazine, pp 11–20

  • Mukkamala S, Sung A (2004) Intrusion detection systems using adaptive regression splines. In: Proceedings of 16th conference on enterprise information systems, pp 26–33.19

  • Mukkamal S, Janoski G, et al (2002) Intrusion detection: support vector machines and neural networks. In: Proceedings of IJCNN 2002, Honolulu, pp 1702–1707

  • Pietrasze KT (2004) Using adaptive alert classification to reduce false positives in intrusion detection. Recent Adv Intrusion Detect 3224(2004):102–124

    Article  Google Scholar 

  • Rahim MSM, Rehman A, Faizal-Ab-Jabal M, Saba T (2011) Close spanning tree approach for error detection and correction for 2D CAD drawing. Int J Acad Res 3(4):525–535

    Google Scholar 

  • Rehman A, Saba T (2011) Performance analysis of segmentation approach for cursive handwritten word recognition on benchmark database. Digit Signal Process 21:486–490

    Article  Google Scholar 

  • Rehman A, Kurniawan F, Mohamad D (2009) Neuro-heuristic approach for segmenting cursive handwritten words. Int J Inf Process (IJIP), 3(2):37–46, Bangalore. ISSN 0973-8215

    Google Scholar 

  • Rehman A, Kurniawan F, Saba T (2010) An automatic approach for line detection and removal without characters smash-up. Imag Sci J 59:171–182

    Google Scholar 

  • Rehman A, Saba T (2012a) Analysis of advanced image processing to clinical and preclinical decision making with prospectus of quantitative imaging biomarkers. Artif Intell Rev. doi:10.1007/s10462-012-9335-1

  • Rehman A, Saba T (2012b) Features extraction for soccer video semantic analysis: current achievements and remaining issues. Artif Intell Rev. doi:10.1007/s10462-012-9319-1

  • Saba T, Rehman A (2011) Cursive script segmentation with neural confidence. Int J Innovative Comput Inf Control (IJICIC) 7(7):1–10

    Google Scholar 

  • Saba T, Rehman A (2012) Effects of artificially intelligent tools on pattern recognition. Int J Mach Learn Cybern. doi:10.1007/s13042-012-0082-z

  • Saba T, Rehman A, Sulong G (2010a) Non-linear segmentation of touched roman characters based on genetic algorithm. Int J Comput Sci Eng 2(6):2167–2172

    Google Scholar 

  • Saba T, Rehman A, Sulong G (2010b) Improved offline connected script recognition based on hybrid strategy. Int J Eng Sci Technol 2(6):1603–1611

    Google Scholar 

  • Saba T, Rehman A, Elarbi-Boudihir M (2011a) Methods and strategies on off-line cursive touched characters segmentation: a directional review. Artif Intell Rev. doi:10.1007/s10462-011-9271-5

  • Saba T, Rehman A, Sulong G (2011b) Improved statistical features for cursive character recognition. Int J Innovative Comput Inf Control (IJICIC) 7(9):5211–5224

    Google Scholar 

  • Saba T, Sulong G, Rehman A (2011c) Document image analysis: issues, comparison of methods and remaining problems. Artif Intell Rev 35(2):101–118. doi:10.1007/s10462-010-9186-6

    Article  Google Scholar 

  • Sanjay R, Pujari AK, Gulati VP, Vemuri VR (2004) Intrusion detection using text processing techniques with binary weighted cosine metric. Int J Inf Secur 32:189–199

    Google Scholar 

  • Shyu M, Chen S, et al (2003) A novel anomaly detection scheme based on principal component classifier. In: Proceedings of IEEE foundations and new directions of data mining workhops, in conjunction with the 3rd IEEE international conference on data minig (ICDM), pp 172–179

  • Simon GJ, Xiong H, Eilertson E, Kumar V (2006) Scan detection—a data mining approach. In: proceedings of SIAM international conference on data mining, pp 118–129

  • Vladimir VN (1995) The nature of statistical learning theory. Springer, Berlin

    MATH  Google Scholar 

  • Wang W (2009) Statistical techniques for network security. Inf Sci Ref 14:75–76

    Google Scholar 

  • Wang Y, Cannady J (2005) A multinomial logistic regression modeling approach for anomaly intrusion detection. Comput Secur 24(8):662–674

    Article  Google Scholar 

  • Yihua L, Vemuri VR (2002) Using text categorization techniques for intrusion detection. In: Proceedings of Usenix San Francisco, August

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tanzila Saba.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Rehman, A., Saba, T. Evaluation of artificial intelligent techniques to secure information in enterprises. Artif Intell Rev 42, 1029–1044 (2014). https://doi.org/10.1007/s10462-012-9372-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10462-012-9372-9

Keywords

Navigation