Leveraging Artificial Intelligence Capabilities for Real-Time Monitoring of Cybersecurity Threats

Edited book (chapter)


Karie, Nickson M., Bin Sahri, Nor Masri Bin, Yang, Wencheng and Johnstone, Michael N.. 2022. "Leveraging Artificial Intelligence Capabilities for Real-Time Monitoring of Cybersecurity Threats." Ahmed, Mohiuddin, Islam, Sheikh Rabiul, Anwar, Adnan, Moustafa, Nour and Pathan, Al-Sakib Khan (ed.) Explainable Artificial Intelligence for Cyber Security: Next Generation Artificial Intelligence. Cham, Switzerland. Springer. pp. 141-169
Chapter Title

Leveraging Artificial Intelligence Capabilities for Real-Time Monitoring of Cybersecurity Threats

Book Chapter CategoryEdited book (chapter)
ERA Publisher ID3337
Book TitleExplainable Artificial Intelligence for Cyber Security: Next Generation Artificial Intelligence
AuthorsKarie, Nickson M. (Author), Bin Sahri, Nor Masri Bin (Author), Yang, Wencheng (Author) and Johnstone, Michael N. (Author)
EditorsAhmed, Mohiuddin, Islam, Sheikh Rabiul, Anwar, Adnan, Moustafa, Nour and Pathan, Al-Sakib Khan
Volume1025
Page Range141-169
SeriesStudies in Computational Intelligence
Chapter Number7
Number of Pages29
Year2022
PublisherSpringer
Place of PublicationCham, Switzerland
ISBN9783030966294
9783030966300
ISSN1860-949X
1860-9503
Digital Object Identifier (DOI)https://doi.org/10.1007/978-3-030-96630-0_7
Web Address (URL)https://link.springer.com/chapter/10.1007/978-3-030-96630-0_7
Abstract

The number of cybersecurity incidents perpetrated by adversaries using modern complex and emerging technologies is growing exponentially. To curb this threat, advanced countermeasures need to be developed and implemented to mitigate cybersecurity incidents and detect the activities of adversaries. Developing advanced, innovative, and effective countermeasures is a challenge when faced with a daily tide of cybersecurity threats and concomitant vulnerabilities which, in most cases, have significant consequences to organisations. Artificial Intelligence (AI), which has specific, established use-cases in the cybersecurity domain offers promising solutions. This chapter examines how AI can enhance the real-time monitoring of cybersecurity threats in different environments. As a result, different cybersecurity threats, as well as commonly exploited cybersecurity vulnerabilities, are described and discussed in this chapter. Following this, some current real-time cybersecurity monitoring tools are discussed. Finally, the chapter highlights the role of AI in real-time monitoring focusing on how Explainable Artificial Intelligence (XAI) can be used to enhance real-time monitoring of cybersecurity threats which has become a crucial component of modern-day security implementations.

KeywordsCyber security threats; Real-time monitoring; Artificial intelligence
ANZSRC Field of Research 2020460904. Information security management
Public Notes

Files associated with this item cannot be displayed due to copyright restrictions.

Byline AffiliationsEdith Cowan University
Journal TitleStudies in Computational Intelligence
Institution of OriginUniversity of Southern Queensland
Permalink -

https://research.usq.edu.au/item/q7v4v/leveraging-artificial-intelligence-capabilities-for-real-time-monitoring-of-cybersecurity-threats

  • 64
    total views
  • 3
    total downloads
  • 2
    views this month
  • 0
    downloads this month

Export as

Related outputs

UAV Control Method Combining Reptile Meta-Reinforcement Learning and Generative Adversarial Imitation Learning
Jiang, Shui, Ge, Yanning, Yang, Xu, Yang, Wencheng and Cui, Hui. 2024. "UAV Control Method Combining Reptile Meta-Reinforcement Learning and Generative Adversarial Imitation Learning." Future Internet. 16 (3). https://doi.org/10.3390/fi16030105
Evaluating Cryptocurrency Market Risk on the Blockchain: An Empirical Study Using the ARMA-GARCH-VaR Model
Huang, Yongrong, Wang, Huiqing, Chen, Zhide, Feng, Chen, Zhu, Kexin, Yang, Xu and Yang, Wencheng. 2024. "Evaluating Cryptocurrency Market Risk on the Blockchain: An Empirical Study Using the ARMA-GARCH-VaR Model." IEEE Open Journal of the Computer Society. 5, pp. 83-94. https://doi.org/10.1109/OJCS.2024.3370603
Feature extraction and learning approaches for cancellable biometrics: A survey
Yang, Wencheng, Wang, Song, Hu, Jiankun, Tao, Xiaohui and Li, Yan. 2024. "Feature extraction and learning approaches for cancellable biometrics: A survey." CAAI Transactions on Intelligence Technology. 9 (1), pp. 4-25. https://doi.org/10.1049/cit2.12283
An Adaptive Feature Fusion Network for Alzheimer’s Disease Prediction
Wei, Shicheng, Li, Yan and Yang, Wencheng. 2023. "An Adaptive Feature Fusion Network for Alzheimer’s Disease Prediction." 12th International Conference on Health Information Science (HIS 2023). Melbourne, Australia 23 - 24 Oct 2023 Germany. https://doi.org/10.1007/978-981-99-7108-4
A Review of Homomorphic Encryption for Privacy-Preserving Biometrics
Yang, Wencheng, Wang, Song, Cui, Hui, Tang, Zhaohui and Li, Yan. 2023. "A Review of Homomorphic Encryption for Privacy-Preserving Biometrics." Sensors. 23 (7). https://doi.org/10.3390/s23073566
Hybrid KD-NFT: A multi-layered NFT assisted robust Knowledge Distillation framework for Internet of Things
Wang, Nai, Chen, Junjun, Wu, Di, Yang, Wencheng, Xiang, Yong and Sajjanhar, Atul. 2023. "Hybrid KD-NFT: A multi-layered NFT assisted robust Knowledge Distillation framework for Internet of Things." Journal of Information Security and Applications. 75. https://doi.org/10.1016/j.jisa.2023.103483
A review of multi-factor authentication in the Internet of Healthcare Things
Suleski, Tance, Ahmed, Mohiuddin, Yang, Wencheng and Wang, Eugene. 2023. "A review of multi-factor authentication in the Internet of Healthcare Things." Digital Health. 9, pp. 1-20. https://doi.org/10.1177/20552076231177144
Token-Based Biometric Enhanced Key Derivation for Authentication Over Wireless Networks
Cui, Hui, Yang, Xuechao, Yang, Wencheng, Qin, Baodong and Yi, Xun. 2023. "Token-Based Biometric Enhanced Key Derivation for Authentication Over Wireless Networks." IEEE Transactions on Network Science and Engineering. 10 (4), pp. 2347-2357. https://doi.org/10.1109/TNSE.2023.3246439
A Secure Online Fingerprint Authentication System for Industrial IoT Devices over 5G Networks
Bedari, Aseel, Wang, Song and Yang, Wencheng. 2022. "A Secure Online Fingerprint Authentication System for Industrial IoT Devices over 5G Networks." Sensors. 22 (19), pp. 1-16. https://doi.org/10.3390/s22197609
Multimedia security and privacy protection in the internet of things: research developments and challenges
Yang, Wencheng, Wang, Song, Hu, Jiankun and Karie, Nickson M.. 2022. "Multimedia security and privacy protection in the internet of things: research developments and challenges." International Journal of Multimedia Intelligence and Security. 4 (1), pp. 20-46. https://doi.org/10.1504/ijmis.2022.121282
A linear convolution-based cancelable fingerprint biometric authentication system
Yang, Wencheng, Wang, Song, Kang, James Jin, Johnstone, Michael N. and Bedari, Aseel. 2022. "A linear convolution-based cancelable fingerprint biometric authentication system." Computers and Security. 114, pp. 1-14. https://doi.org/10.1016/j.cose.2021.102583
A Review on Security Issues and Solutions of the Internet of Drones
Yang, Wencheng, Wang, Song, Yin, Xuefei, Wang, Xu and Hu, Jiankun. 2022. "A Review on Security Issues and Solutions of the Internet of Drones." IEEE Open Journal of the Computer Society. 3, pp. 96-110. https://doi.org/10.1109/OJCS.2022.3183003
Network Forensics in the Era of Artificial Intelligence
Yang, Wencheng, Johnstone, Michael N., Wang, Song, Karie, Nickson M., Bin Sahri, Nor Masri and Kang, James Jin. 2022. "Network Forensics in the Era of Artificial Intelligence." Ahmed, Mohiuddin, Islam, Sheikh Rabiul, Anwar, Adnan, Moustafa, Nour and Pathan, Al-Sakib Khan (ed.) Explainable Artificial Intelligence for Cyber Security: Next Generation Artificial Intelligence. Cham, Switzerland. Springer. pp. 171-190