Neshat Elhami Fard;Rastko R. Selmic;Khashayar Khorasani
{"title":"A Review of Techniques and Policies on Cybersecurity Using Artificial Intelligence and Reinforcement Learning Algorithms","authors":"Neshat Elhami Fard;Rastko R. Selmic;Khashayar Khorasani","doi":"10.1109/MTS.2023.3306540","DOIUrl":null,"url":null,"abstract":"Cybersecurity is a critical process that safeguards networks, systems, and applications against cyber-attacks, wherein digital information is targeted for unauthorized access, manipulation, or destruction. As attackers continually evolve their tactics, addressing cybersecurity challenges has become paramount, especially in sensitive domains like the military and defense industries. This article delves into the challenges that artificial intelligence (AI) faces in the military domain, specifically focusing on defense applications. We review AI algorithms relevant to defense, examining their potential applications and benefits: much of this study revolves around cybersecurity in defense applications, particularly within cyber-physical systems (CPS). We explore reinforcement learning (RL) and deep RL (DRL) algorithms in CPS, aiming to enhance understanding of the cybersecurity implications in this domain. In this context, we present RL and DRL algorithms employed in cyber-attacks and their potential threats and vulnerabilities. Furthermore, we discuss how RL and DRL algorithms can be effectively leveraged for cyber-attack detection and defense applications, providing usable insights into bolstering CPS cybersecurity. By addressing both technical aspects and ethical considerations, this article offers a comprehensive view of the challenges and opportunities surrounding cybersecurity in defense applications.","PeriodicalId":55016,"journal":{"name":"IEEE Technology and Society Magazine","volume":null,"pages":null},"PeriodicalIF":2.1000,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Technology and Society Magazine","FirstCategoryId":"5","ListUrlMain":"https://ieeexplore.ieee.org/document/10260699/","RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0
Abstract
Cybersecurity is a critical process that safeguards networks, systems, and applications against cyber-attacks, wherein digital information is targeted for unauthorized access, manipulation, or destruction. As attackers continually evolve their tactics, addressing cybersecurity challenges has become paramount, especially in sensitive domains like the military and defense industries. This article delves into the challenges that artificial intelligence (AI) faces in the military domain, specifically focusing on defense applications. We review AI algorithms relevant to defense, examining their potential applications and benefits: much of this study revolves around cybersecurity in defense applications, particularly within cyber-physical systems (CPS). We explore reinforcement learning (RL) and deep RL (DRL) algorithms in CPS, aiming to enhance understanding of the cybersecurity implications in this domain. In this context, we present RL and DRL algorithms employed in cyber-attacks and their potential threats and vulnerabilities. Furthermore, we discuss how RL and DRL algorithms can be effectively leveraged for cyber-attack detection and defense applications, providing usable insights into bolstering CPS cybersecurity. By addressing both technical aspects and ethical considerations, this article offers a comprehensive view of the challenges and opportunities surrounding cybersecurity in defense applications.
期刊介绍:
IEEE Technology and Society Magazine invites feature articles (refereed), special articles, and commentaries on topics within the scope of the IEEE Society on Social Implications of Technology, in the broad areas of social implications of electrotechnology, history of electrotechnology, and engineering ethics.