American Journal of Computer Science and Technology

Submit a Manuscript

Publishing with us to make your research visible to the widest possible audience.

Propose a Special Issue

Building a community of authors and readers to discuss the latest research and develop new ideas.

Exploring Artificial Intelligence for Network Security: A Case Study of Malware Defence

AI has many applications in network security. Network security is one of the most challenging situations. The paper carries out AI based network security analysis and prevention ways of the deep learning models in the network security. We focus on some specific AI applications including voice supervision of public network, malicious code monitoring, smartphone intrusion monitoring, HTTP security monitoring, mobile phone malicious APK code monitoring are bringing the solutions for network security. We studied there are powerful methods such as mobile phone malicious APR code monitoring employed Artificial Neural Network (ANN) model which detects and mitigates predictable and unpredictable DDoS attacks (TCP, UDP, and ICMP protocols). HTTP is running over TCP, then the web server can face many TCP-related attacks, therefore, we have an experiment of HTTP security monitoring, mobile phone malicious APK code monitoring. This paper presents a potential security threats from malicious uses of AI, and proposes ways to better prevent, and mitigate these threats. When planning HTTP service protection, we present it is important to keep in mind that the attack surface is much broader than just the HTTP protocol. We suggest promising areas for further research that could expand the AI based solutions for development of cloud computing-related technologies, and the combination of cloud computing and deep learning technology in the security area.

Network Security, AI Network Security, Deep Learning

APA Style

Li Peng, Tuyatsetseg Badarch. (2022). Exploring Artificial Intelligence for Network Security: A Case Study of Malware Defence. American Journal of Computer Science and Technology, 5(2), 108-114. https://doi.org/10.11648/j.ajcst.20220502.22

ACS Style

Li Peng; Tuyatsetseg Badarch. Exploring Artificial Intelligence for Network Security: A Case Study of Malware Defence. Am. J. Comput. Sci. Technol. 2022, 5(2), 108-114. doi: 10.11648/j.ajcst.20220502.22

AMA Style

Li Peng, Tuyatsetseg Badarch. Exploring Artificial Intelligence for Network Security: A Case Study of Malware Defence. Am J Comput Sci Technol. 2022;5(2):108-114. doi: 10.11648/j.ajcst.20220502.22

Copyright © 2022 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

1. Chaitanya Gupta, Ishita Johri, Kathiravan Srinivasan, Yuh-Chung Hu, et al. (2022). A Systematic Review on Machine Learning and Deep Learning Models for Electronic Information Security in Mobile Networks Sensors, Special Issue Emerging Sensor Communication Network based AI/ML Driven Intelligent IoT), 2022, 22 (5), 2017. https://doi.org/10.3390/s22052017.
2. Ashenden, D. Information Security management: A human challenge? Inf. Secur. Tech. Rep. 2008, 13, 195–201.
3. Suo, H.; Liu, Z.; Wan, J.; Zhou, K. Security and privacy in mobile cloud computing. In Proceedings of the 9th International Wireless Communications and Mobile Computing Conference (IWCMC), Sardinia, Italy, 1–5 July 2013; pp. 655–659.
4. Ahmad, Z.; Khan, A. S.; Shiang, C. W.; Abdullah, J.; Ahmad, F. Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Trans. Emerg. Telecommun. Technol. 2020, 32, e4150.
5. Apruzzese, G.; Colajanni, M.; Ferretti, L.; Guido, A.; Marchetti, M. On the Effectiveness of Machine and Deep Learning for Cyber Security. In Proceedings of the 2018 10th International Conference on Cyber Conflict (CyCon), Tallinn, Estonia, 29 May–1 June 2018.
6. Berman, D. S.; Buczak, A. L.; Chavis, J. S.; Corbett, C. L. A Survey of Deep Learning Methods for Cyber Security. Information 2019, 10, 122.
7. Kong, L.-J. An improved information-security risk assessment algorithm for a hybrid model. Int. J. Adv. Comput. Technol. 2013, 5, 2.
8. Luong, N. C.; Hoang, D. T.; Gong, S.; Niyato, D.; Wang, P.; Liang, Y.-C.; Kim, D. I. Applications of Deep Reinforcement Learning in Communications and Networking: A Survey. IEEE Commun. Surv. Tutor. 2019, 21, 3133–3174.
9. Kim, D.; Ko, M.; Kim, S.; Moon, S.; Cheon, K.-Y.; Park, S.; Kim, Y.; Yoon, H.; Choi, Y.-H. Design and Implementation of Traffic Generation Model and Spectrum Requirement Calculator for Private 5G Network. IEEE Access 2022, 10, 15978–15993.
10. Xiao, A.; Liu, J.; Li, Y.; Song, Q.; Ge, N. Two-phase rate adaptation strategy for improving real-time video QoE in mobile networks. China Commun. 2018, 15, 12–24.
11. Use of Artificial Intelligence Techniques / Applications in Cyber Defense. (n.d.). Retrieved 14 August, 2020, from https://www.researchgate.net/publication/333477899_Use_of_Artificial_Intelligence_Techniques_Applications_in_Cyber_Defense.
12. Parati, N., & Anand, P. (2017). Machine Learning in Cyber Defence. International Journal of Computer Sciences and Engineering, 5 (12), 317–322.
13. Aminanto, M. E.; Kwangjo, K. Deep Learning-based Feature Selection for Intrusion Detection System in Transport Layer 1). In Proceedings of the Korea Institutes of Information Security and Cryptology Conference, Seoul, Korea, 30 November–2 December, 2016.
14. Maimo, L. F.; Gomez, A. L. P.; Clemente, F. J. G.; Gil Pérez, M.; Perez, G. M. A Self-Adaptive Deep Learning-Based System for Anomaly Detection in 5G Networks. IEEE Access 2018, 6, 7700–7712.
15. Arya, G.; Bagwari, A.; Chauhan, D. S. Performance Analysis of Deep Learning-Based Routing Protocol for an Efficient Data Transmission in 5G WSN Communication. IEEE Access 2022, 10, 9340–9356.
16. “Establishing Justified Confidence in AI Systems,” Chapter 8, Report of the National Security Commission on AI, March 2021. https://reports.nscai.gov/final-report/chapter-7/
17. E. Horvitz J. Young, R. G. Elluru, C. Howell, Key Considerations for the Responsible Development and Fielding of Artificial Intelligence, National Security Commission on AI, April 2021.
18. Kumar, Ram Shankar Siva, et al. Adversarial machine learning-industry perspectives. 2020 IEEE Security and Privacy Workshops (SPW). IEEE, 2020.
19. A. Madry, A. Makelov, L. Schmidt, et al. Towards deep learning models resistant to adversarial attacks, ICLR 2018. https://arxiv.org/pdf/1706.06083.pdf
20. Saied, A.; Overill, R. E.; Radzik, T. Detection of known and unknown DDoS attacks using Artificial Neural Networks. Neurocomputing 2016, 172, 385–393.