SlideShare a Scribd company logo
1 of 15
By,
MOHAMMED SAQIB
1GC11EE018
Dept of EEE
GCE,Ramanagaram
AN OVERVIEW ON USE OF
ARTIFICIAL INTELLIGENCE
TECHNIQUES
IN
EFFECTIVE SECURITY MANAGEMENT
Under The Guidance of
Mr.Aejaz Ahmed KR
Asst. Professor
What is
Artificial Intelligence[AI]…???
 The artificial intelligence is the process in which
machine can act like a human
 AI techniques gives rise to important applications
where human processing ability weakens
 Some of the field where AI is massively used are
Military, Antiterrorism, Automobile Industry,
Internet Search Engines and Robotics, Speech
recognition, Expert & fuzzy system etc.,
 The central goals of AI research
include reasoning, knowledge, planning, learning,
natural language processing
(communication),perception and the ability to
move and manipulate objects.
 General intelligence is still among the field's long-
term goals.
Artificial Intelligence & Security
 Nowadays Security is the important issue for Human,
Company Environment, Organization, Community and
Country in accordance to maintain growth and stability
 Security threat gives rise to several problems such as
instability, economical setbacks, terror attacks causes loss of
human lives, creates Un-safety feelings.
 As a human being, the security is challenging task because
human has several restriction on analyzing and processing
several information at a time. This is big drawback is
identified in current security system.
 This drawback can overcome on more practical manner with
the help of artificial intelligence techniques integration. The
security system includes Homeland security, Intrusion
detection system, DOS attack, Cryptography, Video vigilance
System etc. Human Processing ability integrated with AI
certainly raise the security at high extend.
 Formal Security System
 Security System based on Artificial
Intelligence
Different AI techniques used in
Security Management System
 Artificial Neural Networks.
 Data Mining Tools.
 Pattern Recognition.
 Image Processing/Analysis.
 Fuzzy Logic.
 Expert System.
Artificial Neural Networks
 Artificial Neural Networks is an effective
technique which has the ability to implement
security using back-propagation algorithm.
Simple combinational logic and sequential
machine can be well implemented using back-
propagation algorithm.
 They are programs designed to solve any
problem by trying to mimic the structure and
the function of our nervous system
 They are based on simulated neurons which
are joined together in variety of ways to form
networks
A Simple Biological neuron
 The fundamental processing
element of a neural network is
a neuron. Basically, a
biological neuron receives
inputs from other sources,
combines them in some way,
performs a generally nonlinear
operation on the result, and
then outputs the final result
Inputs
w2
w1
w3
wn
wn-1
.
.
.
x1
x2
x3
…
xn-1
xn
y
)(;
1
zHyxwz
n
i
ii  
Artificial Neuron
ANN-Applications
 It involves Human like thinking
 They can handle noisy or missing data
 They can work with large number of variables
or parameters
 They deal with the non-linearity of the world
which we live in.
Fuzzy Rule Based Expert System
for Cyber Security
 Stage 1: Defining
Cyber Security Expert
System Variables
 Stage 2: Data
Collection for Cyber
Terrorism
 Stage 3: System
Design
 Stage 4:Fuzzy Rule
Based Model
 Implementation
Steps Involved
Advantages & Disadvantages of various AI
TechniquesAI Techniques Advantages Disadvantages
Artificial Neural Networks •Adapt to unknown
situations
•Robust, able to model complex
functions.
•Easy to use.
•Training of neural network
•Not exact
•Complexity of the network
structure
Data Mining •Help with decision
making
•find out exact information from
vast amount of data
•User privacy/security
is critical issue
•Misuse of information
•Accuracy of data
Pattern Recognition •Quick and Accurate
•Recognize & Classify
unfamiliar objects
•Reliability of result depends
on input
Fuzzy Logic •The algorithms can be
described with little data, so
little memory is required.
•Fuzzy algorithms are often
robust.
•They are not very sensitive
to changing environments
and erroneous or forgotten
rules
Expert System •Provides consistent
answers for repetitive decisions,
processes and tasks
•Can work round the clock
•Cannot adapt to
changing environments,
unless knowledge base is
changed
INTELLIGENT SYSTEM FOR
INFORMATION SECURITY
MANAGEMENT
ISISM ARCHITECTURE AI techniques can be used in building intelligent
models to improve the information security
management, intrusion detection and prevention
capabilities, efficiency of security event
management, and decision making
 Efficient information security management
requires an intelligent system that supports
security event management approach with
enhanced real-time capabilities, adaptation, and
generalization to predict possible attacks and to
support human’s actions.
 ISISM ARCHITECTURE IS USED FOR THIS
PURPOSE
ISISM Architecture
Proposed Meystel & Albus
 Intelligent system has 2 parts
 Internal or Computational
 Sensory processing
 world modeling
 Decision making module
 value judgment module
 External or Interfacing
Other Fields where AI is used
1. Engineering
2. Artificial life
3. Automated reasoning
4. Automation
5. Biologically inspired computing
6. Concept mining
7. Data mining
8. Knowledge representation
9. Semantic Web
10. E-mail spam filtering
11. Artificial Creativity
12. Game theory and Strategic planning
And Many more………..
Conclusion
 As Security is key important issues, the integration
Artificial Intelligence Techniques certainly improve the
performance of the existing security system
 System alerts the user before unwanted hazards are
yet to happen
 The system constructs an intelligent image processing
technology which can identify the license plate and
human face. This is the essential as far as the terror
attacks are concerned
 Reduces human effort
 Man power required for the security purpose can be
reduced, as once the successful security system with
AI is designed, it can be used for longer duration.
 Drawback-Some are Expensive
BE-EEE-8th sem-Presentation Artificial intelligence in security managenent

More Related Content

What's hot

artificial intelligence
artificial intelligenceartificial intelligence
artificial intelligence
vallibhargavi
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
Mayank Saxena
 

What's hot (20)

artificial intelligence
artificial intelligenceartificial intelligence
artificial intelligence
 
Every thing about Artificial Intelligence
Every thing about Artificial Intelligence Every thing about Artificial Intelligence
Every thing about Artificial Intelligence
 
From Narrow AI to Artificial General Intelligence (AGI)
From Narrow AI to Artificial General Intelligence (AGI)From Narrow AI to Artificial General Intelligence (AGI)
From Narrow AI to Artificial General Intelligence (AGI)
 
(Ch#1) artificial intelligence
(Ch#1) artificial intelligence(Ch#1) artificial intelligence
(Ch#1) artificial intelligence
 
#DIS2017 - How can A.I. Help us build a better world
#DIS2017 - How can A.I. Help us build a better world#DIS2017 - How can A.I. Help us build a better world
#DIS2017 - How can A.I. Help us build a better world
 
Artificial Intelligence Techniques In Power Systems Paper Presentation
Artificial Intelligence Techniques In Power Systems Paper PresentationArtificial Intelligence Techniques In Power Systems Paper Presentation
Artificial Intelligence Techniques In Power Systems Paper Presentation
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
Paper sharing_deep learning for smart manufacturing methods and applications
Paper sharing_deep learning for smart manufacturing methods and applicationsPaper sharing_deep learning for smart manufacturing methods and applications
Paper sharing_deep learning for smart manufacturing methods and applications
 
Artificial intelligence in software engineering ppt.
Artificial intelligence in software engineering ppt.Artificial intelligence in software engineering ppt.
Artificial intelligence in software engineering ppt.
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
Artificial Intelligence by Jayant
Artificial Intelligence by JayantArtificial Intelligence by Jayant
Artificial Intelligence by Jayant
 
Artificial intellegence
Artificial intellegenceArtificial intellegence
Artificial intellegence
 
Artificial intelligence- The science of intelligent programs
Artificial intelligence- The science of intelligent programsArtificial intelligence- The science of intelligent programs
Artificial intelligence- The science of intelligent programs
 
Artificial intelligence in business
Artificial intelligence in businessArtificial intelligence in business
Artificial intelligence in business
 
Introduction to Artificial Intelligence
Introduction to Artificial IntelligenceIntroduction to Artificial Intelligence
Introduction to Artificial Intelligence
 
Machine learning seminar presentation
Machine learning seminar presentationMachine learning seminar presentation
Machine learning seminar presentation
 
An overview on ai
An overview on aiAn overview on ai
An overview on ai
 
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...
 
ARTIFICIAL INTELLIGENCE & NEURAL NETWORKS
ARTIFICIAL INTELLIGENCE & NEURAL NETWORKSARTIFICIAL INTELLIGENCE & NEURAL NETWORKS
ARTIFICIAL INTELLIGENCE & NEURAL NETWORKS
 
Artificial intelligence : what it is
Artificial intelligence : what it isArtificial intelligence : what it is
Artificial intelligence : what it is
 

Similar to BE-EEE-8th sem-Presentation Artificial intelligence in security managenent

Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016
Janghyuck Choi
 

Similar to BE-EEE-8th sem-Presentation Artificial intelligence in security managenent (20)

IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdfIRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
 
Artificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber SecurityArtificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber Security
 
Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)
 
A review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber securityA review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber security
 
Optimizing cybersecurity incident response decisions using deep reinforcemen...
Optimizing cybersecurity incident response decisions using deep  reinforcemen...Optimizing cybersecurity incident response decisions using deep  reinforcemen...
Optimizing cybersecurity incident response decisions using deep reinforcemen...
 
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITYARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber security
 
The Role of Machine Learning in Cybersecurity.pptx
The Role of Machine Learning in Cybersecurity.pptxThe Role of Machine Learning in Cybersecurity.pptx
The Role of Machine Learning in Cybersecurity.pptx
 
IRJET- Intervention of Artificial Intelligence in Cyber Security
IRJET- Intervention of Artificial Intelligence in Cyber SecurityIRJET- Intervention of Artificial Intelligence in Cyber Security
IRJET- Intervention of Artificial Intelligence in Cyber Security
 
A survey on artificial neural networks in cyber world
A survey on artificial neural networks in cyber world A survey on artificial neural networks in cyber world
A survey on artificial neural networks in cyber world
 
IRJET- Use of Artificial Intelligence in Cyber Defence
IRJET- Use of Artificial Intelligence in Cyber DefenceIRJET- Use of Artificial Intelligence in Cyber Defence
IRJET- Use of Artificial Intelligence in Cyber Defence
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
Introduction to soft computing
 Introduction to soft computing Introduction to soft computing
Introduction to soft computing
 
The Transformative Role of Artificial Intelligence in Cybersecurity
The Transformative Role of Artificial Intelligence in CybersecurityThe Transformative Role of Artificial Intelligence in Cybersecurity
The Transformative Role of Artificial Intelligence in Cybersecurity
 
How Modern Cybersecurity Software Shields Against the Latest Threats.pdf
How Modern Cybersecurity Software Shields Against the Latest Threats.pdfHow Modern Cybersecurity Software Shields Against the Latest Threats.pdf
How Modern Cybersecurity Software Shields Against the Latest Threats.pdf
 
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018
 
Harnessing the Power of Machine Learning in Cybersecurity.pdf
Harnessing the Power of Machine Learning in Cybersecurity.pdfHarnessing the Power of Machine Learning in Cybersecurity.pdf
Harnessing the Power of Machine Learning in Cybersecurity.pdf
 
ARTIFICIAL INTELLIGENT ( ITS / TASK 6 ) done by Wael Saad Hameedi / P71062
ARTIFICIAL INTELLIGENT ( ITS / TASK 6 ) done by Wael Saad Hameedi / P71062ARTIFICIAL INTELLIGENT ( ITS / TASK 6 ) done by Wael Saad Hameedi / P71062
ARTIFICIAL INTELLIGENT ( ITS / TASK 6 ) done by Wael Saad Hameedi / P71062
 
Distributed network security management
Distributed network security managementDistributed network security management
Distributed network security management
 

More from MOHAMMED SAQIB

A STUDY ON WORKFORCE WELFARE IN THE CONTEXT OF DEVELOPMENT PROGRAMS AT ‘BEML ...
A STUDY ON WORKFORCE WELFARE IN THE CONTEXT OF DEVELOPMENT PROGRAMS AT ‘BEML ...A STUDY ON WORKFORCE WELFARE IN THE CONTEXT OF DEVELOPMENT PROGRAMS AT ‘BEML ...
A STUDY ON WORKFORCE WELFARE IN THE CONTEXT OF DEVELOPMENT PROGRAMS AT ‘BEML ...
MOHAMMED SAQIB
 

More from MOHAMMED SAQIB (16)

A STUDY ON WORKFORCE WELFARE IN THE CONTEXT OF DEVELOPMENT PROGRAMS AT ‘BEML ...
A STUDY ON WORKFORCE WELFARE IN THE CONTEXT OF DEVELOPMENT PROGRAMS AT ‘BEML ...A STUDY ON WORKFORCE WELFARE IN THE CONTEXT OF DEVELOPMENT PROGRAMS AT ‘BEML ...
A STUDY ON WORKFORCE WELFARE IN THE CONTEXT OF DEVELOPMENT PROGRAMS AT ‘BEML ...
 
Validity in performance appraisal
Validity in performance appraisalValidity in performance appraisal
Validity in performance appraisal
 
Titan
TitanTitan
Titan
 
Long term financing
Long term financingLong term financing
Long term financing
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
6 thinking hats
6 thinking hats6 thinking hats
6 thinking hats
 
human capital management
human capital managementhuman capital management
human capital management
 
Demonetization survey
Demonetization survey Demonetization survey
Demonetization survey
 
BE-EEE-8th sem project report for the project titled "Asymmetrical Multilevel...
BE-EEE-8th sem project report for the project titled "Asymmetrical Multilevel...BE-EEE-8th sem project report for the project titled "Asymmetrical Multilevel...
BE-EEE-8th sem project report for the project titled "Asymmetrical Multilevel...
 
Presentation - TATA group-Analysis-group ppt-By, Mohammed Saqib(16YACMD114) 1...
Presentation - TATA group-Analysis-group ppt-By, Mohammed Saqib(16YACMD114) 1...Presentation - TATA group-Analysis-group ppt-By, Mohammed Saqib(16YACMD114) 1...
Presentation - TATA group-Analysis-group ppt-By, Mohammed Saqib(16YACMD114) 1...
 
Milo-Product relaunch-SDC competition-Group ppt
Milo-Product relaunch-SDC competition-Group pptMilo-Product relaunch-SDC competition-Group ppt
Milo-Product relaunch-SDC competition-Group ppt
 
Reliance industries analysis
Reliance industries analysisReliance industries analysis
Reliance industries analysis
 
Engineering products
Engineering productsEngineering products
Engineering products
 
case stude ppt on nike
case stude ppt on nikecase stude ppt on nike
case stude ppt on nike
 
Final industrial policies
Final  industrial policiesFinal  industrial policies
Final industrial policies
 
Business analysis of big bazaar - By, Mohammed Saqib(16YACMD114) 1st sem MBA(...
Business analysis of big bazaar - By, Mohammed Saqib(16YACMD114) 1st sem MBA(...Business analysis of big bazaar - By, Mohammed Saqib(16YACMD114) 1st sem MBA(...
Business analysis of big bazaar - By, Mohammed Saqib(16YACMD114) 1st sem MBA(...
 

Recently uploaded

"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
chumtiyababu
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 

Recently uploaded (20)

kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 

BE-EEE-8th sem-Presentation Artificial intelligence in security managenent

  • 1. By, MOHAMMED SAQIB 1GC11EE018 Dept of EEE GCE,Ramanagaram AN OVERVIEW ON USE OF ARTIFICIAL INTELLIGENCE TECHNIQUES IN EFFECTIVE SECURITY MANAGEMENT Under The Guidance of Mr.Aejaz Ahmed KR Asst. Professor
  • 2. What is Artificial Intelligence[AI]…???  The artificial intelligence is the process in which machine can act like a human  AI techniques gives rise to important applications where human processing ability weakens  Some of the field where AI is massively used are Military, Antiterrorism, Automobile Industry, Internet Search Engines and Robotics, Speech recognition, Expert & fuzzy system etc.,  The central goals of AI research include reasoning, knowledge, planning, learning, natural language processing (communication),perception and the ability to move and manipulate objects.  General intelligence is still among the field's long- term goals.
  • 3. Artificial Intelligence & Security  Nowadays Security is the important issue for Human, Company Environment, Organization, Community and Country in accordance to maintain growth and stability  Security threat gives rise to several problems such as instability, economical setbacks, terror attacks causes loss of human lives, creates Un-safety feelings.  As a human being, the security is challenging task because human has several restriction on analyzing and processing several information at a time. This is big drawback is identified in current security system.  This drawback can overcome on more practical manner with the help of artificial intelligence techniques integration. The security system includes Homeland security, Intrusion detection system, DOS attack, Cryptography, Video vigilance System etc. Human Processing ability integrated with AI certainly raise the security at high extend.
  • 4.  Formal Security System  Security System based on Artificial Intelligence
  • 5. Different AI techniques used in Security Management System  Artificial Neural Networks.  Data Mining Tools.  Pattern Recognition.  Image Processing/Analysis.  Fuzzy Logic.  Expert System.
  • 6. Artificial Neural Networks  Artificial Neural Networks is an effective technique which has the ability to implement security using back-propagation algorithm. Simple combinational logic and sequential machine can be well implemented using back- propagation algorithm.  They are programs designed to solve any problem by trying to mimic the structure and the function of our nervous system  They are based on simulated neurons which are joined together in variety of ways to form networks
  • 7. A Simple Biological neuron  The fundamental processing element of a neural network is a neuron. Basically, a biological neuron receives inputs from other sources, combines them in some way, performs a generally nonlinear operation on the result, and then outputs the final result Inputs w2 w1 w3 wn wn-1 . . . x1 x2 x3 … xn-1 xn y )(; 1 zHyxwz n i ii   Artificial Neuron
  • 8. ANN-Applications  It involves Human like thinking  They can handle noisy or missing data  They can work with large number of variables or parameters  They deal with the non-linearity of the world which we live in.
  • 9. Fuzzy Rule Based Expert System for Cyber Security  Stage 1: Defining Cyber Security Expert System Variables  Stage 2: Data Collection for Cyber Terrorism  Stage 3: System Design  Stage 4:Fuzzy Rule Based Model  Implementation Steps Involved
  • 10. Advantages & Disadvantages of various AI TechniquesAI Techniques Advantages Disadvantages Artificial Neural Networks •Adapt to unknown situations •Robust, able to model complex functions. •Easy to use. •Training of neural network •Not exact •Complexity of the network structure Data Mining •Help with decision making •find out exact information from vast amount of data •User privacy/security is critical issue •Misuse of information •Accuracy of data Pattern Recognition •Quick and Accurate •Recognize & Classify unfamiliar objects •Reliability of result depends on input Fuzzy Logic •The algorithms can be described with little data, so little memory is required. •Fuzzy algorithms are often robust. •They are not very sensitive to changing environments and erroneous or forgotten rules Expert System •Provides consistent answers for repetitive decisions, processes and tasks •Can work round the clock •Cannot adapt to changing environments, unless knowledge base is changed
  • 11. INTELLIGENT SYSTEM FOR INFORMATION SECURITY MANAGEMENT ISISM ARCHITECTURE AI techniques can be used in building intelligent models to improve the information security management, intrusion detection and prevention capabilities, efficiency of security event management, and decision making  Efficient information security management requires an intelligent system that supports security event management approach with enhanced real-time capabilities, adaptation, and generalization to predict possible attacks and to support human’s actions.  ISISM ARCHITECTURE IS USED FOR THIS PURPOSE
  • 12. ISISM Architecture Proposed Meystel & Albus  Intelligent system has 2 parts  Internal or Computational  Sensory processing  world modeling  Decision making module  value judgment module  External or Interfacing
  • 13. Other Fields where AI is used 1. Engineering 2. Artificial life 3. Automated reasoning 4. Automation 5. Biologically inspired computing 6. Concept mining 7. Data mining 8. Knowledge representation 9. Semantic Web 10. E-mail spam filtering 11. Artificial Creativity 12. Game theory and Strategic planning And Many more………..
  • 14. Conclusion  As Security is key important issues, the integration Artificial Intelligence Techniques certainly improve the performance of the existing security system  System alerts the user before unwanted hazards are yet to happen  The system constructs an intelligent image processing technology which can identify the license plate and human face. This is the essential as far as the terror attacks are concerned  Reduces human effort  Man power required for the security purpose can be reduced, as once the successful security system with AI is designed, it can be used for longer duration.  Drawback-Some are Expensive