Preface |
|
xiii | |
|
1 Role of AI in Cyber Security |
|
|
1 | (10) |
|
|
|
|
2 | (1) |
|
1.2 Need for Artificial Intelligence |
|
|
2 | (1) |
|
1.3 Artificial Intelligence in Cyber Security |
|
|
3 | (2) |
|
1.3.1 Multi-Layered Security System Design |
|
|
3 | (1) |
|
1.3.2 Traditional Security Approach and AI |
|
|
4 | (1) |
|
|
5 | (1) |
|
|
5 | (1) |
|
|
6 | (1) |
|
|
6 | (1) |
|
1.5.1 System Architecture |
|
|
7 | (1) |
|
|
7 | (1) |
|
|
7 | (4) |
|
|
8 | (3) |
|
2 Privacy Preserving Using Data Mining |
|
|
11 | (22) |
|
|
|
|
11 | (3) |
|
2.2 Data Mining Techniques and Their Role in Classification and Detection |
|
|
14 | (5) |
|
|
19 | (2) |
|
2.4 Privacy Preserving Data Mining (PPDM) |
|
|
21 | (1) |
|
2.5 Intrusion Detection Systems (IDS) |
|
|
22 | (4) |
|
|
23 | (1) |
|
2.5.1.1 Network-Based IDS |
|
|
23 | (1) |
|
|
24 | (1) |
|
|
25 | (1) |
|
2.6 Phishing Website Classification |
|
|
26 | (1) |
|
2.7 Attacks by Mitigating Code Injection |
|
|
27 | (1) |
|
2.7.1 Code Injection and Its Categories |
|
|
27 | (1) |
|
|
28 | (5) |
|
|
29 | (4) |
|
3 Role of Artificial Intelligence in Cyber Security and Security Framework |
|
|
33 | (32) |
|
|
|
34 | (2) |
|
3.2 AI for Cyber Security |
|
|
36 | (2) |
|
3.3 Uses of Artificial Intelligence in Cyber Security |
|
|
38 | (2) |
|
3.4 The Role of AI in Cyber Security |
|
|
40 | (6) |
|
3.4.1 Simulated Intelligence Can Distinguish Digital Assaults |
|
|
41 | (1) |
|
3.4.2 Computer-Based Intelligence Can Forestall Digital Assaults |
|
|
42 | (1) |
|
3.4.3 Artificial Intelligence and Huge Scope Cyber Security |
|
|
42 | (1) |
|
3.4.4 Challenges and Promises of Artificial Intelligence in Cyber Security |
|
|
43 | (1) |
|
3.4.5 Present-Day Cyber Security and its Future with Simulated Intelligence |
|
|
44 | (1) |
|
3.4.6 Improved Cyber Security with Computer-Based Intelligence and AI (ML) |
|
|
45 | (1) |
|
3.4.7 AI Adopters Moving to Make a Move |
|
|
45 | (1) |
|
3.5 AI Impacts on Cyber Security |
|
|
46 | (2) |
|
3.6 The Positive Uses of AI Based for Cyber Security |
|
|
48 | (1) |
|
3.7 Drawbacks and Restrictions of Using Computerized Reasoning For Digital Security |
|
|
49 | (1) |
|
3.8 Solutions to Artificial Intelligence Confinements |
|
|
50 | (1) |
|
3.9 Security Threats of Artificial Intelligence |
|
|
51 | (1) |
|
3.10 Expanding Cyber Security Threats with Artificial Consciousness |
|
|
52 | (3) |
|
3.11 Artificial Intelligence in Cybersecurity -- Current Use-Cases and Capabilities |
|
|
55 | (5) |
|
3.11.1 AI for System Danger Distinguishing Proof |
|
|
56 | (1) |
|
3.11.2 The Common Fit for Artificial Consciousness in Cyber Security |
|
|
56 | (1) |
|
3.11.3 Artificial Intelligence for System Danger ID |
|
|
57 | (1) |
|
3.11.4 Artificial Intelligence Email Observing |
|
|
58 | (1) |
|
3.11.5 Simulated Intelligence for Battling Artificial Intelligence Dangers |
|
|
58 | (1) |
|
3.11.6 The Fate of Computer-Based Intelligence in Cyber Security |
|
|
59 | (1) |
|
3.12 How to Improve Cyber Security for Artificial Intelligence |
|
|
60 | (1) |
|
|
61 | (4) |
|
|
62 | (3) |
|
4 Botnet Detection Using Artificial Intelligence |
|
|
65 | (22) |
|
|
|
4.1 Introduction to Botnet |
|
|
66 | (1) |
|
|
67 | (2) |
|
4.2.1 Host-Centred Detection (HCD) |
|
|
68 | (1) |
|
4.2.2 Honey Nets-Based Detection (HNBD) |
|
|
69 | (1) |
|
4.2.3 Network-Based Detection (NBD) |
|
|
69 | (1) |
|
|
69 | (4) |
|
|
70 | (1) |
|
4.3.1.1 IBN-Based Protocol |
|
|
71 | (1) |
|
4.3.1.2 HTTP-Based Botnets |
|
|
71 | (1) |
|
|
71 | (1) |
|
|
72 | (1) |
|
|
73 | (1) |
|
4.4.1 Perspective of Botnet Detection |
|
|
73 | (1) |
|
4.4.2 Detection (Disclosure) Technique |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
74 | (1) |
|
4.5.1 Machine Learning Characteristics |
|
|
74 | (1) |
|
4.6 A Machine Learning Approach of Botnet Detection |
|
|
75 | (1) |
|
4.7 Methods of Machine Learning Used in Botnet Exposure |
|
|
76 | (4) |
|
4.7.1 Supervised (Administrated) Learning |
|
|
76 | (1) |
|
4.7.1.1 Appearance of Supervised Learning |
|
|
77 | (1) |
|
4.7.2 Unsupervised Learning |
|
|
78 | (1) |
|
4.7.2.1 Role of Unsupervised Learning |
|
|
79 | (1) |
|
4.8 Problems with Existing Botnet Detection Systems |
|
|
80 | (1) |
|
4.9 Extensive Botnet Detection System (EBDS) |
|
|
81 | (2) |
|
|
83 | (4) |
|
|
84 | (3) |
|
5 Spam Filtering Using AI |
|
|
87 | (14) |
|
|
|
|
87 | (2) |
|
|
87 | (1) |
|
5.1.2 Purpose of Spamming |
|
|
88 | (1) |
|
5.1.3 Spam Filters Inputs and Outputs |
|
|
88 | (1) |
|
5.2 Content-Based Spam Filtering Techniques |
|
|
89 | (2) |
|
5.2.1 Previous Likeness-Based Filters |
|
|
89 | (1) |
|
5.2.2 Case-Based Reasoning Filters |
|
|
89 | (1) |
|
5.2.3 Ontology-Based E-Mail Filters |
|
|
90 | (1) |
|
5.2.4 Machine-Learning Models |
|
|
90 | (1) |
|
5.2.4.1 Supervised Learning |
|
|
90 | (1) |
|
5.2.4.2 Unsupervised Learning |
|
|
90 | (1) |
|
5.2.4.3 Reinforcement Learning |
|
|
91 | (1) |
|
5.3 Machine Learning-Based Filtering |
|
|
91 | (6) |
|
|
91 | (1) |
|
5.3.2 Naive Bayes Filtering |
|
|
92 | (2) |
|
5.3.3 Support Vector Machines |
|
|
94 | (1) |
|
5.3.4 Neural Networks and Fuzzy Logics-Based Filtering |
|
|
94 | (3) |
|
|
97 | (1) |
|
|
97 | (4) |
|
|
98 | (3) |
|
6 Artificial Intelligence in the Cyber Security Environment |
|
|
101 | (18) |
|
|
|
102 | (2) |
|
6.2 Digital Protection and Security Correspondences Arrangements |
|
|
104 | (2) |
|
6.2.1 Operation Safety and Event Response |
|
|
105 | (1) |
|
|
105 | (1) |
|
|
105 | (1) |
|
|
106 | (4) |
|
|
107 | (1) |
|
|
108 | (2) |
|
6.4 Spark Cognition Deep Military |
|
|
110 | (1) |
|
6.5 The Process of Detecting Threats |
|
|
111 | (1) |
|
6.6 Vectra Cognito Networks |
|
|
112 | (3) |
|
|
115 | (4) |
|
|
115 | (4) |
|
7 Privacy in Multi-Tenancy Frameworks Using AI |
|
|
119 | (10) |
|
|
|
119 | (1) |
|
7.2 Framework of Multi-Tenancy |
|
|
120 | (2) |
|
7.3 Privacy and Security in Multi-Tenant Base System Using AI |
|
|
122 | (3) |
|
|
125 | (1) |
|
|
125 | (4) |
|
|
126 | (3) |
|
8 Biometric Facial Detection and Recognition Based on ILPB and SVM |
|
|
129 | (26) |
|
|
|
|
|
129 | (10) |
|
|
131 | (1) |
|
8.1.2 Categories of Biometric |
|
|
131 | (1) |
|
8.1.2.1 Advantages of Biometric |
|
|
132 | (1) |
|
8.1.3 Significance and Scope |
|
|
132 | (1) |
|
8.1.4 Biometric Face Recognition |
|
|
132 | (4) |
|
|
136 | (1) |
|
|
136 | (1) |
|
|
137 | (2) |
|
8.2 The Proposed Methodolgy |
|
|
139 | (6) |
|
8.2.1 Face Detection Using Haar Algorithm |
|
|
139 | (2) |
|
8.2.2 Feature Extraction Using ILBP |
|
|
141 | (2) |
|
|
143 | (1) |
|
8.2.4 Classification Using SVM |
|
|
143 | (2) |
|
|
145 | (6) |
|
|
146 | (1) |
|
|
146 | (1) |
|
8.3.3 Recognize Face Image |
|
|
147 | (4) |
|
|
151 | (4) |
|
|
152 | (3) |
|
9 Intelligent Robot for Automatic Detection of Defects in Pre-Stressed Multi-Strand Wires and Medical Gas Pipe Line System Using ANN and IoT |
|
|
155 | (18) |
|
|
|
|
|
|
|
156 | (2) |
|
9.2 Inspection System for Defect Detection |
|
|
158 | (4) |
|
9.3 Defect Recognition Methodology |
|
|
162 | (3) |
|
9.4 Health Care MGPS Inspection |
|
|
165 | (3) |
|
|
168 | (5) |
|
|
169 | (4) |
|
10 Fuzzy Approach for Designing Security Framework |
|
|
173 | (24) |
|
|
|
173 | (4) |
|
|
177 | (8) |
|
10.3 Planning for a Rule-Based Expert System for Cyber Security |
|
|
185 | (3) |
|
10.3.1 Level 1: Denning Cyber Security Expert System Variables |
|
|
185 | (1) |
|
10.3.2 Level 2: Information Gathering for Cyber Terrorism |
|
|
185 | (1) |
|
10.3.3 Level 3: System Design |
|
|
186 | (1) |
|
10.3.4 Level 4: Rule-Based Model |
|
|
187 | (1) |
|
|
188 | (2) |
|
|
188 | (1) |
|
|
188 | (1) |
|
10.4.3 Different Types of Security Services |
|
|
189 | (1) |
|
10.5 Improvement of Cyber Security System (Advance) |
|
|
190 | (1) |
|
|
190 | (1) |
|
10.5.2 Cyber Terrorism for Information/Data Collection |
|
|
191 | (1) |
|
|
191 | (6) |
|
|
192 | (5) |
|
11 Threat Analysis Using Data Mining Technique |
|
|
197 | (12) |
|
|
|
|
198 | (1) |
|
|
199 | (2) |
|
11.3 Data Mining Methods in Favor of Cyber-Attack Detection |
|
|
201 | (3) |
|
11.4 Process of Cyber-Attack Detection Based on Data Mining |
|
|
204 | (1) |
|
|
205 | (4) |
|
|
205 | (4) |
|
12 Intrusion Detection Using Data Mining |
|
|
209 | (20) |
|
|
|
|
209 | (1) |
|
|
210 | (6) |
|
12.2.1 Intrusion Detection System |
|
|
211 | (1) |
|
12.2.2 Categorization of IDS |
|
|
212 | (1) |
|
12.2.2.1 Web Intrusion Detection System (WIDS) |
|
|
213 | (1) |
|
12.2.2.2 Host Intrusion Detection System (HIDS) |
|
|
214 | (1) |
|
12.2.2.3 Custom-Based Intrusion Detection System (CIDS) |
|
|
215 | (1) |
|
12.2.2.4 Application Protocol-Based Intrusion Detection System (APIDS) |
|
|
215 | (1) |
|
12.2.2.5 Hybrid Intrusion Detection System |
|
|
216 | (1) |
|
|
216 | (5) |
|
|
217 | (1) |
|
|
217 | (1) |
|
|
218 | (2) |
|
|
220 | (1) |
|
|
221 | (2) |
|
12.4.1 Classification and Regression Tree (CART) |
|
|
222 | (1) |
|
12.4.2 Iterative Dichotomise 3 (ID3) |
|
|
222 | (1) |
|
|
223 | (1) |
|
12.5 Data Mining Model for Detecting the Attacks |
|
|
223 | (3) |
|
12.5.1 Framework of the Technique |
|
|
224 | (2) |
|
|
226 | (3) |
|
|
226 | (3) |
|
13 A Maize Crop Yield Optimization and Healthcare Monitoring Framework Using Firefly Algorithm through IoT |
|
|
229 | (18) |
|
|
|
|
|
|
|
230 | (1) |
|
|
231 | (1) |
|
13.3 Experimental Framework |
|
|
232 | (5) |
|
13.4 Healthcare Monitoring |
|
|
237 | (3) |
|
13.5 Results and Discussion |
|
|
240 | (2) |
|
|
242 | (5) |
|
|
243 | (4) |
|
14 Vision-Based Gesture Recognition: A Critical Review |
|
|
247 | (14) |
|
|
|
|
|
|
|
247 | (1) |
|
14.2 Issues in Vision-Based Gesture Recognition |
|
|
248 | (1) |
|
|
249 | (1) |
|
14.2.2 Based on Performance |
|
|
249 | (1) |
|
14.2.3 Based on Background |
|
|
249 | (1) |
|
14.3 Step-by-Step Process in Vision-Based |
|
|
249 | (4) |
|
|
251 | (1) |
|
|
252 | (1) |
|
14.3.3 Feature Extraction |
|
|
252 | (1) |
|
|
253 | (1) |
|
|
254 | (4) |
|
|
258 | (3) |
|
|
258 | (3) |
|
15 SPAM Filtering Using Artificial Intelligence |
|
|
261 | (34) |
|
|
|
261 | (4) |
|
15.2 Architecture of Email Servers and Email Processing Stages |
|
|
265 | (4) |
|
15.2.1 Architecture -- Email Spam Filtering |
|
|
265 | (1) |
|
15.2.1.1 Spam Filter -- Gmail |
|
|
266 | (1) |
|
15.2.1.2 Mail Filter Spam -- Yahoo |
|
|
266 | (1) |
|
15.2.1.3 Email Spam Filter -- Outlook |
|
|
267 | (1) |
|
15.2.2 Email Spam Filtering -- Process |
|
|
267 | (1) |
|
|
268 | (1) |
|
|
268 | (1) |
|
15.2.2.3 Election of Features |
|
|
268 | (1) |
|
15.2.3 Freely Available Email Spam Collection |
|
|
269 | (1) |
|
15.3 Execution Evaluation Measures |
|
|
269 | (6) |
|
15.4 Classification -- Machine Learning Technique for Email Spam |
|
|
275 | (15) |
|
15.4.1 Flock Technique -- Clustering |
|
|
275 | (1) |
|
15.4.2 Naive Bayes Classifier |
|
|
276 | (3) |
|
|
279 | (3) |
|
|
282 | (1) |
|
15.4.5 Fuzzy Set Classifiers |
|
|
283 | (1) |
|
15.4.6 Support Vector Machine |
|
|
284 | (2) |
|
|
286 | (1) |
|
15.4.7.1 NBTree Classifier |
|
|
286 | (1) |
|
15.4.7.2 C4.5/J48 Decision Tree Algorithm |
|
|
287 | (1) |
|
15.4.7.3 Logistic Version Tree Induction (LVT) |
|
|
287 | (1) |
|
15.4.8 Ensemble Classifiers |
|
|
288 | (1) |
|
15.4.9 Random Forests (RF) |
|
|
289 | (1) |
|
|
290 | (5) |
|
|
290 | (5) |
Index |
|
295 | |