Ιδρυματικό Αποθετήριο
Πολυτεχνείο Κρήτης
EN  |  EL

Αναζήτηση

Πλοήγηση

Ο Χώρος μου

Survivability using Artificial Intelligence assisted cyber risk warning

Doukas Nikolaos, Stavroulakis Petros, Kharchenko, Vyacheslav‏, Bardis Nikolaos, Irakleous Dimitrios, Ivanchenko Oleg, Morozova Olga

Πλήρης Εγγραφή


URI: http://purl.tuc.gr/dl/dias/3C525415-63D5-454C-A5B3-FC1DD83A98D1
Έτος 2022
Τύπος Κεφάλαιο σε Βιβλίο
Άδεια Χρήσης
Λεπτομέρειες
Βιβλιογραφική Αναφορά N. Doukas, P. Stavroulakis, V. Kharchenko, N. Bardis, D. Irakleous, O. Ivanchenko and O. Morozova, “Survivability using Artificial Intelligence assisted cyber risk warning,” in Artificial Intelligence for Cybersecurity, Advances in Information Security, Cham, Switzerland: Springer, 2022, pp. 285–308, doi: 10.1007/978-3-030-97087-1_12. https://doi.org/10.1007/978-3-030-97087-1_12
Εμφανίζεται στις Συλλογές

Περίληψη

The dependence of everyday human endeavours to information systems of different sorts is continuously increasing, simultaneously as important activities such as work and healthcare are evolving so as to exploit the capabilities of computers and networks. At the same time, malicious cyber activities are becoming ever more often and more destructive as criminals also exploit technological progress. In this context, the necessity for system survivability is becoming more important than expecting that computer system security will avert all possible attacks. Artificial intelligence is a technology that is achieving maturity and contributing in a variety of applications. This chapter presents approaches for applying artificial technology schemes in order to promote survivability by detecting evidence of cyber attacks. This chapter presents three recently proposed schemes that detect such behavior in different contexts. The first scheme aims at the detection of threats within data from emails, programs and network traffic. The second scheme pursues the detection of unexpected system behavior by using a clone of the operational system. The third scheme is focusing on the use of redundant resources, such as those encountered in cloud computing schemes, and on the events following a cyber-attack that is already partially successful and affecting the pooled computing resources. The scheme can be used as a toolkit for preventing the negative effects of computer virus cyber-attacks and ensuring high availability for cloud pooled resources.

Υπηρεσίες

Στατιστικά