Skip to main content

2018 | OriginalPaper | Buchkapitel

The Direction of Information Security Control Analysis Using Artificial Intelligence

verfasst von : Sangdo Lee, Yongtae Shin

Erschienen in: Advances in Computer Science and Ubiquitous Computing

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The areas where artificial intelligence (AI) is employed are gradually increasing. The latest malicious codes are continually being found in the security control area and the security teams in various organizations are investigating an average of 200,000 security incidents a day and often wasting much of their time in tracking wrong targets or attacking methods. It is expected that the security-related incidents will be increased more than twice in near future. Thus, the security control staff will be able to prevent security breaches only by rapidly analyzing the latest vulnerabilities and logs in their systems or security equipment. In this study, we have studied the possibility of utilizing current AIs used for diagnosis of cancers, translations or simple conversations, along with the future direction of AI for security control. The study also attempts to find an effective method of reducing damages by rapidly analyzing attack methods and vulnerabilities, hoping the method will be effective in protecting the systems from a new variety of attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat ITU-T Q.4/17 Proposed initial draft text for Rec. ITU-T X. cybex, Cybersecurity information exchange framework (TD503) ITU-T Q.4/17 Proposed initial draft text for Rec. ITU-T X. cybex, Cybersecurity information exchange framework (TD503)
2.
Zurück zum Zitat Chen, P., Desmet, L., Huygens, C.: A study on advanced persistent threats. Communications and Multimedia Security, pp. 63–72 (2014) Chen, P., Desmet, L., Huygens, C.: A study on advanced persistent threats. Communications and Multimedia Security, pp. 63–72 (2014)
3.
Zurück zum Zitat Jang, J., Moon, J.S.: A real-time user authenticating method using behavior pattern through web. J. Korea Inst. Secur. Cryptol. 26(6), 1493–1504 (2016)CrossRef Jang, J., Moon, J.S.: A real-time user authenticating method using behavior pattern through web. J. Korea Inst. Secur. Cryptol. 26(6), 1493–1504 (2016)CrossRef
4.
Zurück zum Zitat Choi, J.: A study on a scenarios development guideline for detecting security threats. Korea National Open University (2015) Choi, J.: A study on a scenarios development guideline for detecting security threats. Korea National Open University (2015)
5.
Zurück zum Zitat Ghafir, I., Prenosil, V.: Advanced Persistent Threat Attack Detection. muni.cz, p. 2 (2014) Ghafir, I., Prenosil, V.: Advanced Persistent Threat Attack Detection. muni.cz, p. 2 (2014)
6.
Zurück zum Zitat Zope, A.R., Vidhate, A., Harale, N.: Data mining approach in security information and event management. Int. J. Future Comput. Commun. 2(2), 80–84 (2013)CrossRef Zope, A.R., Vidhate, A., Harale, N.: Data mining approach in security information and event management. Int. J. Future Comput. Commun. 2(2), 80–84 (2013)CrossRef
7.
Zurück zum Zitat Kim, Y.-J., Lee, S., Kwon, H.-Y., Lim, J.: A study on the improvement of effectiveness in national cyber security monitoring and control services. Korea Institute of Information Security and Cryptology, pp. 2–3 (2009) Kim, Y.-J., Lee, S., Kwon, H.-Y., Lim, J.: A study on the improvement of effectiveness in national cyber security monitoring and control services. Korea Institute of Information Security and Cryptology, pp. 2–3 (2009)
8.
Zurück zum Zitat IBM x-force threat intelligence quarterly, 1Q, p. 7 (2015) IBM x-force threat intelligence quarterly, 1Q, p. 7 (2015)
9.
Zurück zum Zitat NIST FIPS PUB 800-92, Guide to Computer Security Log Management (2006) NIST FIPS PUB 800-92, Guide to Computer Security Log Management (2006)
10.
Zurück zum Zitat Huh, J.-H., Otgonchimeg, S., Seo, K.: Advanced metering infrastructure design and test bed experiment using intelligent agents: focusing on the PLC network base technology for smart grid system. J. Supercomput. 72(5), 1862–1877 (2016). Springer, USACrossRef Huh, J.-H., Otgonchimeg, S., Seo, K.: Advanced metering infrastructure design and test bed experiment using intelligent agents: focusing on the PLC network base technology for smart grid system. J. Supercomput. 72(5), 1862–1877 (2016). Springer, USACrossRef
11.
Zurück zum Zitat Huh, J.-H., Koh, T., Seo, K.: A design of reefer container monitoring system using PLC-based technology. In: Proceedings of the 2015 International Conference on Electrical and Information Technologies for Rail Transportation, vol. 377, pp. 795–802. Springer, Heidelberg (2016) Huh, J.-H., Koh, T., Seo, K.: A design of reefer container monitoring system using PLC-based technology. In: Proceedings of the 2015 International Conference on Electrical and Information Technologies for Rail Transportation, vol. 377, pp. 795–802. Springer, Heidelberg (2016)
12.
Zurück zum Zitat Huh, J.-H., Seo, K.: A preliminary analysis model of big data for prevention of bioaccumulation of heavy metal-based pollutants: focusing on the atmospheric data analyses for smart farm. Contemp. Eng. Sc. 9(30), 1447–1462 (2016). Hikari Ltd.CrossRef Huh, J.-H., Seo, K.: A preliminary analysis model of big data for prevention of bioaccumulation of heavy metal-based pollutants: focusing on the atmospheric data analyses for smart farm. Contemp. Eng. Sc. 9(30), 1447–1462 (2016). Hikari Ltd.CrossRef
13.
Zurück zum Zitat Bu, Y., Seo, K., Huh, J.-H.: A study of enhancement of ranging performance of beacons through improvement of the smart phone’s gyroscope: focusing on the Bluetooth low energy. In: Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication. ACM (2017) Bu, Y., Seo, K., Huh, J.-H.: A study of enhancement of ranging performance of beacons through improvement of the smart phone’s gyroscope: focusing on the Bluetooth low energy. In: Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication. ACM (2017)
14.
Zurück zum Zitat Huh, J.-H., Seo, K.: Design and test bed experiments of server operation system using virtualization technology. Hum.-centric Comput. Inf. Sci. HCIS 6(1), 1–21 (2016). SpringerCrossRef Huh, J.-H., Seo, K.: Design and test bed experiments of server operation system using virtualization technology. Hum.-centric Comput. Inf. Sci. HCIS 6(1), 1–21 (2016). SpringerCrossRef
15.
Zurück zum Zitat Huh, M.K., Huh, H.W.: Genetic diversity and phylogenetic relationships in alder, Alnus firma, revealed by AFLP. J. Plant Biol. 44(1), 33–40 (2001). Springer, New YorkCrossRef Huh, M.K., Huh, H.W.: Genetic diversity and phylogenetic relationships in alder, Alnus firma, revealed by AFLP. J. Plant Biol. 44(1), 33–40 (2001). Springer, New YorkCrossRef
16.
Zurück zum Zitat Huh, J.-H., Kim, N., Seo, K.: Design and implementation of mobile medication-hour notification system with push service function. Int. J. Appl. Eng. Res 11(2), 1225–1231 (2016) Huh, J.-H., Kim, N., Seo, K.: Design and implementation of mobile medication-hour notification system with push service function. Int. J. Appl. Eng. Res 11(2), 1225–1231 (2016)
17.
Zurück zum Zitat Huh, J.-H.: PLC-based design of monitoring system for ICT-integrated vertical fish farm. Hum.-centric Comput. Inf. Sci. 7(1), 1–19 (2017). SpringerMathSciNetCrossRef Huh, J.-H.: PLC-based design of monitoring system for ICT-integrated vertical fish farm. Hum.-centric Comput. Inf. Sci. 7(1), 1–19 (2017). SpringerMathSciNetCrossRef
18.
Zurück zum Zitat Huh, J.-H.: Smart Grid Test Bed Using OPNET and Power Line Communication, pp. 66–120. IGI Global, Hershey (2017) Huh, J.-H.: Smart Grid Test Bed Using OPNET and Power Line Communication, pp. 66–120. IGI Global, Hershey (2017)
Metadaten
Titel
The Direction of Information Security Control Analysis Using Artificial Intelligence
verfasst von
Sangdo Lee
Yongtae Shin
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-7605-3_138

Neuer Inhalt