| Peer-Reviewed

Research on the Application of AI in the Cyberspace Security: A Case Study of Smart Campus Network Security

Received: 8 April 2022     Accepted: 6 May 2022     Published: 24 May 2022
Views:       Downloads:
Abstract

AI has a variety of educational applications such as smart campuses, personalized learning platforms, teachers and students in assessment, and facial recognition systems. In this paper, we focus on the common threats in cyber space of education. An AI system inherits security threats of traditional computer system, therefore, cybersecurity protection mainly helps computer’s software and hardware, data store and transfer, as well as human activity. Therefore, we focus on the application of artificial intelligence technology to improve security protection and management capabilities in cyberspace security can further reduce the incidence of network failures and network attack accidents, and improve network system operation efficiency. We focus on the role of artificial intelligence and its applications through machine-learning systems. The general ways with the advancements of IT colleges and universities have adopted smart campus systems and they have become the mainstream. This paper introduces the design and implementation experience of a smart campus network, information security protection system, and points out that the implementation effects on providing teachers and students with a fast, safe, and reliable network. This environment makes teaching easier and students' learning more efficient. To this end, the article studies the role of artificial intelligence in cyber security, and hopes that this research can provide a scientific and reasonable reference for future related research.

Published in American Journal of Computer Science and Technology (Volume 5, Issue 2)

This article belongs to the Special Issue Advances in Computer Science and Future Technology

DOI 10.11648/j.ajcst.20220502.21
Page(s) 101-107
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2022. Published by Science Publishing Group

Keywords

Artificial Intelligence, Cyberspace, Security, Campus Network Security, Information Security

References
[1] Cao Xiaodong. The application of neural network in computer security, Science and Technology Innovation Herald, (36): 51, 2012.
[2] Li Huai, Zhang Yong. Application of artificial intelligence technology in cyberspace security defense, Electronic Technology and Software Engineering, (22): 256, 2017.
[3] Mao Zhiyong. Application of BP Neural Network in Computer Network Security Evaluation, Information Technology, (6): 45-47, 2008.
[4] He Qian. The application of artificial intelligence technology in the development of mobile Internet. Telecom Network Technology, (02), 2017.
[5] Wang Qingfu. Research on artificial intelligence technology based on computer network technology. Wireless Internet Technology, (10), 2016.
[6] Liu Fei. Research on the application of artificial intelligence technology in the field of network security, Electronic Production, (17), 2016.
[7] Liu Fang. Research on the application of artificial intelligence technology based on computer network teaching, Computer CD-ROM Software and Application, (03), 2014.
[8] Fang Binxing. Artificial intelligence security, Beijing: Electronics Industry Press, 2020.
[9] Jia Yan, Fang Binxing. Network Security Situational Awareness, Beijing: Electronic Industry Press, 2020.
[10] Pan Xiaolei, Zhan Zhenkun, Cai Haishan. Application of data security defense system in hospital information security, China Digital Medicine, 05 (9): 86-88, 2010.
[11] Ren Bin. On the construction of information security system in modern hospitals, China Information Industry, (4): 51-52, 2011.
[12] Chapter 8. Remote OS Detection Nmap. Available online: https://nmap.org/book/osdetect.html, 2021.
[13] Balaji, B., Koh, J., Weibel, N., & Agarwal, Y. (2016). Genie: Alongitudinal study comparing physical and software thermostats in office buildings. Ubicomp, 2016.
[14] Channel Network. New trends in the application and development of artificial intelligence in the field of network security, 2018.
[15] China National Defense Science and Technology Information Center. DARPA uses artificial intelligence to help commanders in 'gray zone' conflicts, 2018.
[16] Yu Tao. Application of artificial intelligence technology in cyberspace security defense [J]. Electronic World, (06): 208-209, 2021.
[17] Ma Liang, Wang Xiaodong, Lai Xiaobo. Implementation of Smart Campus Network and Information Security Protection: Taking Zhejiang University of Traditional Chinese Medicine as an example, China Medical Education Technology, 33 (06): 711-714, 2019.
[18] Li Gengxi, Yao Jian, Niu Chen. Campus network security construction practice based on hierarchical protection system, Information Security and Technology, (04): 72-74, 2016.
[19] NetEase Technology Report. Chatbot wars: AI hackers are taking over cybersecurity [EB/OL], 2016.
[20] Yin Haozhi, Liu Tiezhi. Interpretation of artificial intelligence strategies in various countries: Analysis of the US artificial intelligence report, Telecommunications Network Technology, (2): 52-57, 2017.
[21] Zhang Yilin. Discussion on computer network management and related security technologies [J]. Reading Digest, (04): 44, 2015.
[22] Zheng Zhenqian, Wang Wei. A brief analysis of the effect of virtual network technology in computer network security, Value Engineering, (35): 196-197, 2014.
[23] Wang Qi. Research on computer network security precautions, Electronic World, (14), 2014.
[24] Liang Bo. Existing problems and countermeasures of computer network security management in colleges and universities, Computer Knowledge and Technology, (27), 2014.
[25] Shen Haiying. Analysis of computer network security precautions, Netizens World, 14: 5, 2014.
[26] Li Hongmin. University Network Security Level Protection [J]. Science and Technology Information, (17): 31, 2017.
[27] Cerrudo, C., Apa, L.: Hacking robots before Skynet. Cybersecurity Insight, IO Active Report, Seattle, USA, 2017.
[28] Vuong, T., Filippoupolitis, A., Loukas, G., Gan, D.: Physical indicators of cyber attacks against a rescue robot. In: 2014 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 338–343. IEEE, 2014.
[29] Chowdhury, A., Karmakar, G., Kamruzzaman, J.: Survey of recent cyber security attacks on robotic systems and their mitigation approaches. In: Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications, pp. 1426–1441. IGI Global, 2019.
[30] Rodrigues R, SIENNA D4.2: Analysis of the legal and human rights requirements for AI and robotics in and outside the EU, SIENNA project. 2019.
Cite This Article
  • APA Style

    Wei Junxu, Tuyatsetseg Badarch. (2022). Research on the Application of AI in the Cyberspace Security: A Case Study of Smart Campus Network Security. American Journal of Computer Science and Technology, 5(2), 101-107. https://doi.org/10.11648/j.ajcst.20220502.21

    Copy | Download

    ACS Style

    Wei Junxu; Tuyatsetseg Badarch. Research on the Application of AI in the Cyberspace Security: A Case Study of Smart Campus Network Security. Am. J. Comput. Sci. Technol. 2022, 5(2), 101-107. doi: 10.11648/j.ajcst.20220502.21

    Copy | Download

    AMA Style

    Wei Junxu, Tuyatsetseg Badarch. Research on the Application of AI in the Cyberspace Security: A Case Study of Smart Campus Network Security. Am J Comput Sci Technol. 2022;5(2):101-107. doi: 10.11648/j.ajcst.20220502.21

    Copy | Download

  • @article{10.11648/j.ajcst.20220502.21,
      author = {Wei Junxu and Tuyatsetseg Badarch},
      title = {Research on the Application of AI in the Cyberspace Security: A Case Study of Smart Campus Network Security},
      journal = {American Journal of Computer Science and Technology},
      volume = {5},
      number = {2},
      pages = {101-107},
      doi = {10.11648/j.ajcst.20220502.21},
      url = {https://doi.org/10.11648/j.ajcst.20220502.21},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajcst.20220502.21},
      abstract = {AI has a variety of educational applications such as smart campuses, personalized learning platforms, teachers and students in assessment, and facial recognition systems. In this paper, we focus on the common threats in cyber space of education. An AI system inherits security threats of traditional computer system, therefore, cybersecurity protection mainly helps computer’s software and hardware, data store and transfer, as well as human activity. Therefore, we focus on the application of artificial intelligence technology to improve security protection and management capabilities in cyberspace security can further reduce the incidence of network failures and network attack accidents, and improve network system operation efficiency. We focus on the role of artificial intelligence and its applications through machine-learning systems. The general ways with the advancements of IT colleges and universities have adopted smart campus systems and they have become the mainstream. This paper introduces the design and implementation experience of a smart campus network, information security protection system, and points out that the implementation effects on providing teachers and students with a fast, safe, and reliable network. This environment makes teaching easier and students' learning more efficient. To this end, the article studies the role of artificial intelligence in cyber security, and hopes that this research can provide a scientific and reasonable reference for future related research.},
     year = {2022}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Research on the Application of AI in the Cyberspace Security: A Case Study of Smart Campus Network Security
    AU  - Wei Junxu
    AU  - Tuyatsetseg Badarch
    Y1  - 2022/05/24
    PY  - 2022
    N1  - https://doi.org/10.11648/j.ajcst.20220502.21
    DO  - 10.11648/j.ajcst.20220502.21
    T2  - American Journal of Computer Science and Technology
    JF  - American Journal of Computer Science and Technology
    JO  - American Journal of Computer Science and Technology
    SP  - 101
    EP  - 107
    PB  - Science Publishing Group
    SN  - 2640-012X
    UR  - https://doi.org/10.11648/j.ajcst.20220502.21
    AB  - AI has a variety of educational applications such as smart campuses, personalized learning platforms, teachers and students in assessment, and facial recognition systems. In this paper, we focus on the common threats in cyber space of education. An AI system inherits security threats of traditional computer system, therefore, cybersecurity protection mainly helps computer’s software and hardware, data store and transfer, as well as human activity. Therefore, we focus on the application of artificial intelligence technology to improve security protection and management capabilities in cyberspace security can further reduce the incidence of network failures and network attack accidents, and improve network system operation efficiency. We focus on the role of artificial intelligence and its applications through machine-learning systems. The general ways with the advancements of IT colleges and universities have adopted smart campus systems and they have become the mainstream. This paper introduces the design and implementation experience of a smart campus network, information security protection system, and points out that the implementation effects on providing teachers and students with a fast, safe, and reliable network. This environment makes teaching easier and students' learning more efficient. To this end, the article studies the role of artificial intelligence in cyber security, and hopes that this research can provide a scientific and reasonable reference for future related research.
    VL  - 5
    IS  - 2
    ER  - 

    Copy | Download

Author Information
  • Department of Information Technology, Mongolian National University, Ulaanbaatar, Mongolia

  • Department of Information Technology, Mongolian National University, Ulaanbaatar, Mongolia

  • Sections