Deep Learning Based Solution and Artificial Intelligence to Enhance Cyber Security

Main Article Content

Article Sidebar

Published Sep 2, 2021
Muhammad Afzal Nazim


Human cognitive processes are replicated by machines, in particular computer systems, and are known as artificial intelligence. An example of Artificial Intelligence applications includes expert-systems,language processing, voice recognition and machine learning. Artificial intelligence and cybersecurity have a wide variety of interdisciplinarities. The latest artificial intelligence breakthroughs have led to huge growth for cyber advocates and criminals. Cybersecurity experts enhance the safety of AI in the cyber environment via idea development. Cybercrimes used to launch cyber-attacks using Petri net formalizations, but today they employ sophisticated techniques, such as deep learning and machine learning, as technology progresses. The emphasis of this research is on AI and cyber safety as well as AI applications in many fields. First, the objective is to integrate AI with cyber security, ensuring that it can combat many attacks and not let a single attack successfully penetrate the security measures of systems. Then a thorough knowledge is described, along with programs such as the profound faith network, recurrent neural networks, and convolutionary neural networks, as one of the methods of defending against cyber assaults. Finally, it has been proven that AI is not limited to cyber security and is utilized in a range of industries, such as education, robotics, automation, and many more.

How to Cite

Nazim, M. A. . (2021). Deep Learning Based Solution and Artificial Intelligence to Enhance Cyber Security . SPAST Abstracts, 1(01). Retrieved from
Abstract 16 | PDF Version Download Downloads 5

Article Details

1. Achieving Efficient and Secure Data Acquisition for Cloud-Supported Internet of Things in Smart Grid. Guan, Z., Zhang, Y., Li, J., Wu, L., (2017). IEEE Internet of Things Journal, 4(6), 1934-1944. doi:10.1109/jiot.2017.2690522
2. Big Data Analysis-Based Secure Cluster Management for Optimized Control Plane in Software-Defined Networks. IEEE Transactions on Network and Service Management, Wu, J., Dong, M., Ota, & Guan, Z. (2018). 15(1), 27-38. doi:10.1109/tnsm.2018.2799000
3. Sinha, P., Rai& Bhushan, B. Information Security threats and attacks with conceivable counteraction. 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT). DOI: 10.1109/icicict46008.2019.8993384
4. Goyal, D., Jain, P.,Enhancement of Security using Various Web Development Frameworks. SSRN Electronic Journal. DOI:10.2139/ssrn.3600740
5. Use of Machine Learning algorithms for designing efficient cyber security solutions. 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control TechnologiesSoni, S., & Bhushan, B. (2019). (ICICICT). DOI: 10.1109/icicict46008.2019.8993253
6. Increasing web service availability by detecting application-layer DDoS attacks in encrypted traffic. Zolotukhin, M., Hamalainen, T.,& Siltanen, J. (2016). 2016 23rd International Conference on Telecommunications (ICT). doi:10.1109/ict.2016.7500408
7. Sil, R., Roy, A., Bhushan, B.,(2019). Artificial Intelligence and Machine Learning based Legal Application: The State-of-the-Art and Future Research Trends. 2019 International Conference on Computing, Communication, and Intelligent Systems. DOI: 10.1109/icccis48478.2019.8974479
GE3- Computers & Information Technology

Similar Articles

You may also start an advanced similarity search for this article.