Cyber & IT Supervisory Forum - Additional Resources
ARTIFICIAL INTELLIGENCE AND CYBERSECURITY RESEARCH
Furthermore, new data needs to be incorporated into the dictionary for future reference and manual analysis. Table 4 below summarises possible uses of AI techniques for detection of threats and intrusion.
Table 5: AI applications for the detection of threats and intrusion (source: authors’ elaboration)
Task Examples of AI techniques
Spam detection SVM, DT
Intrusion detection Supervised and unsupervised approaches, bio-inspired algorithms
Malware detection Standard ML classifiers, DL
Attack detection SVM, DT
22
Made with FlippingBook Annual report maker