4.6 Article

Artificial intelligence in cyber security: research advances, challenges, and opportunities

Journal

ARTIFICIAL INTELLIGENCE REVIEW
Volume 55, Issue 2, Pages 1029-1053

Publisher

SPRINGER
DOI: 10.1007/s10462-021-09976-0

Keywords

Cyber Security; Artificial Intelligence; Security Methods; Human-in-the-Loop

Funding

  1. National Natural Science Foundation of China [61872038]
  2. Cloud Technology Endowed Professorship

Ask authors/readers for more resources

This paper reviews the applications of artificial intelligence in cybersecurity, such as user access authentication, network situation awareness, dangerous behavior monitoring, and abnormal traffic identification. It also proposes a conceptual human-in-the-loop intelligence cybersecurity model based on identified limitations and challenges.
In recent times, there have been attempts to leverage artificial intelligence (AI) techniques in a broad range of cyber security applications. Therefore, this paper surveys the existing literature (comprising 54 papers mainly published between 2016 and 2020) on the applications of AI in user access authentication, network situation awareness, dangerous behavior monitoring, and abnormal traffic identification. This paper also identifies a number of limitations and challenges, and based on the findings, a conceptual human-in-the-loop intelligence cyber security model is presented.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Management

From puzzles to portraits: Enhancing situation awareness during natural disasters using a design science approach

Naga Vemprala, Charles Liu, Kim-Kwang Raymond Choo

Summary: During emergency situations, it is challenging to process and summarize a large volume of social media messages to improve situation awareness. This study presents a streamlined protocol that uses clustering and text summarization algorithms to derive informative summaries from millions of social media messages.

DECISION SCIENCES (2023)

Article Computer Science, Hardware & Architecture

LIGHT: Lightweight Authentication for Intra Embedded Integrated Electronic Systems

Xuru Li, Daojing He, Yun Gao, Ximeng Liu, Sammy Chan, Manghan Pan, Kim-Kwang Raymond Choo

Summary: As embedded integrated electronic systems (EIESs) become more prevalent, the need for secure data exchange in such systems becomes crucial. Designing secure authentication protocols for different embedded systems with varying communication modes is a challenge. This paper presents a lightweight authenticated key-exchange (AKE) protocol for EIESs, designed for resource-constrained devices with minimal interactions. The protocol's security is proven, and a strategy for selecting security parameters based on empirical evaluations is provided. Efficiency analysis demonstrates effective deployment of the protocol in the EIESs environment.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2023)

Article Computer Science, Information Systems

Preserving data privacy in federated learning through large gradient pruning

Zhiqiu Zhang, Zhu Tianqing, Wei Ren, Ping Xiong, Kim-Kwang Raymond Choo

Summary: In federated learning, a global learning model is trained by the server using gradient information shared by multiple clients to protect client data privacy. However, it has been shown that training data can be reconstructed from shared gradients, leading to privacy breaches. This paper proposes two pruning-based defense mechanisms to prevent privacy leaks in the image reconstruction process and demonstrates their effectiveness on various model architectures and datasets.

COMPUTERS & SECURITY (2023)

Article Computer Science, Hardware & Architecture

A Blockchain-Based Decentralized, Fair and Authenticated Information Sharing Scheme in Zero Trust Internet-of-Things

Yizhi Liu, Xiaohan Hao, Wei Ren, Ruoting Xiong, Tianqing Zhu, Kim-Kwang Raymond Choo, Geyong Min

Summary: This paper proposes an innovative blockchain-enabled information sharing solution in zero-trust context, which guarantees anonymity, entity authentication, data privacy, trustworthiness, participant stimulation, and fairness. The solution supports filtering of fabricated information through smart contracts, effective voting, and consensus mechanisms, preventing unauthenticated participants from sharing garbage information.

IEEE TRANSACTIONS ON COMPUTERS (2023)

Article Computer Science, Hardware & Architecture

Dynamic Authenticated Asymmetric Group Key Agreement With Sender Non-Repudiation and Privacy for Group-Oriented Applications

Rui Zhang, Lei Zhang, Kim-Kwang Raymond Choo, Tong Chen

Summary: In this article, a one-round dynamic authenticated asymmetric group key agreement with sender non-repudiation and privacy (DAAGKAwSNP) protocol is proposed. The protocol utilizes a batch multi-signature scheme and achieves secrecy under chosen ciphertext attacks. The performance of DAAGKAwSNP is evaluated to demonstrate its utility.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2023)

Article Computer Science, Information Systems

Achieving Lightweight and Privacy-Preserving Object Detection for Connected Autonomous Vehicles

Renwan Bi, Jinbo Xiong, Youliang Tian, Qi Li, Kim-Kwang Raymond Choo

Summary: This article proposes a privacy-preserving object detection framework for connected autonomous vehicles (CAVs) to protect the privacy of images captured by onboard sensors. By leveraging edge computing, CAVs split and upload images to two noncollusive edge servers, which cooperatively detect objects without exposing sensitive information. The experimental findings demonstrate the effectiveness of the framework in protecting the privacy of image objects for CAVs.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Information Systems

2DF-IDS: Decentralized and differentially private fe derate d learning-based intrusion detection system for industrial IoT

Othmane Friha, Mohamed Amine Ferrag, Mohamed Benbouzid, Tarek Berghout, Burak Kantarci, Kim-Kwang Raymond Choo

Summary: In this paper, a secure, decentralized, and differentially private FL-based IDS (2DF-IDS) is proposed to secure smart industrial facilities. The system utilizes a key exchange protocol, a differentially private gradient exchange scheme, and a decentralized FL approach to achieve high-performance intrusion detection in industrial IoT systems.

COMPUTERS & SECURITY (2023)

Article Engineering, Multidisciplinary

A Survey on Redactable Blockchain: Challenges and Opportunities

Tao Ye, Min Luo, Yi Yang, Kim-Kwang Raymond Choo, Debiao He

Summary: This survey article focuses on designing redactable blockchain-based solutions. While immutability is essential for blockchain, it can also be misused to disseminate illicit content and violate privacy regulations like GDPR. The article surveys the existing literature on redactable blockchain, discusses limitations and challenges, and highlights future research opportunities.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2023)

Article Computer Science, Information Systems

Family locating sharing app forensics: Life360 as a case study

Posie Aagaard, Bijan Dinyarian, Omar Abduljabbar, Kim-Kwang Raymond Choo

Summary: Smartphones and mobile apps are widely used worldwide, including family locator apps. These apps allow users to share their location with others to ensure the safety of their loved ones. This article focuses on Life360 and demonstrates the types of forensic artifacts and sensitive data that can be acquired using commercial and open source tools from the app on iOS and Android devices.

FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION (2023)

Article Computer Science, Artificial Intelligence

Forecasting call center arrivals using temporal memory networks and gradient boosting algorithm

Henry Chacon, Vishwa Koppisetti, David Hardage, Kim-Kwang Raymond Choo, Paul Rad

Summary: For call center facilities, accurately forecasting the number of call arrivals is crucial for customer satisfaction and budget management. This study compares classical time series methods with machine/deep learning techniques to forecast call arrival, using real-life call logs from a national US insurance company. The results show that deep learning models perform well in short-term periods with enough seasonal data, but boosting approach outperforms all models, including deep learning, in long-term periods. These findings highlight the importance of considering limited seasonality and the use of benchmark approaches for call arrival forecasting.

EXPERT SYSTEMS WITH APPLICATIONS (2023)

Article Computer Science, Theory & Methods

ALPS: Achieving accuracy-aware location privacy service via assisted regions

Shaobo Zhang, Tao Guo, Qin Liu, Entao Luo, Kim-Kwang Raymond Choo, Guojun Wang

Summary: This paper proposes an accuracy-aware location privacy service, named ALPS, based on assisted regions to protect user location privacy while ensuring the accuracy of services. Two novel mechanisms (assisted regions mechanism and query obfuscation mechanism) are devised to protect user location privacy and ensure the accuracy of LSSs based on trilateration. Theoretical analysis and experimental evaluation demonstrate that our scheme can protect location privacy without compromising the accuracy of LSSs.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2023)

Article Computer Science, Theory & Methods

Efficient Privacy-Preserving Spatial Range Query Over Outsourced Encrypted Data

Yinbin Miao, Yutao Yang, Xinghua Li, Zhiquan Liu, Hongwei Li, Kim-Kwang Raymond Choo, Robert H. H. Deng

Summary: With the rapid development of Location-Based Services (LBS), the security issues such as location privacy leakage have become a concern. In this study, an efficient Privacy-preserving Spatial Range Query (PSRQ) scheme is proposed by combining Geohash algorithm with Circular Shift and Coalesce Bloom Filter (CSC-BF) framework and Symmetric-key Hidden Vector Encryption (SHVE). Additionally, a Confused Bloom Filter (CBF) is designed to confuse the inclusion relationship in Bloom filter, and a more secure and practical enhanced scheme PSRQ+ is proposed. The experimental results show significant improvement in query efficiency compared with previous solutions.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Computer Science, Information Systems

Regulatable and Hardware-Based Proof of Stake to Approach Nothing at Stake and Long Range Attacks

Xiaoqin Feng, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo

Summary: We propose a proof-of-hardware-stake (PohS) consensus mechanism and a regulatory mechanism based on a consortium blockchain to address the vulnerabilities of existing PoS protocols. Our design is secure against adversarial stakes less than 51% and is proven to be efficient compared to Ethereum and Ouroboros through simulations.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2023)

Article Computer Science, Theory & Methods

Secure Model-Contrastive Federated Learning With Improved Compressive Sensing

Yinbin Miao, Wei Zheng, Xinghua Li, Hongwei Li, Kim-Kwang Raymond Choo, Robert H. Deng

Summary: This paper proposes a secure Model-Contrastive Federated Learning with improved Compressive Sensing (MCFL-CS) scheme to address the issues of data heterogeneity and communication burdens in existing methods.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Engineering, Civil

Blockchain-Based Privacy-Preserving Positioning Data Sharing for IoT-Enabled Maritime Transportation Systems

Keke Gai, Haokun Tang, Guangshun Li, Tianxiu Xie, Shuo Wang, Liehuang Zhu, Kim-Kwang Raymond Choo

Summary: This paper highlights the importance of data-driven applications in modern maritime transportation systems, particularly in communication and safety decision-making. The authors propose using blockchain to protect privacy and ensure data accuracy, and evaluate the security and performance of their approach.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

No Data Available