Development and problems in using artificial intelligence in the information security
Authors: Volodin A.A., Glinskaya E.V. | |
Published in issue: #2(91)/2024 | |
DOI: | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security |
|
Keywords: artificial intelligence, machine learning, information security, classified information protection, audit, monitoring, risk management, vulnerability identification, threat prevention |
|
Published: 01.05.2024 |
The paper presents a general overview and analysis of the artificial intelligence (AI) capabilities, as well as of various programs and applications that are using neural networks to ensure confidentiality, integrity and availability of the protected information stored in devices. It provides future dynamics and further prospects to design and development the AI segment. Analysis of the modern software solutions demonstrates that AI is playing an important role in fighting against the modern information threats. Despite this, attackers and hackers are able to use neural networks in the cyber-attacks to gain access to the critical information. In general, introduction of the latest AI technologies in the information security systems of large companies and organizations would help to significantly reduce costs, increase efficiency of the resources use, and optimize the information security processes. Moreover, using the neural networks to protect critical information would significantly increase the speed of malware detection and analysis at the endpoints and in various web applications.
References
[1] Tsaunit A.N. Prospects for the development and application of neural networks. Young Scientist, 2021, no. 23 (365), pp. 114–117. (In Russ.). URL: https://moluch.ru/archive/365/81791/ (accessed 09.02.2024).
[2] Zhuravlev D.V., Smolin V.S. The neural network revolution of artificial intelligence and its development options. Designing the future. The problems of digital reality. 6th International Conference: sb. tr. Moscow, IPM named after M.V. Keldysh, 2023, pp. 223–244. (In Russ.). https://doi.org/10.20948/future-2023-16/
[3] Smirnov A.V. Machine learning and data analysis in cybersecurity. Moscow, Binom, 2018. (In Russ.).
[4] Semenova A.N., Stupkina V.A. Digital technologies in human resource management. Young Scientist, 2019, no. 4 (242), pp. 250–252. (In Russ.). URL: https://moluch.ru/archive/242/55864 / (accessed 09.02.2024).
[5] Romanov D.V., Karpov A.S. Application of machine learning methods for threat detection in information systems. Computer tools in Education, 2020, vol. 13, no. 4, pp. 153–165. (In Russ.).
[6] Piletskaya A.V. Artificial intelligence and big data. Young Scientist, 2019, no. 50 (288), pp. 20–22. (In Russ.). URL: https://moluch.ru/archive/288/65241/ (accessed 09.02.2024).
[7] Nikolaeva E.A., Shirokov M.P. Application of neural networks in problems of anomaly detection in computer networks. Moscow, Book World, 2017. (In Russ.).
[8] Nikitin A.A., Limanova N.I. The process of image recognition by a neural network. Young Scientist, 2020, no. 47 (337), pp. 23–25. (In Russ.). URL: https://moluch.ru/archive/337/75420/ (accessed 09.02.2024).
[9] Chernov A.A., Gorbunov V.V. Analysis and prevention of threats in computer networks using machine learning algorithms. Computer Research and Modeling, 2021, vol. 13, no. 1, pp. 63–72. (In Russ.).
[10] Belova M.S. Artificial intelligence in the analysis of big data. Bulletin of the Plekhanov Russian University of Economics. Introduction. The Path to Science, 2021, vol. 11, no. 4 (36), pp. 136–141. (In Russ.). EDN: GJTTEU
[11] Zaentsev I.V. Neural networks: basic models. Voronezh, VSU, 1999, 76 p. (In Russ.).
[12] Britvina P.V. Ethical issues in the application of artificial intelligence and machine learning. Bulletin of Science, 2024, vol. 4, no. 1 (70), pp. 445–447. (In Russ.).
[13] Kotelnikov E.V., Kolevatov V.Yu. Methods of artificial intelligence in the tasks of ensuring the security of computer networks. URL: https://www.studmed.ru/kolevatov-v-yu-kotelnikov-e-v-metody-iskusstvennogo-intellekta-v-zadachah-obespecheniya-bezopasnosti-kompyuternyh-setey_7f6701b2095.html (accessed 09.02.2024).
[14] Pisarenko I.B. Neural network technologies in security. Information Security, 2009, no. 4. (In Russ.).
[15] Namiot D.E., Ilyushin E.A., Chizhov I.V. Artificial intelligence and cybersecurity. International Journal of Open Information Technologies, 2022, no. 9, pp. 135–144. (In Russ.).