Current directory: /home3/bjinbymy/public_html/indianext/wp-content/mu-plugins User Submission: India Set To Break Glass Ceiling In Cyber Security Through Artificial Intelligence And Game Theory - AI Next
Indianext
No Result
View All Result
Subscribe
  • News
    • Project Watch
    • Policy
  • AI Next
  • People
    • Interviews
    • Profiles
  • Companies
  • Make In India
    • Solutions
    • State News
  • About Us
    • Editors Corner
    • Mission
    • Contact Us
    • Work Culture
  • Events
  • Guest post
  • News
    • Project Watch
    • Policy
  • AI Next
  • People
    • Interviews
    • Profiles
  • Companies
  • Make In India
    • Solutions
    • State News
  • About Us
    • Editors Corner
    • Mission
    • Contact Us
    • Work Culture
  • Events
  • Guest post
No Result
View All Result
Latest News on AI, Healthcare & Energy updates in India
No Result
View All Result
Home AI Next

User Submission: India Set To Break Glass Ceiling In Cyber Security Through Artificial Intelligence And Game Theory

April 11, 2022
AI

With the gigantic growth in cyber infrastructure , Cyber risks are also evolving at a much faster pace than before. For a smaller organization with limited or no sensitive data it may not be a serious concern. But for the bigger organizations with huge amount of sensitive data, it has become a very serious concern because if the data is leaked/lost then it may lead to unanticipated business losses. Cyber security plays a vital role in managing these threats and risks.

With our recent advancements in AI and ML technologies, many of the challenges are getting addressed like detecting speed and accuracy of malicious attacks for defending networks, raising automatic triggers in case of suspicious attacks, notification generations in order to curb the impact, dynamically re-configuring a firewall rule to block attempted attacks etc.

However, today’s traditional AI solutions generally are able to focus only on already known threats and are not well-suited for heavy network traffic with unanticipated threats. They even fall short of mechanisms to directly interfere with malicious activity and responding to more elusive indicators of malicious intent. One more risk is that these AI and ML software have false positive rates which can be quite high sometimes and responding to these generated ML-based alerts by human operator by determining which one’s are true positives and which false positives are not an easy game. Even coordinating to respond to the suspicious activity becomes further inflamed. These cause more harm than good.

Hence Game Theory is gaining momentum now and India in no way seems to be left behind in this race.

Why is Game Theory utilized in combination with AI Software?

AI and ML techniques combined with game theory automatically reacts and respond to attacker activity even if the overall confi­dence of detected events is low. Game theory for Cyber Security is an optimistic research area where an attempt is made to analyze the techniques of game theory to anticipate the actions of the attackers based on different game steps, strategies, and risks.

Game Theory deals with the cyber security issues and challenges in a much better way than traditional approaches. It uses mathematical models for decision making processes where the action or move of a player depends upon the move of the opponent in conflicting and competitive situation. The main objective of the opponents is to win the game. But in the games between two opposing parties with conflicting interests, winning means selecting an optimal strategy/course of action, wherein the players make decisions simultaneously. Under this principle, first of all, a player lists down the worst possible payoff values of all strategies available. Then selects the strategy corresponding to the optimum payoff value from among the worst possible payoff values.

How Game Theory Model functions ?

Most of the game theory approaches consider two types of players.

Attacker: The attacker is an opponent who does malicious attack into the system with the intention of breaching the security. The strategies of the attacker can vary from a single course of action to a sequence and series of counter activities.

Defender: On the contrary, the defender is responsible for applying right defense techniques to prevent and secure the system from various malicious attacks from attacker’s side. The defender has a set of counter strategies for monitoring and protecting the system.

The main aim of this player is to make defensive responses based on the acquired knowledge of the system status, purely relying on the counter strategies.

Cyber security problems generally require rational decision making and hence can be solved in a better way using game theory. The most important skill acknowledged by most of the researchers is “Adversarial Thinking” which is also called as “thinking like a hacker”. Cyber security is heavily dependent on guessing or analyzing the attacker’s strategies or move to avoid security threats, hence the need.

Unlike many games of conflict that are studied in the academics, computer security tend to have some unique properties that make them both interesting and somewhat challenging to model. Network and com­puter security games, however, have players who have asymmetric strategy sets and goals rather than Naïve strategy that are not only opposing, but that might have very different end states and resulting payoffs. In general, we treat one player as the defender and the opposing player as the attacker. This distinction is important, as the players in these types of games are not interchange­able.

Another major real-world complexity in cyber security is of ethics. In most of the cases, defender’s behavior is restricted based on legal and ethical princi­ples whereas attackers do not have such restrictions. Hence attackers most often exploit the networks for the purpose of harming the defender or the defender’s systems. This imbalance leads to significant and unfair advantage for the attackers. The primary aim has to be to devise feasible techniques to both hinder the attacker and improve the defender’s advantage.

Conclusion

The game theory driven AI and ML applications have provided an encouraging start, but still the significant amount of research is left to be carried out. We have an all-encompassing theoretical explanation of concepts available, but for the practical implementation, it is still an open area. These large scale multi-disciplinary research challenges calls upon multiple researchers and domain experts from various disciplines, to come together and examine real-world constraints and challenges that cannot be left unturned to steer the wheel in the desired direction.

Source: indiaai.gov.in

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Editors Corner

How can Artificial Intelligence tools be a blessing for recruiters?

Will Artificial Intelligence ever match human intelligence?

Artificial Intelligence: Features of peer-to-peer networking

What not to share or ask on Chatgpt?

How can Machine Learning help in detecting and eliminating poverty?

How can Artificial Intelligence help in treating Autism?

Speech Recognition and its Wonders in your corporate life

Most groundbreaking Artificial Intelligence-based gadgets to vouch for in 2023

Recommended News

AI Next

Google: AI From All Perspectives

Alphabet subsidiary Google may have been slower than OpenAI to make its AI capabilities publicly available in the past, but...

by India Next
May 31, 2024
AI Next

US And UK Doctors Think Pfizer Is Setting The Standard For AI And Machine Learning In Drug Discovery

New research from Bryter, which involved over 200 doctors from the US and the UK, including neurologists, hematologists, and oncologists,...

by India Next
May 31, 2024
Solutions

An Agreement Is Signed By MEA, MeitY, And CSC To Offer E-Migration Services Via Shared Service Centers

Three government agencies joined forces to form a synergy in order to deliver eMigrate services through Common Services Centers (CSCs)...

by India Next
May 31, 2024
AI Next

PR Handbook For AI Startups: How To Avoid Traps And Succeed In A Crowded Field

The advent of artificial intelligence has significantly changed the landscape of entrepreneurship. The figures say it all. Global AI startups...

by India Next
May 31, 2024

Related Posts

Google
AI Next

Google: AI From All Perspectives

May 31, 2024
Pfizer
AI Next

US And UK Doctors Think Pfizer Is Setting The Standard For AI And Machine Learning In Drug Discovery

May 31, 2024
Artificial-Intelligence
AI Next

PR Handbook For AI Startups: How To Avoid Traps And Succeed In A Crowded Field

May 31, 2024
openai
AI Next

OpenAI Creates An AI Safety Committee Following Significant Departures

May 31, 2024
Load More
Next Post
Top projects in Artificial Intelligence

Top Projects In Artificial Intelligence To Vouch For

IndiaNext Logo
IndiaNext Brings you latest news on artificial intelligence, Healthcare & Energy sector from all top sources in India and across the world.

Recent Posts

Google: AI From All Perspectives

US And UK Doctors Think Pfizer Is Setting The Standard For AI And Machine Learning In Drug Discovery

An Agreement Is Signed By MEA, MeitY, And CSC To Offer E-Migration Services Via Shared Service Centers

PR Handbook For AI Startups: How To Avoid Traps And Succeed In A Crowded Field

OpenAI Creates An AI Safety Committee Following Significant Departures

Tags

  • AI
  • EV
  • Mental WellBeing
  • Clean Energy
  • TeleMedicine
  • Healthcare
  • Electric Vehicles
  • Artificial Intelligence
  • Chatbots
  • Data Science
  • Electric Vehicles
  • Energy Storage
  • Machine Learning
  • Renewable Energy
  • Green Energy
  • Solar Energy
  • Solar Power

Follow us

  • Facebook
  • Linkedin
  • Twitter
© India Next. All Rights Reserved.     |     Privacy Policy      |      Web Design & Digital Marketing by Heeren Tanna
No Result
View All Result
  • About Us
  • Activate
  • Activity
  • Advisory Council
  • Archive
  • Career Page
  • Companies
  • Contact Us
  • cryptodemo
  • Energy next
  • Energy Next Archive
  • Home
  • Interviews
  • Make in India
  • Market
  • Members
  • Mission
  • News
  • News Update
  • People
  • Policy
  • Privacy Policy
  • Register
  • Reports
  • Subscription Page
  • Technology
  • Top 10
  • Videos
  • White Papers
  • Work Culture
  • Write For Us

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

IndiaNext Logo

Join Our Newsletter

Get daily access to news updates

no spam, we hate it more than you!