Application of Artificial Intelligence for real-time cybersecurity threat identification and resolution for network vulnerabilities in the cloud
Motivation: Artificial Intelligence (AI) is an embedded technology, based off of the current infrastructure (i.e. supercomputers), big data, and machine learning algorithms (Cyranoski, 2015; Power, 2015). AI can make use of data hidden in “dark wells” and silos, where the end-user had no idea that the data even existed, to begin with (Power, 2015). The goal of AI is to use huge amounts of data to draw out a set of rules through machine learning that will effectively supplement cyber security experts in identifying and remediating cyberattacks (Cringely, 2013; Power, 2015).
Problem statement: Must consider an attacker’s choices are unknown, if they will be successful in their targets and goals and the physical paths for an attack in the explicit and abstract form, which are hard to do without the use of big data analysis coupled with AI for remediation.
- Null: The use of Bayesian Networks and AI cannot be used for both identification and remediation of cyber-attacks that deal with the network infrastructure on a cloud environment.
- Alternative: The use of Bayesian Networks and AI can be used for both identification and remediation of cyber-attacks that deal with the network infrastructure on a cloud environment.
- New contribution made to the body of knowledge by your proposed solution: The merging of these two technologies can be a first line of defense that can work 24×7 and learn new remediation and identification techniques as time moves forward.
2 research questions:
- Can the merger of Bayesian Networks and AI be used for both identification and remediation of cyber-attacks that deal with the network infrastructure on a cloud environment? –> This is just based off of the hypothesis.
- Can the use of Bayesian Networks and AI can be used for both identification and remediation of cyber-attacks that deal with multiple network attacks from various white hat hackers at the same time? –> This is taken from real life. A fortune 500 company is constantly bombarded with thousand if not millions of attempted cyber attackers at a given day. If there is a vulnerability found, it might result in multiple people entering in through that vulnerability and doing serious damage. Could this proposed system handle multiple attacks coming right at the cloud network infrastructure? Essentially providing practitioners some tangible results.
- Cringely, R. X. (2013). Big Data is the new Artificial Inteligence. Betanews. Retrieved from http://betanews.com/2014/04/16/big-data-is-the-new-artificial-intelligence/
- Cyranoski, D. (2015). Exclusive: Genomics Pioneer Jun Wang on his new AI venture. Nature. Retrieved from http://www.nature.com/news/exclusive-genomics-pioneer-jun-wang-on-his-new-ai-venture-1.18091
- Power, B. (2015). Artificial Intelligence is almost ready for business. Harvard Business Review. Retrieved from https://hbr.org/2015/03/artificial-intelligence-is-almost-ready-for-busines