Skip to main content
Top

2018 | OriginalPaper | Chapter

Artificial Intelligence Agents as Mediators of Trustless Security Systems and Distributed Computing Applications

Authors : Steven Walker-Roberts, Mohammad Hammoudeh

Published in: Guide to Vulnerability Analysis for Computer Networks and Systems

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This chapter considers the emergence of a new cybersecurity paradigm—a system in which no trust exists. The brief history to this new paradigm is examined, the challenges and opportunities of such a paradigm and how to design a system implementing zero trust starting with static vulnerability analysis. The role of artificial intelligence as a selfless mediating agent is examined to resolve some issues in implementing a trustless security system, in addition to the challenges this presents.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Orman H (2003) The Morris worm: a fifteen-year perspective. IEEE Secur Priv 99(5):35–43 (Accessed 26 Oct 2017)CrossRef Orman H (2003) The Morris worm: a fifteen-year perspective. IEEE Secur Priv 99(5):35–43 (Accessed 26 Oct 2017)CrossRef
2.
go back to reference Ranum MJ (1997) Thinking about firewalls v2.0: beyond perimeter security. Inf Secur Tech Rep 2(3):33–45 (Accessed 26 Oct 2017)CrossRef Ranum MJ (1997) Thinking about firewalls v2.0: beyond perimeter security. Inf Secur Tech Rep 2(3):33–45 (Accessed 26 Oct 2017)CrossRef
4.
go back to reference Kindervag J (2010) No more chewy centers: introducing the zero trust model of information security. Forrester Research (Accessed 26 Oct 2017) Kindervag J (2010) No more chewy centers: introducing the zero trust model of information security. Forrester Research (Accessed 26 Oct 2017)
5.
go back to reference Trabelsi Z, Zhang L, Zeidan S, Ghoudi K (2013) Dynamic traffic awareness statistical model for firewall performance enhancement. Comput Secur 39:160–172 (Accessed 26 Oct 2017)CrossRef Trabelsi Z, Zhang L, Zeidan S, Ghoudi K (2013) Dynamic traffic awareness statistical model for firewall performance enhancement. Comput Secur 39:160–172 (Accessed 26 Oct 2017)CrossRef
7.
go back to reference Meng W, Li W, Xiang Y, Choo K-KR (2017) A Bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks. J Netw Comput Appl 78:162–169 (Accessed 26 Oct 2017)CrossRef Meng W, Li W, Xiang Y, Choo K-KR (2017) A Bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks. J Netw Comput Appl 78:162–169 (Accessed 26 Oct 2017)CrossRef
10.
go back to reference Zahadat N, Blessner P, Blackburn T, Olson BA (2015) Byod security engineering: a framework and its analysis. Comput Secur 55:81–99 (Accessed 26 Oct 2017)CrossRef Zahadat N, Blessner P, Blackburn T, Olson BA (2015) Byod security engineering: a framework and its analysis. Comput Secur 55:81–99 (Accessed 26 Oct 2017)CrossRef
11.
go back to reference Kim, K.-N., Yim, M.-S., Schneider, E.: A study of insider threat in nuclear security analysis using game theoretic modeling. Ann Nucl Energy 108, 301–309 (2017). (Accessed 26 Oct 2017) Kim, K.-N., Yim, M.-S., Schneider, E.: A study of insider threat in nuclear security analysis using game theoretic modeling. Ann Nucl Energy 108, 301–309 (2017). (Accessed 26 Oct 2017)
12.
go back to reference Kindervag J (2013) Developing a framework to improve critical infrastructure cybersecurity (response to NIST request for information docket no. 130208119-3119-01) (Accessed 26 Oct 2017) Kindervag J (2013) Developing a framework to improve critical infrastructure cybersecurity (response to NIST request for information docket no. 130208119-3119-01) (Accessed 26 Oct 2017)
14.
go back to reference Ward R, Beyer B (2014) Beyondcorp: a new approach to enterprise security. Login 39:5–11 (Accessed 26 Oct 2017) Ward R, Beyer B (2014) Beyondcorp: a new approach to enterprise security. Login 39:5–11 (Accessed 26 Oct 2017)
34.
40.
go back to reference Walker-Roberts S, Hammoudeh M, Dehghan Tanha A (2018) A systematic review of the availability and efficacy of countermeasures to internal threats in healthcare critical infrastructure. IEEE Access 6 Walker-Roberts S, Hammoudeh M, Dehghan Tanha A (2018) A systematic review of the availability and efficacy of countermeasures to internal threats in healthcare critical infrastructure. IEEE Access 6
41.
go back to reference Dijkstra E (1982) Selected writings on computing: a personal perspective. Springer, New YorkCrossRef Dijkstra E (1982) Selected writings on computing: a personal perspective. Springer, New YorkCrossRef
42.
go back to reference Reade C (1989) Elements of functional programming. Addison-Wesley, WokinghamMATH Reade C (1989) Elements of functional programming. Addison-Wesley, WokinghamMATH
44.
go back to reference Hallyn S (2009) Making root unprivileged. Linux J 2009(184) (Accessed 26 Oct 2017) Hallyn S (2009) Making root unprivileged. Linux J 2009(184) (Accessed 26 Oct 2017)
Metadata
Title
Artificial Intelligence Agents as Mediators of Trustless Security Systems and Distributed Computing Applications
Authors
Steven Walker-Roberts
Mohammad Hammoudeh
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-92624-7_6

Premium Partner