Cyber & IT Supervisory Forum - Additional Resources

ARTIFICIAL INTELLIGENCE AND CYBERSECURITY RESEARCH

Furthermore, new data needs to be incorporated into the dictionary for future reference and manual analysis. Table 4 below summarises possible uses of AI techniques for detection of threats and intrusion.

Table 5: AI applications for the detection of threats and intrusion (source: authors’ elaboration)

Task Examples of AI techniques

Spam detection SVM, DT

Intrusion detection Supervised and unsupervised approaches, bio-inspired algorithms

Malware detection Standard ML classifiers, DL

Attack detection SVM, DT

22

Made with FlippingBook Annual report maker