American Journal of Computer Science and Technology

Submit a Manuscript

Publishing with us to make your research visible to the widest possible audience.

Propose a Special Issue

Building a community of authors and readers to discuss the latest research and develop new ideas.

Research on the Application of AI in the Cyberspace Security: A Case Study of Smart Campus Network Security

AI has a variety of educational applications such as smart campuses, personalized learning platforms, teachers and students in assessment, and facial recognition systems. In this paper, we focus on the common threats in cyber space of education. An AI system inherits security threats of traditional computer system, therefore, cybersecurity protection mainly helps computer’s software and hardware, data store and transfer, as well as human activity. Therefore, we focus on the application of artificial intelligence technology to improve security protection and management capabilities in cyberspace security can further reduce the incidence of network failures and network attack accidents, and improve network system operation efficiency. We focus on the role of artificial intelligence and its applications through machine-learning systems. The general ways with the advancements of IT colleges and universities have adopted smart campus systems and they have become the mainstream. This paper introduces the design and implementation experience of a smart campus network, information security protection system, and points out that the implementation effects on providing teachers and students with a fast, safe, and reliable network. This environment makes teaching easier and students' learning more efficient. To this end, the article studies the role of artificial intelligence in cyber security, and hopes that this research can provide a scientific and reasonable reference for future related research.

Artificial Intelligence, Cyberspace, Security, Campus Network Security, Information Security

APA Style

Wei Junxu, Tuyatsetseg Badarch. (2022). Research on the Application of AI in the Cyberspace Security: A Case Study of Smart Campus Network Security. American Journal of Computer Science and Technology, 5(2), 101-107. https://doi.org/10.11648/j.ajcst.20220502.21

ACS Style

Wei Junxu; Tuyatsetseg Badarch. Research on the Application of AI in the Cyberspace Security: A Case Study of Smart Campus Network Security. Am. J. Comput. Sci. Technol. 2022, 5(2), 101-107. doi: 10.11648/j.ajcst.20220502.21

AMA Style

Wei Junxu, Tuyatsetseg Badarch. Research on the Application of AI in the Cyberspace Security: A Case Study of Smart Campus Network Security. Am J Comput Sci Technol. 2022;5(2):101-107. doi: 10.11648/j.ajcst.20220502.21

Copyright © 2022 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

1. Cao Xiaodong. The application of neural network in computer security, Science and Technology Innovation Herald, (36): 51, 2012.
2. Li Huai, Zhang Yong. Application of artificial intelligence technology in cyberspace security defense, Electronic Technology and Software Engineering, (22): 256, 2017.
3. Mao Zhiyong. Application of BP Neural Network in Computer Network Security Evaluation, Information Technology, (6): 45-47, 2008.
4. He Qian. The application of artificial intelligence technology in the development of mobile Internet. Telecom Network Technology, (02), 2017.
5. Wang Qingfu. Research on artificial intelligence technology based on computer network technology. Wireless Internet Technology, (10), 2016.
6. Liu Fei. Research on the application of artificial intelligence technology in the field of network security, Electronic Production, (17), 2016.
7. Liu Fang. Research on the application of artificial intelligence technology based on computer network teaching, Computer CD-ROM Software and Application, (03), 2014.
8. Fang Binxing. Artificial intelligence security, Beijing: Electronics Industry Press, 2020.
9. Jia Yan, Fang Binxing. Network Security Situational Awareness, Beijing: Electronic Industry Press, 2020.
10. Pan Xiaolei, Zhan Zhenkun, Cai Haishan. Application of data security defense system in hospital information security, China Digital Medicine, 05 (9): 86-88, 2010.
11. Ren Bin. On the construction of information security system in modern hospitals, China Information Industry, (4): 51-52, 2011.
12. Chapter 8. Remote OS Detection Nmap. Available online: https://nmap.org/book/osdetect.html, 2021.
13. Balaji, B., Koh, J., Weibel, N., & Agarwal, Y. (2016). Genie: Alongitudinal study comparing physical and software thermostats in office buildings. Ubicomp, 2016.
14. Channel Network. New trends in the application and development of artificial intelligence in the field of network security, 2018.
15. China National Defense Science and Technology Information Center. DARPA uses artificial intelligence to help commanders in 'gray zone' conflicts, 2018.
16. Yu Tao. Application of artificial intelligence technology in cyberspace security defense [J]. Electronic World, (06): 208-209, 2021.
17. Ma Liang, Wang Xiaodong, Lai Xiaobo. Implementation of Smart Campus Network and Information Security Protection: Taking Zhejiang University of Traditional Chinese Medicine as an example, China Medical Education Technology, 33 (06): 711-714, 2019.
18. Li Gengxi, Yao Jian, Niu Chen. Campus network security construction practice based on hierarchical protection system, Information Security and Technology, (04): 72-74, 2016.
19. NetEase Technology Report. Chatbot wars: AI hackers are taking over cybersecurity [EB/OL], 2016.
20. Yin Haozhi, Liu Tiezhi. Interpretation of artificial intelligence strategies in various countries: Analysis of the US artificial intelligence report, Telecommunications Network Technology, (2): 52-57, 2017.
21. Zhang Yilin. Discussion on computer network management and related security technologies [J]. Reading Digest, (04): 44, 2015.
22. Zheng Zhenqian, Wang Wei. A brief analysis of the effect of virtual network technology in computer network security, Value Engineering, (35): 196-197, 2014.
23. Wang Qi. Research on computer network security precautions, Electronic World, (14), 2014.
24. Liang Bo. Existing problems and countermeasures of computer network security management in colleges and universities, Computer Knowledge and Technology, (27), 2014.
25. Shen Haiying. Analysis of computer network security precautions, Netizens World, 14: 5, 2014.
26. Li Hongmin. University Network Security Level Protection [J]. Science and Technology Information, (17): 31, 2017.
27. Cerrudo, C., Apa, L.: Hacking robots before Skynet. Cybersecurity Insight, IO Active Report, Seattle, USA, 2017.
28. Vuong, T., Filippoupolitis, A., Loukas, G., Gan, D.: Physical indicators of cyber attacks against a rescue robot. In: 2014 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 338–343. IEEE, 2014.
29. Chowdhury, A., Karmakar, G., Kamruzzaman, J.: Survey of recent cyber security attacks on robotic systems and their mitigation approaches. In: Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications, pp. 1426–1441. IGI Global, 2019.
30. Rodrigues R, SIENNA D4.2: Analysis of the legal and human rights requirements for AI and robotics in and outside the EU, SIENNA project. 2019.