Skip to main content

Advertisement

Log in

Artificial general intelligence-based rational behavior detection using cognitive correlates for tracking online harms

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

Expert systems possess human-like expertise for data analyzing as well as for decision-making. These systems are suitable in a situation, where a high level of uncertainty exists. In expert systems, for protecting sensitive information, various encryption techniques such as classical encryption and quantum encryption are used. In these systems, Artificial Intelligence (AI) is used to analyze the data at runtime and to detect unauthorized users in the early stage especially for tracking online harms. These systems are not completely secured, because the encryption techniques have some loopholes such as the algorithm’s short life expectancy and less computation power. An unauthorized user destroys the precious data, as well as the system, might access these loopholes. As the confidentiality and integrity of expert systems are threatened by intrusions and real-time attacks related to privacy and cyber-security, there is a need for proposing novel methodologies to predict future attacks and identify new threat patterns. To analyze the behavior of the intruder and overcome the encryption weaknesses, this paper presents an Artificial General Intelligence-based Rational Behavior Detection Agent (AGI-RBDA). The proposed system possesses human-like rationality for protecting the information like a human mind. It is exposed that the human mind does not apply any kind of encryption technique; instead, it used various cognitive correlates such as intention, perception, motivation, emotions, and implicit and explicit knowledge for the secrecy of sensitive information. In the end, the behavior of different cognitive correlates is exposed and stimulated.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

References

  1. Abdel-Fattah AM, Besold TR, Gust H, Krumnack U, Schmidt M, Kuhnberger K-U, Wang P (2012) Rationality-guided AGI as cognitive systems. In: Proceedings of the Annual Meeting of the Cognitive Science Society 34(34)

  2. Khan MM, Ghani I, Jeong SR, Ibrahim R, Qureshi KN (2016) Facebook’s public social interaction utilization to assist recommendation across system domain. J Theoret Appl Inf Technol 88(3):392

    Google Scholar 

  3. Oravec J (2014) Expert systems and knowledge-based engineering (1984–1991): Implications for Instructional Systems Research. Int J Des Learn 5(2)

  4. Qazi R, Qureshi KN, Bashir F, Islam NU, Iqbal S, Arshad A (2020) Security protocol using elliptic curve cryptography algorithm for wireless sensor networks. J Ambient Intell Human Comput 12:547

    Article  Google Scholar 

  5. Kaimal LB, Metkar AR, Rakesh G (2014) Self learning real time expert system. Int J Soft Comput Artif Intell Appl 3(2):13–25

    Google Scholar 

  6. Ahmad A, Paul A, Rathore MM (2016) An efficient divide-and-conquer approach for big data analytics in machine-to-machine communication. Neurocomputing 174:439–453

    Article  Google Scholar 

  7. Ogu EC, Adekunle Y (2013) Basic concepts of expert system shells and an efficient model for knowledge acquisition. Int J Sci Res India Online 2(4)

  8. Ahmad A, Paul A, Rathore M, Chang H (2016) An efficient multidimensional big data fusion approach in machine-to-machine communication. ACM Trans Embedded Comput Syst 15(2):1–25

    Article  Google Scholar 

  9. Shehata AER, El-Arsh HY (2018) Lightweight joint compression-encryption-authentication-integrity framework based on arithmetic coding. arXiv preprint arXiv:1804.04300

  10. Ahmad A, Paul A, Din S, Rathore MM, Choi GS, Jeon G (2018) Multilevel data processing using parallel algorithms for analyzing big data in high-performance computing. Int J Parallel Prog 46(3):508–527

    Article  Google Scholar 

  11. Qureshi KN, Bashir F, Abdullah AH (2017) Provision of security in vehicular ad hoc networks through an intelligent secure routing scheme. in 2017 international conference on frontiers of information technology (FIT). IEEE, pp 200–205

  12. Iwakoshi T (2017) On problems in security of quantum key distribution raised by Yuen. In Quantum Information Science and Technology III, vol 10442. International Society for Optics and Photonics, p 1044203

  13. Khan IA, Qazi R (2019) Data security in cloud computing using elliptic curve cryptography. Int J Comput Commun Netw 1(1):46–52

    Google Scholar 

  14. Qayyum S, Naveed A (2019) Cyber physical system based crime resistant model for smart cities. Int J Comput Commun Netw 1(2):19–26

    Google Scholar 

  15. Kumar SN (2015) Review on network security and cryptography. Int Trans Electr Comput Eng Syst 3(1):1–11

    Google Scholar 

  16. Crandall D, Cosley D, Huttenlocher D, Kleinberg J, Suri S (2008) Feedback effects between similarity and social influence in online communities. In Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining, pp 160–168

  17. Russel S, Norvig P (2013) Artificial intelligence: a modern approach. Pearson Education Limited

  18. Al Sabbagh B (2019) Cybersecurity incident response: a socio-technical approach. Department of Computer and Systems Sciences, Stockholm University

  19. Esser S, Haider H (2017) The emergence of explicit knowledge in a serial reaction time task: The role of experienced fluency and strength of representation. Front Psychol 8:502

    Article  Google Scholar 

  20. Young-Eisendrath P (2018) The Buddhist unconscious (Alaya-vijnana) and Jung’s collective unconscious: what does it mean to be liberated from the self? In Depth Psychology and Mysticism. Springer, pp 269–282

  21. Dennett D (2010) Will AI achieve consciousness? Wrong question. Wired (Feb 9) https://www.wired.com/story/will-ai-achieve-consciousness-wrong-question/. Accessed on 13 June 2019

  22. Burr C, Cristianini N, Ladyman J (2018) An analysis of the interaction between intelligent software agents and human users. Mind Mach 28(4):735–774

    Article  Google Scholar 

  23. Li D, Gao H (2018) A hardware platform framework for an intelligent vehicle based on a driving brain. Engineering 4(4):464–470

    Article  Google Scholar 

  24. Rolls ET (2014) Emotion and decision-making explained: a précis. Cortex 59(185):93

    Google Scholar 

  25. Wang P, Liu K, Dougherty Q (2018) Conceptions of artificial intelligence and singularity. Information 9(4):79

    Article  Google Scholar 

  26. Fuchs T (2006) Ethical issues in neuroscience. Curr Opin Psychiatry 19(6):600–607

    Article  Google Scholar 

  27. Vernon D (2016) Reconciling constitutive and behavioural autonomy. The challenge of modelling development in enactive cognition. Intellectica 65(1):63–79

    Google Scholar 

  28. Öğmen H, Herzog MH (2016) A new conceptualization of human visual sensory-memory. Front Psychol 7:830

    Article  Google Scholar 

  29. Cooper D (2003) Psychology, risk and safety. Prof Saf 48(11):39–46

    Google Scholar 

  30. Banich MT, Mackiewicz KL, Depue BE, Whitmer AJ, Miller GA, Heller W (2009) Cognitive control mechanisms, emotion and memory: a neural perspective with implications for psychopathology. Neurosci Biobehav Rev 33(5):613–630

    Article  Google Scholar 

  31. Ramos T, Marques J, Garcia-Marques L (2017) The memory of what we do not recall: dissociations and theoretical debates in the study of implicit memory. Psicológica

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gwanggil Jeon.

Additional information

Publisher's note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Naseem, S., Alhudhaif, A., Anwar, M. et al. Artificial general intelligence-based rational behavior detection using cognitive correlates for tracking online harms. Pers Ubiquit Comput 27, 119–137 (2023). https://doi.org/10.1007/s00779-022-01665-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-022-01665-1

Keywords

Navigation