{"title":"Adversarial Machine Learning","authors":"L. Reznik","doi":"10.1002/9781119771579.ch6","DOIUrl":"https://doi.org/10.1002/9781119771579.ch6","url":null,"abstract":"The chapter introduces novel adversarial machine learning attacks and the taxonomy of its cases, where machine learning is used against AI‐based classifiers to make them fail. It investigates a possible data corruption and quality decrease influence on the classifier performance. The module proposes data restoration procedures and other measures to protect against adversarial attacks. Generative adversarial networks are introduced, and their use is discussed. Multiple algorithm examples and use cases are included.","PeriodicalId":318786,"journal":{"name":"Intelligent Security Systems","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116932837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Firewall Design and Implementation","authors":"L. Reznik","doi":"10.1002/9781119771579.ch2","DOIUrl":"https://doi.org/10.1002/9781119771579.ch2","url":null,"abstract":"The chapter introduces firewalls and their design as the first line of defense mechanism. This chapter's goal is twofold: (i) to cover major aspects of the firewall design and operation for security professional education and (ii) explain how artificial intelligence and machine learning techniques and technologies are employed for enhancing firewalls and the security they provide. For the first goal, it provides the firewall definition, discusses the functions, possible architectures, and operational models concentrating on the presentation of their advantages and drawbacks. It includes the step‐by‐step guide to the firewall design and implementation process ranging from planning to deployment and maintenance. For the second goal, the chapter moves the reader from basic rules design to sophisticated AI and ML employment algorithms that improve it. The major emphasis is placed on using rules to set up, configure, and modify the firewall's policy. Both generic and specific rules are discussed as well as their formulation and editing with firewall tools. Substantial rules design principles and conflict avoidance and resolution are presented. The modern AI‐based developments are presented at the end.","PeriodicalId":318786,"journal":{"name":"Intelligent Security Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125210644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Malware and Vulnerabilities Detection and Protection","authors":"L. Reznik","doi":"10.1002/9781119771579.ch4","DOIUrl":"https://doi.org/10.1002/9781119771579.ch4","url":null,"abstract":"The chapter discusses malware types, its detection and recognition techniques and tools. It provides and extensive classification of various malware and virus families, discusses their taxonomy, basic composition and comparison between them. Beyond pure malware examples, it reviews spam and software vulnerabilities too. Multiple real life cases and examples are provided. Then it moves to presenting malware detection principles, algorithms and techniques, as well as anti‐malware tools and technologies. Their examples and use cases are included.","PeriodicalId":318786,"journal":{"name":"Intelligent Security Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123809359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computer Security with Artificial Intelligence, Machine Learning, and Data Science Combination","authors":"L. Reznik","doi":"10.1002/9781119771579.ch1","DOIUrl":"https://doi.org/10.1002/9781119771579.ch1","url":null,"abstract":"The chapter discusses the basic concepts of computer security as well as the taxonomy and classification of the fundamental algorithms in the domains of artificial intelligence, machine learning, and data science in relation to their applications in computer security. It reviews the sources of security threats and the attacks, using the area of IoT and wireless devices as an example, as well as examines the possible protection mechanisms and tools. The module provides a general classification of intelligent approaches and their relationship to various computer security fields. It focuses on an introduction of the major intelligent techniques and technologies in computer security, such as expert systems, fuzzy logic, machine learning, artificial neural networks, and genetic algorithms. While presenting multiple techniques, the text emphasizes their advantage in comparison to each other as well as the obstacles in their further progress. Short algorithm descriptions and code examples are included.","PeriodicalId":318786,"journal":{"name":"Intelligent Security Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128041296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}