International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 50 - Issue 20 |
Published: July 2012 |
Authors: Dinesh Kumar Saini, Vikas Singh |
![]() |
Dinesh Kumar Saini, Vikas Singh . Soft Computing Techniques in Cyber Defense. International Journal of Computer Applications. 50, 20 (July 2012), 17-22. DOI=10.5120/7919-1217
@article{ 10.5120/7919-1217, author = { Dinesh Kumar Saini,Vikas Singh }, title = { Soft Computing Techniques in Cyber Defense }, journal = { International Journal of Computer Applications }, year = { 2012 }, volume = { 50 }, number = { 20 }, pages = { 17-22 }, doi = { 10.5120/7919-1217 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2012 %A Dinesh Kumar Saini %A Vikas Singh %T Soft Computing Techniques in Cyber Defense%T %J International Journal of Computer Applications %V 50 %N 20 %P 17-22 %R 10.5120/7919-1217 %I Foundation of Computer Science (FCS), NY, USA
Artificial intelligence is a technology to make the machines human compatible. Various techniques like- heuristic search (Generate and test, Hill climbing, BFS, DFS, Problem reduction, constraint satisfaction, means-ends analysis etc. ), game playing, understanding, planning, NLP, Learning, commonsense, predictions and actions, and expert systems are there to make the system intelligent. This paper primarily focuses on the problem of malicious objects in the cyber space and discusses the usage of different AI techniques to overcome the mentioned problem. Every day the information stored in the computer and the information in transit faces threats due to malicious objects which further leads to a big loss. This paper discusses the possibilities to incorporate the AI techniques to analyze the data and finding and restricting the malicious objects. To make a proactive cyber defense system how the system log can be explored to find the malicious object and how the AI techniques like heuristic search can help in this process is discussed. This paper also discusses about the uncertainty of attacks and gives some views to implement AI techniques such as probability and Bayes' theorem, certainty factors and rule based system, Bayesian networks, fuzzy logic etc.