Cyber Security Threat Intelligence using Data Mining Techniques and Artificial Intelligence
Shivangi Gupta1, A. Sai Sabitha2, Ritu Punhani3
1Shivangi Gupta, Amity School of Engineering and Technology, Amity University, Noida, Uttar Pradesh.
2A. Sai Sabitha, Amity School of Engineering and Technology, Amity University, Noida, Uttar Pradesh.
3Ritu Punhani, Amity School of Engineering and Technology, Amity University, Noida, Uttar Pradesh.
Manuscript received on 03 August 2019. | Revised Manuscript received on 07 August 2019. | Manuscript published on 30 September 2019. | PP: 6133-6140 | Volume-8 Issue-3 September 2019 | Retrieval Number: C5675098319/2019©BEIESP | DOI: 10.35940/ijrte.C5675.098319
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Threat intelligence is the procurement of evidence-based knowledge about current or potential threats. The interest of threat intelligence comprises of advancement in efficiency and boosting effectiveness in terms of analytical and prevention capabilities. Cybersecurity represents serious interest for numerous organizations because maximum of them are using Internet-connected data devices which are opening doors for cyber attackers. Outstanding threat intelligence within the cyber sphere requests for the knowledge base of threat information and a thoughtful way to represent this knowledge. This study proposes a clear rationale of significant artificial intelligence (AI) techniques used for recognizing a cyber-attack. Data analysis can be formulated to guide industries and Internet-connected systems such as smartphones or robotic factories on what to do in the appearance of an incident. AI techniques will analyze past incidents and summarize knowledge from experts and will continue to adapt or reform new branches as it reviews from the new incidents. In addition, various data mining approaches used in boosting threat truthfulness in cybersecurity data are also studied. To conclude, we discussed that; AI will robotize the collation of machine-readable external threats and will improve the efficiency and accuracy of the data for each smart organization’s specific framework.
Keywords: Artificial Intelligence, Cyber Security, Data Security, Intrusion Detection, Internet of Things (IoT), Threat Intelligence.
Scope of the Article: Data Mining