skip to main content
10.1145/2046684.2046699acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
short-paper

Artificial intelligence and the future of cybersecurity

Published:21 October 2011Publication History

ABSTRACT

A position paper toward an important and urgent discussion on how best use the potential of Artificial Intelligence in the context of cybersecurity. AI is often mentioned in papers on cybersecurity. But what is meant is using pre-existing AI techniques in cybersecurity. AI techniques are developed around applications. Cybersecurity has never been an area of concentration in AI. In this paper we argue that cybersecurity calls for new and specific AI techniques developed with that kind of application in mind. In practice, this paper is based on a broad overview of different approaches, which have the potential to be game changers in cybersecurity. This paper focuses on web application security and advocates the use of Knowledge Based Systems, probabilistic reasoning and Bayesian updating to control the probability of false positives and false negatives.

References

  1. A. Barth, C. Jackson, and J. C. Mitchell. Robust Defenses for Cross-Site Request Forgery. In Proceedings of 15th ACM Conference, CCS,2008, Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Seth Fogie, Jeremiah Grossman, Robert Hansen, Anton Rager, and Petko D. Petkov. XSS Attacks: Cross Site Scripting Exploits and Defense. Syngress, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. N. Jovanovic, E. Kirda, and C. Kruegel. Preventing Cross Site Request Forgery Attacks. Securecomm and Workshops, 2006, pages 1--10, Aug. 28 2006- Sept. 1 2006Google ScholarGoogle Scholar
  4. Davide Balzarotti, Marco Cova, Vika Felmetsger, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, and GiovanniVigna,: Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications, Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 2008.. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Landwehr,Cal, Cybersecurity and Artificial Intelligence: From Fixing the Plumbing to Smart Water, IEEE, Security and privacy, September/October 2008, p.3 Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Bruce Schneier, On Security, 2008.Google ScholarGoogle Scholar
  7. Douglas Corckford, Ajax Security, 2006.Google ScholarGoogle Scholar
  8. http://www.w3.org/TR/access-control/Google ScholarGoogle Scholar
  9. http://www.owasp.org/index.php/SQL_Injection_Prevention_Cheat_SheetGoogle ScholarGoogle Scholar
  10. Kenneth Ingham, Anil Somayaji, John Burge, Stephanie Forrest, Learning DFA representations of HTTP for protecting web applications Journal of Computer Networks. 51:5, pp. 1239--1255 (2007). Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Darran Mutz, William Robertson, Giovanni Vigna, and Richard Kemmerer, Exploiting Execution Context for the Detection of Anomalous System Calls, Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID), Gold Coast Australia, 2007 Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Marco Cova, Davide Balzarotti, Viktoria Felmetsger, and Giovanni Vigna Swaddler : An Approach for the Anomaly-based Detection of State Violations in Web Applications, Proceedings of the international Symposium on Recent Advances in Intrusion Detection (RAID), Gold Coast Australia, 2007 Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. E. Kirdaa, N. Jovanovicb, C. Kruegelc, G. Vigna, Client-side cross-site scripting protection, Computers & Security, vol. 28, no.7, IOS Press 2009.Google ScholarGoogle Scholar
  14. Marco Cova, Christopher Kruegel, and Giovanni Vigna, Detection and Analysis of Drive-by-Download Attacks and Malicious JavaScript Code, Proceedings of the World Wide Web Conference, Raleigh, NC, April 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Robertson, Federico Maggi, Christopher Kruegel Giovanni Vigna, Effective Anomaly Detection with Scarce Training Data, Proceedings of the Network and Distributed System. Security Symposium (NDSS), San Diego, CA, February 010.Google ScholarGoogle Scholar
  16. B. Morel, "Anomaly based intrusion detection systems", chapter in "intrusion detection systems, Intech (2011).Google ScholarGoogle Scholar
  17. William Zeller and Edward W. Felten; Cross-Site Request Forgeries: Exploitation and Prevention, Princeton (2008); http://citp.princeton.edu/csrf/Google ScholarGoogle Scholar
  18. L.J.. Savage: The foundations of statistical inferences, 1962.Google ScholarGoogle Scholar
  19. J. von Neumann, "Probabilistic logics and the synthesis of reliable organisms from unreliable components", in C. E. Shannon and J.McCarthy, editors, Annals of Math Studies, numbers 34, pages 43--98. Princeton Univ. Press, 1956Google ScholarGoogle Scholar
  20. Scott Fahlman: "NETL, a System for Representing and Using real World Knowledge", MIT Press, Cambridge, MA, 1979Google ScholarGoogle Scholar
  21. R. Akerkar, P.S. Sajja, Knowledge Based Systems, Jones and Bartlett, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Fahlman, S.E.: The Scone Knowledge Base (home page), http://www.cs.cmu.edu/~sef/ scone/Google ScholarGoogle Scholar
  23. Blake Shepard et al. (2005). "A Knowledge-Based Approach to Network SecurityGoogle ScholarGoogle Scholar
  24. http://www.w3.org/2004/OWL/Google ScholarGoogle Scholar
  25. Judea Pearl. Probabilistic Reasoning in Intelligent systems: Networks of Plausible Inference. Morgan Kaufmann, San Mateo, CA, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Artificial intelligence and the future of cybersecurity

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          AISec '11: Proceedings of the 4th ACM workshop on Security and artificial intelligence
          October 2011
          124 pages
          ISBN:9781450310031
          DOI:10.1145/2046684

          Copyright © 2011 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 21 October 2011

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • short-paper

          Acceptance Rates

          Overall Acceptance Rate94of231submissions,41%

          Upcoming Conference

          CCS '24
          ACM SIGSAC Conference on Computer and Communications Security
          October 14 - 18, 2024
          Salt Lake City , UT , USA

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader