ABSTRACT
A position paper toward an important and urgent discussion on how best use the potential of Artificial Intelligence in the context of cybersecurity. AI is often mentioned in papers on cybersecurity. But what is meant is using pre-existing AI techniques in cybersecurity. AI techniques are developed around applications. Cybersecurity has never been an area of concentration in AI. In this paper we argue that cybersecurity calls for new and specific AI techniques developed with that kind of application in mind. In practice, this paper is based on a broad overview of different approaches, which have the potential to be game changers in cybersecurity. This paper focuses on web application security and advocates the use of Knowledge Based Systems, probabilistic reasoning and Bayesian updating to control the probability of false positives and false negatives.
- A. Barth, C. Jackson, and J. C. Mitchell. Robust Defenses for Cross-Site Request Forgery. In Proceedings of 15th ACM Conference, CCS,2008, Google ScholarDigital Library
- Seth Fogie, Jeremiah Grossman, Robert Hansen, Anton Rager, and Petko D. Petkov. XSS Attacks: Cross Site Scripting Exploits and Defense. Syngress, 2007. Google ScholarDigital Library
- N. Jovanovic, E. Kirda, and C. Kruegel. Preventing Cross Site Request Forgery Attacks. Securecomm and Workshops, 2006, pages 1--10, Aug. 28 2006- Sept. 1 2006Google Scholar
- Davide Balzarotti, Marco Cova, Vika Felmetsger, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, and GiovanniVigna,: Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications, Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 2008.. Google ScholarDigital Library
- Landwehr,Cal, Cybersecurity and Artificial Intelligence: From Fixing the Plumbing to Smart Water, IEEE, Security and privacy, September/October 2008, p.3 Google ScholarDigital Library
- Bruce Schneier, On Security, 2008.Google Scholar
- Douglas Corckford, Ajax Security, 2006.Google Scholar
- http://www.w3.org/TR/access-control/Google Scholar
- http://www.owasp.org/index.php/SQL_Injection_Prevention_Cheat_SheetGoogle Scholar
- Kenneth Ingham, Anil Somayaji, John Burge, Stephanie Forrest, Learning DFA representations of HTTP for protecting web applications Journal of Computer Networks. 51:5, pp. 1239--1255 (2007). Google ScholarDigital Library
- Darran Mutz, William Robertson, Giovanni Vigna, and Richard Kemmerer, Exploiting Execution Context for the Detection of Anomalous System Calls, Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID), Gold Coast Australia, 2007 Google ScholarDigital Library
- Marco Cova, Davide Balzarotti, Viktoria Felmetsger, and Giovanni Vigna Swaddler : An Approach for the Anomaly-based Detection of State Violations in Web Applications, Proceedings of the international Symposium on Recent Advances in Intrusion Detection (RAID), Gold Coast Australia, 2007 Google ScholarDigital Library
- E. Kirdaa, N. Jovanovicb, C. Kruegelc, G. Vigna, Client-side cross-site scripting protection, Computers & Security, vol. 28, no.7, IOS Press 2009.Google Scholar
- Marco Cova, Christopher Kruegel, and Giovanni Vigna, Detection and Analysis of Drive-by-Download Attacks and Malicious JavaScript Code, Proceedings of the World Wide Web Conference, Raleigh, NC, April 2010. Google ScholarDigital Library
- Robertson, Federico Maggi, Christopher Kruegel Giovanni Vigna, Effective Anomaly Detection with Scarce Training Data, Proceedings of the Network and Distributed System. Security Symposium (NDSS), San Diego, CA, February 010.Google Scholar
- B. Morel, "Anomaly based intrusion detection systems", chapter in "intrusion detection systems, Intech (2011).Google Scholar
- William Zeller and Edward W. Felten; Cross-Site Request Forgeries: Exploitation and Prevention, Princeton (2008); http://citp.princeton.edu/csrf/Google Scholar
- L.J.. Savage: The foundations of statistical inferences, 1962.Google Scholar
- J. von Neumann, "Probabilistic logics and the synthesis of reliable organisms from unreliable components", in C. E. Shannon and J.McCarthy, editors, Annals of Math Studies, numbers 34, pages 43--98. Princeton Univ. Press, 1956Google Scholar
- Scott Fahlman: "NETL, a System for Representing and Using real World Knowledge", MIT Press, Cambridge, MA, 1979Google Scholar
- R. Akerkar, P.S. Sajja, Knowledge Based Systems, Jones and Bartlett, 2009. Google ScholarDigital Library
- Fahlman, S.E.: The Scone Knowledge Base (home page), http://www.cs.cmu.edu/~sef/ scone/Google Scholar
- Blake Shepard et al. (2005). "A Knowledge-Based Approach to Network SecurityGoogle Scholar
- http://www.w3.org/2004/OWL/Google Scholar
- Judea Pearl. Probabilistic Reasoning in Intelligent systems: Networks of Plausible Inference. Morgan Kaufmann, San Mateo, CA, 1988. Google ScholarDigital Library
Index Terms
- Artificial intelligence and the future of cybersecurity
Recommendations
Artificial intelligence for cybersecurity: Literature review and future research directions
Highlights- A taxonomy of AI use cases for cybersecurity provision is proposed.
- A ...
AbstractArtificial intelligence (AI) is a powerful technology that helps cybersecurity teams automate repetitive tasks, accelerate threat detection and response, and improve the accuracy of their actions to strengthen the security posture ...
Cybersecurity Education in the Age of Artificial Intelligence
SIGCSE '21: Proceedings of the 52nd ACM Technical Symposium on Computer Science EducationThe 2019 Federal Cybersecurity Research and Development Strategic Plan highlighted the mutual needs and benefits of artificial intelligence (AI) and cybersecurity. AI techniques are expected to enhance cybersecurity by assisting human system managers ...
Trailblazing the Artificial Intelligence for Cybersecurity Discipline: A Multi-Disciplinary Research Roadmap
Special Issue on Analytics for Cybersecurity and Privacy, Part 1Cybersecurity has rapidly emerged as a grand societal challenge of the 21st century. Innovative solutions to proactively tackle emerging cybersecurity challenges are essential to ensuring a safe and secure society. Artificial Intelligence (AI) has ...
Comments