{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:24:07Z","timestamp":1776443047228,"version":"3.51.2"},"reference-count":100,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,8,24]],"date-time":"2021-08-24T00:00:00Z","timestamp":1629763200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,8,24]],"date-time":"2021-08-24T00:00:00Z","timestamp":1629763200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2022,4]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Given the prevailing state of cybersecurity, it is reasonable to understand why cybersecurity experts are seriously considering artificial intelligence as a potential field that can aid improvements in conventional cybersecurity techniques. Various progressions in the field of technology have helped to mitigate some of the issues relating to cybersecurity. These advancements can be manifested by Big Data, Blockchain technology, Behavioral Analytics, to name but a few. The paper overviews the effects of applications of these technologies in cybersecurity. The central purpose of the paper is to review the application of AI techniques in analyzing, detecting, and fighting various cyberattacks. The effects of the implementation of conditionally classified \u201cdistributed\u201d AI methods and conveniently classified \u201ccompact\u201d AI methods on different cyber threats have been reviewed. Furthermore, the future scope and challenges of using such techniques in cybersecurity, are discussed. Finally, conclusions have been drawn in terms of evaluating the employment of different AI advancements in improving cybersecurity.<\/jats:p>","DOI":"10.1007\/s40747-021-00494-8","type":"journal-article","created":{"date-parts":[[2021,8,24]],"date-time":"2021-08-24T19:02:42Z","timestamp":1629831762000},"page":"1763-1780","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":49,"title":["The impacts of artificial intelligence techniques in augmentation of cybersecurity: a comprehensive review"],"prefix":"10.1007","volume":"8","author":[{"given":"Binny","family":"Naik","sequence":"first","affiliation":[]},{"given":"Ashir","family":"Mehta","sequence":"additional","affiliation":[]},{"given":"Hiteshri","family":"Yagnik","sequence":"additional","affiliation":[]},{"given":"Manan","family":"Shah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,24]]},"reference":[{"issue":"3","key":"494_CR1","first-page":"47","volume":"96","author":"H Abie","year":"2000","unstructured":"Abie H (2000) An overview of firewall technologies. Telektronikk 96(3):47\u201352","journal-title":"Telektronikk"},{"key":"494_CR2","doi-asserted-by":"crossref","first-page":"65","DOI":"10.13052\/jcsm2245-1439.414","volume":"4","author":"M Abomhara","year":"2015","unstructured":"Abomhara M, K\u00f8ien GM (2015) Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. J Cyber Secur Mob 4:65\u201388","journal-title":"J Cyber Secur Mob"},{"issue":"3","key":"494_CR3","first-page":"526","volume":"10","author":"O Achbarou","year":"2018","unstructured":"Achbarou O, El Kiram MA, Bourkoukou O, Elbouanani S (2018) A new distributed intrusion detection system based on multi-agent system for cloud environment. Int J Commun Netw Inf Secur 10(3):526","journal-title":"Int J Commun Netw Inf Secur"},{"issue":"1","key":"494_CR4","first-page":"80","volume":"43","author":"WL Al-Yaseen","year":"2016","unstructured":"Al-Yaseen WL, Othman ZA, Nazri MZA (2016) Real-time intrusion detection system using multi-agent system. IAENG Int J Comput Sci 43(1):80\u201390","journal-title":"IAENG Int J Comput Sci"},{"key":"494_CR5","doi-asserted-by":"crossref","unstructured":"Al-Zewairi M, Almajali S, Awajan A (2017) Experimental evaluation of a multi-layer feed-forward artificial neural network classifier for network intrusion detection system. In: 2017 International conference on new trends in computing sciences (ICTCS), IEEE, pp 167\u2013172","DOI":"10.1109\/ICTCS.2017.29"},{"issue":"6","key":"494_CR6","doi-asserted-by":"crossref","first-page":"1909","DOI":"10.3390\/app10061909","volume":"10","author":"S Aldhaheri","year":"2020","unstructured":"Aldhaheri S, Alghazzawi D, Cheng L, Alzahrani B, Al-Barakati A (2020) Deepdca: novel network-based detection of iot attacks using artificial immune system. Appl Sci 10(6):1909","journal-title":"Appl Sci"},{"key":"494_CR7","unstructured":"Ali M, Nelson J, Shea R, Freedman MJ (2016) Blockstack: a global naming and storage system secured by blockchains. In: 2016 {USENIX} annual technical conference ({USENIX}{ATC} 16), pp 181\u2013194"},{"key":"494_CR8","unstructured":"Alkasassbeh M, Almseidin M (2018) Machine learning methods for network intrusion detection. arXiv:1809.02610"},{"key":"494_CR9","doi-asserted-by":"crossref","unstructured":"Almseidin M, Alzubi M, Kovacs S, Alkasassbeh M (2017) Evaluation of machine learning algorithms for intrusion detection system. In: 2017 IEEE 15th international symposium on intelligent systems and informatics (SISY), IEEE, pp 277\u2013282","DOI":"10.1109\/SISY.2017.8080566"},{"key":"494_CR10","doi-asserted-by":"crossref","unstructured":"Alphand O, Amoretti M, Claeys T, Dall'Asta S, Duda A, Ferrari G, Zanichelli F (2018) IoTChain: a blockchain security architecture for the Internet of Things. In: 2018 IEEE wireless communications and networking conference (WCNC), IEEE, pp 1\u20136","DOI":"10.1109\/WCNC.2018.8377385"},{"key":"494_CR11","doi-asserted-by":"crossref","unstructured":"Alvarenga ID, Rebello GA, Duarte OCM (2018) Securing configuration management and migration of virtual network functions using blockchain. In: NOMS 2018\u20132018 IEEE\/IFIP Network Operations and Management Symposium, pp 1\u20139. IEEE","DOI":"10.1109\/NOMS.2018.8406249"},{"key":"494_CR12","doi-asserted-by":"crossref","unstructured":"Atymtayeva L, Kozhakhmet K, Bortsova G (2014) Building a knowledge base for expert system in information security. Advances in intelligent systems and computing, pp 57\u201376","DOI":"10.1007\/978-3-319-05515-2_7"},{"issue":"1","key":"494_CR13","doi-asserted-by":"crossref","first-page":"496","DOI":"10.25046\/aj030160","volume":"3","author":"YY Aung","year":"2018","unstructured":"Aung YY, Min MM (2018) An analysis of k-means algorithm based network intrusion detection system. Adv Sci Technol Eng Syst 3(1):496\u2013501","journal-title":"Adv Sci Technol Eng Syst"},{"key":"494_CR14","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/978-981-10-8234-4_13","volume-title":"Proceeding of the second international conference on microelectronics, computing & communication systems (MCCS 2017)","author":"C Azad","year":"2019","unstructured":"Azad C, Jha VK (2019) Decision tree and genetic algorithm based intrusion detection system. Proceeding of the second international conference on microelectronics, computing & communication systems (MCCS 2017). Springer, Singapore, pp 141\u2013152"},{"issue":"4","key":"494_CR15","doi-asserted-by":"crossref","first-page":"2875","DOI":"10.3233\/JIFS-169230","volume":"32","author":"MM Baig","year":"2017","unstructured":"Baig MM, Awais MM, El-Alfy ESM (2017) A multiclass cascade of artificial neural network for network intrusion detection. J Intell Fuzzy Syst 32(4):2875\u20132883","journal-title":"J Intell Fuzzy Syst"},{"key":"494_CR16","first-page":"731","volume":"6","author":"A Bajpai","year":"2018","unstructured":"Bajpai A, Dayanand AA (2018) Big data analytics in cyber security. Int J Comput Sci Eng 6:731\u2013734","journal-title":"Int J Comput Sci Eng"},{"issue":"3","key":"494_CR17","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1016\/j.dcan.2017.10.006","volume":"4","author":"M Banerjee","year":"2018","unstructured":"Banerjee M, Lee J, Choo KKR (2018) A blockchain future for internet of things security: a position paper. Digit Commun Netw 4(3):149\u2013160","journal-title":"Digit Commun Netw"},{"key":"494_CR18","doi-asserted-by":"crossref","unstructured":"Basnet SR, Shakya S (2017) BSS: Blockchain security over software defined network. In: 2017 International conference on computing, communication and automation (ICCCA), IEEE, pp 720\u2013725","DOI":"10.1109\/CCAA.2017.8229910"},{"key":"494_CR19","doi-asserted-by":"crossref","unstructured":"Benshoof B, Rosen A, Bourgeois AG, Harrison RW (2016) Distributed decentralized domain name service. In: 2016 IEEE international parallel and distributed processing symposium workshops (IPDPSW), IEEE, pp 1279\u20131287","DOI":"10.1109\/IPDPSW.2016.109"},{"issue":"4","key":"494_CR20","first-page":"214","volume":"5","author":"S Bhutada","year":"2018","unstructured":"Bhutada S, Bhutada P (2018) Applications of artificial intelligence in cyber security. Int J Eng Res Comput Sci Eng 5(4):214\u2013219","journal-title":"Int J Eng Res Comput Sci Eng"},{"issue":"19","key":"494_CR21","first-page":"101","volume":"118","author":"SK Biswas","year":"2018","unstructured":"Biswas SK (2018) Intrusion detection using machine learning: a comparison study. Int J Pure Appl Math 118(19):101\u2013114","journal-title":"Int J Pure Appl Math"},{"issue":"4","key":"494_CR22","first-page":"30","volume":"4","author":"AR Bologa","year":"2013","unstructured":"Bologa AR, Bologa R, Florea A (2013) Big data and specific analysis methods for insurance fraud detection. Database Syst J 4(4):30\u201339","journal-title":"Database Syst J"},{"key":"494_CR23","doi-asserted-by":"crossref","unstructured":"Bozic N, Pujolle G, Secci S (2017) Securing virtual machine orchestration with blockchains. In: 2017 1st Cyber security in networking conference (CSNet), IEEE, pp 1\u20138","DOI":"10.1109\/CSNET.2017.8242003"},{"key":"494_CR24","doi-asserted-by":"crossref","unstructured":"Bronte R, Shahriar H, Haddad HM (2016) A signature-based intrusion detection system for web applications based on genetic algorithm. In: Proceedings of the 9th international conference on security of information and networks, pp 32\u201339","DOI":"10.1145\/2947626.2951964"},{"key":"494_CR25","doi-asserted-by":"crossref","unstructured":"Cai C, Yuan X, Wang C (2017) Hardening distributed and encrypted keyword search via blockchain. In: 2017 IEEE symposium on privacy-aware computing (PAC), IEEE, pp 119\u2013128","DOI":"10.1109\/PAC.2017.36"},{"issue":"7","key":"494_CR26","doi-asserted-by":"crossref","first-page":"2735","DOI":"10.1007\/s10489-018-01408-x","volume":"49","author":"\u00dc \u00c7avu\u015fo\u011flu","year":"2019","unstructured":"\u00c7avu\u015fo\u011flu \u00dc (2019) A new hybrid approach for intrusion detection using machine learning methods. Appl Intell 49(7):2735\u20132761","journal-title":"Appl Intell"},{"key":"494_CR27","doi-asserted-by":"crossref","first-page":"24639","DOI":"10.1109\/ACCESS.2018.2799942","volume":"6","author":"SC Cha","year":"2018","unstructured":"Cha SC, Chen JF, Su C, Yeh KH (2018) A blockchain connected gateway for BLE-based devices in the internet of things. IEEE Access 6:24639\u201324649","journal-title":"IEEE Access"},{"issue":"5","key":"494_CR28","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MIS.2005.88","volume":"20","author":"H Chen","year":"2005","unstructured":"Chen H, Wang FY (2005) Guest editors\u2019 introduction: artificial intelligence for homeland security. IEEE Intell Syst 20(5):12\u201316","journal-title":"IEEE Intell Syst"},{"key":"494_CR29","doi-asserted-by":"crossref","first-page":"2292","DOI":"10.1109\/ACCESS.2016.2566339","volume":"4","author":"K Christidis","year":"2016","unstructured":"Christidis K, Devetsikiotis M (2016) Blockchains and smart contracts for the internet of things. IEEE Access 4:2292\u20132303","journal-title":"IEEE Access"},{"issue":"6","key":"494_CR30","doi-asserted-by":"crossref","first-page":"e01802","DOI":"10.1016\/j.heliyon.2019.e01802","volume":"5","author":"EG Dada","year":"2019","unstructured":"Dada EG, Bassi JS, Chiroma H, Adetunmbi AO, Ajibuwa OE (2019) Machine learning for email spam filtering: review, approaches and open research problems. Heliyon 5(6):e01802","journal-title":"Heliyon"},{"key":"494_CR31","doi-asserted-by":"crossref","unstructured":"Dasgupta D (2006) Computational intelligence in cyber security. In: 2006 IEEE international conference on computational intelligence for homeland security and personal safety, IEEE, pp 2\u20133","DOI":"10.1109\/CIHSPS.2006.313289"},{"key":"494_CR32","doi-asserted-by":"crossref","unstructured":"Dias LP, Cerqueira JDJF, Assis KD, Almeida RC (2017) Using artificial neural network in intrusion detection systems to computer networks. In: 2017 9th Computer science and electronic engineering (CEEC), IEEE, pp 145\u2013150","DOI":"10.1109\/CEEC.2017.8101615"},{"key":"494_CR33","doi-asserted-by":"crossref","unstructured":"Dilek S, \u00c7ak\u0131r H, Ayd\u0131n M (2015) Applications of artificial intelligence techniques to combating cyber crimes: a review. arXiv:1502.03552","DOI":"10.5121\/ijaia.2015.6102"},{"key":"494_CR34","doi-asserted-by":"crossref","unstructured":"Dorri A, Kanhere SS, Jurdak R, Gauravaram P (2017) Blockchain for IoT security and privacy: the case study of a smart home. In: 2017 IEEE international conference on pervasive computing and communications workshops (PerCom workshops), IEEE, pp 618\u2013623","DOI":"10.1109\/PERCOMW.2017.7917634"},{"key":"494_CR35","doi-asserted-by":"crossref","first-page":"34929","DOI":"10.1109\/ACCESS.2020.2973608","volume":"8","author":"I Dutt","year":"2020","unstructured":"Dutt I, Borah S, Maitra IK (2020) Immune system based intrusion detection system (IS-IDS): a proposed. IEEE Access 8:34929\u201334941","journal-title":"IEEE Access"},{"key":"494_CR36","doi-asserted-by":"crossref","unstructured":"Farzadnia E, Shirazi H, Nowroozi A (2020) A novel sophisticated hybrid method for intrusion detection using the artificial immune system","DOI":"10.1016\/j.jisa.2020.102721"},{"key":"494_CR37","unstructured":"Fu D, Fang L (2016) Blockchain-based trusted computing in social network. In: 2016 2nd IEEE International conference on computer and communications (ICCC), IEEE, pp 19\u201322"},{"key":"494_CR38","doi-asserted-by":"crossref","unstructured":"Gangavarapu T, Jaidhar CD, Chanduka B (2020) Applicability of machine learning in spam and phishing email filtering: review and approaches. Artif Intell Rev pp 1\u201363","DOI":"10.1007\/s10462-020-09814-9"},{"key":"494_CR39","unstructured":"Goyal A, Kumar C (2008) GA-NIDS: a genetic algorithm based network intrusion detection system. Northwestern University."},{"issue":"1","key":"494_CR40","first-page":"13","volume":"1","author":"K Goztepe","year":"2012","unstructured":"Goztepe K (2012) Designing fuzzy rule based expert system for cyber security. Int J Inf Secur Sci 1(1):13\u201319","journal-title":"Int J Inf Secur Sci"},{"key":"494_CR41","doi-asserted-by":"crossref","first-page":"12118","DOI":"10.1109\/ACCESS.2018.2805783","volume":"6","author":"J Gu","year":"2018","unstructured":"Gu J, Sun B, Du X, Wang J, Zhuang Y, Wang Z (2018) Consortium blockchain-based malware detection in mobile devices. IEEE Access 6:12118\u201312128","journal-title":"IEEE Access"},{"key":"494_CR42","doi-asserted-by":"crossref","unstructured":"Gupta Y, Shorey R, Kulkarni D, Tew J (2018) The applicability of blockchain in the Internet of Things. In: 2018 10th International Conference on communication systems & networks (COMSNETS), IEEE, pp 561\u2013564","DOI":"10.1109\/COMSNETS.2018.8328273"},{"key":"494_CR43","doi-asserted-by":"crossref","unstructured":"Hodo E, Bellekens X, Hamilton A, Dubouilh PL, Iorkyase E, Tachtatzis C, Atkinson R (2016) Threat analysis of IoT networks using artificial neural network intrusion detection system. In: 2016 International symposium on networks, computers and communications (ISNCC), IEEE, pp 1\u20136","DOI":"10.1109\/ISNCC.2016.7746067"},{"key":"494_CR44","doi-asserted-by":"crossref","unstructured":"Hooks D, Yuan X, Roy K, Esterline A, Hernandez J (2018) Applying artificial immune system for intrusion detection. In: 2018 IEEE fourth international conference on big data computing service and applications (BigDataService), IEEE, pp 287\u2013292","DOI":"10.1109\/BigDataService.2018.00051"},{"key":"494_CR45","doi-asserted-by":"crossref","unstructured":"Huang Z, Su X, Zhang Y, Shi C, Zhang H, Xie L (2017) A decentralized solution for IoT data trusted exchange based-on blockchain. In: 2017 3rd IEEE international conference on computer and communications (ICCC), IEEE, pp 1180\u20131184","DOI":"10.1109\/CompComm.2017.8322729"},{"issue":"3","key":"494_CR46","first-page":"233","volume":"6","author":"NChSN Iyengar","year":"2014","unstructured":"Iyengar NChSN, Banerjee A, Ganapathy G (2014) A fuzzy logic based defense mechanism against distributed denial of service attack in cloudcomputing environment. Int J Commun Netw Inf Secur 6(3):233\u2013245","journal-title":"Int J Commun Netw Inf Secur"},{"key":"494_CR47","first-page":"467","volume-title":"Cyber Security","author":"AK Jain","year":"2018","unstructured":"Jain AK, Gupta BB (2018) PHISH-SAFE: URL features-based phishing detection system using machine learning. Cyber Security. Springer, Singapore, pp 467\u2013474"},{"issue":"5","key":"494_CR48","doi-asserted-by":"crossref","first-page":"2015","DOI":"10.1007\/s12652-018-0798-z","volume":"10","author":"AK Jain","year":"2019","unstructured":"Jain AK, Gupta BB (2019) A machine learning based approach for phishing detection using hyperlinks information. J Ambient Intell Hum Comput 10(5):2015\u20132028","journal-title":"J Ambient Intell Hum Comput"},{"key":"494_CR49","first-page":"1","volume":"2","author":"K Jha","year":"2019","unstructured":"Jha K, Doshi A, Patel P, Shah M (2019) A comprehensive review on automation in agriculture using artificial intelligence. Artif Intell Agric 2:1\u201312","journal-title":"Artif Intell Agric"},{"key":"494_CR50","unstructured":"Jiang D, ShiWei C (2010) A study of information security for m2m of iot. In: 2010 3rd International conference on advanced computer theory and engineering (ICACTE)"},{"key":"494_CR51","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1016\/j.compeleceng.2017.04.013","volume":"59","author":"X Jin","year":"2017","unstructured":"Jin X, Liang J, Tong W, Lu L, Li Z (2017) Multi-agent trust-based intrusion detection scheme for wireless sensor networks. Comput Electr Eng 59:262\u2013273","journal-title":"Comput Electr Eng"},{"key":"494_CR52","doi-asserted-by":"crossref","unstructured":"Krishnan Sadhasivan D, Balasubramanian K (2017) A fusion of multiagent functionalities for effective intrusion detection system. Secur Commun Netw 2017","DOI":"10.1155\/2017\/6216078"},{"issue":"10","key":"494_CR53","doi-asserted-by":"crossref","first-page":"1027","DOI":"10.1016\/j.telpol.2017.09.003","volume":"41","author":"N Kshetri","year":"2017","unstructured":"Kshetri N (2017) Blockchain\u2019s roles in strengthening cybersecurity and protecting privacy. Telecommun Policy 41(10):1027\u20131038","journal-title":"Telecommun Policy"},{"key":"494_CR54","doi-asserted-by":"crossref","unstructured":"Kumar JS, Patel DR (2014) A survey on internet of things: security and privacy issues. Int J Comput Appl 90(11)","DOI":"10.5120\/15764-4454"},{"key":"494_CR55","doi-asserted-by":"crossref","unstructured":"Lakhno V, Tkach Y, Petrenko T, Zaitsev S, Bazylevych V (2016) Development of adaptive expert system of information security using a procedure of clustering the attributes of anomalies and cyber attacks. Boc\u0442o\u0447\u043do-E\u0432po\u043fe\u0439c\u043a\u0438\u0439 \u0436yp\u043da\u043b \u043fepe\u0434o\u0432\u044bx \u0442ex\u043do\u043bo\u0433\u0438\u0439 6(9):32\u201344.","DOI":"10.15587\/1729-4061.2016.85600"},{"issue":"7","key":"494_CR56","doi-asserted-by":"crossref","first-page":"1120","DOI":"10.3390\/electronics9071120","volume":"9","author":"C Liang","year":"2020","unstructured":"Liang C, Shanmugam B, Azam S, Karim A, Islam A, Zamani M, Idris NB (2020) Intrusion detection system for the internet of things based on blockchain and multi-agent systems. Electronics 9(7):1120","journal-title":"Electronics"},{"issue":"4","key":"494_CR57","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s42452-020-2414-z","volume":"2","author":"F Louati","year":"2020","unstructured":"Louati F, Ktata FB (2020) A deep learning-based multi-agent system for intrusion detection. SN Appl Sci 2(4):1\u201313","journal-title":"SN Appl Sci"},{"key":"494_CR58","first-page":"379","volume-title":"International conference on advanced informatics for computing research","author":"J Lyngdoh","year":"2018","unstructured":"Lyngdoh J, Hussain MI, Majaw S, Kalita HK (2018) An intrusion detection method using artificial immune system approach. International conference on advanced informatics for computing research. Springer, Singapore, pp 379\u2013387"},{"issue":"6","key":"494_CR59","first-page":"505","volume":"4","author":"MM Gamal","year":"2011","unstructured":"Gamal MM, Hasan D, Hegazy AF (2011) A security analysis framework powered by an expert system. Int J Comput Sci Secur 4(6):505\u2013526","journal-title":"Int J Comput Sci Secur"},{"key":"494_CR60","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1007\/978-3-319-54430-4_2","volume-title":"Asian conference on intelligent information and database systems","author":"NNP Mkuzangwe","year":"2017","unstructured":"Mkuzangwe NNP, Nelwamondo FV (2017) A fuzzy logic based network intrusion detection system for predicting the TCP SYN flooding attack. Asian conference on intelligent information and database systems. Springer, Cham, pp 14\u201322"},{"key":"494_CR61","doi-asserted-by":"crossref","unstructured":"Moradpoor N, Clavie B, Buchanan B (2017) Employing machine learning techniques for detection and classification of phishing emails. In: 2017 Computing conference, IEEE, pp 149\u2013156","DOI":"10.1109\/SAI.2017.8252096"},{"issue":"4","key":"494_CR62","doi-asserted-by":"crossref","first-page":"1878","DOI":"10.1109\/TFUZZ.2017.2755000","volume":"26","author":"N Naik","year":"2018","unstructured":"Naik N, Diao R, Shen Q (2018) Dynamic fuzzy rule interpolation and its application to intrusion detection. IEEE Trans Fuzzy Syst 26(4):1878\u20131892","journal-title":"IEEE Trans Fuzzy Syst"},{"key":"494_CR63","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2020.3023447","author":"N Naik","year":"2020","unstructured":"Naik N, Shang C, Jenkins P, Shen Q (2020) D-FRI-Honeypot: a secure sting operation for hacking the hackers using dynamic fuzzy rule interpolation. IEEE Trans Emerge Top Comput Intell. https:\/\/doi.org\/10.1109\/TETCI.2020.3023447","journal-title":"IEEE Trans Emerge Top Comput Intell"},{"key":"494_CR64","doi-asserted-by":"crossref","first-page":"687","DOI":"10.1007\/s40747-020-00233-5","volume":"7","author":"N Naik","year":"2020","unstructured":"Naik N, Jenkins P, Savage N, Yang L, Boongoen T, Iam-On N, Song J (2020) Embedded YARA rules: strengthening YARA rules utilising fuzzy hashing and fuzzy rules for malware analysis. Complex Intell Syst 7:687\u2013702","journal-title":"Complex Intell Syst"},{"key":"494_CR65","doi-asserted-by":"crossref","first-page":"477","DOI":"10.1007\/s40747-020-00209-5","volume":"7","author":"N Naik","year":"2020","unstructured":"Naik N, Jenkins P, Savage N, Yang L (2020) A computational intelligence enabled honeypot for chasing ghosts in the wires. Complex Intell Syst 7:477\u2013494","journal-title":"Complex Intell Syst"},{"key":"494_CR66","doi-asserted-by":"crossref","unstructured":"Niu Y, Wei L, Zhang C, Liu J, Fang Y (2017) An anonymous and accountable authentication scheme for Wi-Fi hotspot access with the Bitcoin blockchain. In: 2017 IEEE\/CIC international conference on communications in China (ICCC), pp. 1\u20136. IEEE.","DOI":"10.1109\/ICCChina.2017.8330337"},{"issue":"6","key":"494_CR67","first-page":"4208","volume":"4","author":"JM Padron","year":"2017","unstructured":"Padron JM, Ojeda-Castro A (2017) Cyberwarfare: artificial Intelligence in the frontlines of combat. Int J Inf Res Rev 4(6):4208\u20134212","journal-title":"Int J Inf Res Rev"},{"key":"494_CR68","doi-asserted-by":"crossref","unstructured":"Pamukov ME (2017) Application of artificial immune systems for the creation of IoT intrusion detection systems. In: 2017 9th IEEE International conference on intelligent data acquisition and advanced computing systems: technology and applications (IDAACS), IEEE, Vol 1, pp 564\u2013568","DOI":"10.1109\/IDAACS.2017.8095144"},{"issue":"5","key":"494_CR69","first-page":"1","volume":"4","author":"P Patil","year":"2016","unstructured":"Patil P (2016) Artificial intelligence in cyber security. Int J Res Comput Appl Robot 4(5):1\u20135","journal-title":"Int J Res Comput Appl Robot"},{"key":"494_CR70","doi-asserted-by":"crossref","unstructured":"Pinno OJA, Gregio ARA, De Bona LC (2017) ControlChain: Blockchain as a central enabler for access control authorizations in the iot. In: GLOBECOM 2017\u20132017 IEEE global communications conference, pp 1\u20136 IEEE.","DOI":"10.1109\/GLOCOM.2017.8254521"},{"key":"494_CR71","doi-asserted-by":"crossref","first-page":"805","DOI":"10.1016\/j.future.2017.08.025","volume":"107","author":"B Qin","year":"2017","unstructured":"Qin B, Huang J, Wang Q, Luo X, Liang B, Shi W (2017) Cecoin: a decentralized PKI mitigating MitM attacks. Fut Gen Comput Syst 107:805\u2013815","journal-title":"Fut Gen Comput Syst"},{"key":"494_CR72","doi-asserted-by":"publisher","DOI":"10.1109\/ccaa.2015.7148381","author":"C Rani","year":"2015","unstructured":"Rani C, Goel S (2015) CSAAES: an expert system for cyber security attack awareness. Int Conf Comput Commun Autom. https:\/\/doi.org\/10.1109\/ccaa.2015.7148381","journal-title":"Int Conf Comput Commun Autom"},{"issue":"12","key":"494_CR73","first-page":"67","volume":"6","author":"BH Rashmi","year":"2018","unstructured":"Rashmi BH (2018) Impact of artificial intelligence on cyber security. Int J Comput Sci Eng 6(12):67\u201379","journal-title":"Int J Comput Sci Eng"},{"key":"494_CR74","doi-asserted-by":"crossref","unstructured":"Razaq A, Tianfield H, Barrie P (2016) A big data analytics based approach to anomaly detection. In: Proceedings of the 3rd IEEE\/ACM international conference on big data computing, applications and technologies, pp 187\u2013193.","DOI":"10.1145\/3006299.3006317"},{"issue":"4","key":"494_CR75","doi-asserted-by":"crossref","first-page":"e36","DOI":"10.1002\/spy2.36","volume":"1","author":"PAA Resende","year":"2018","unstructured":"Resende PAA, Drummond AC (2018) Adaptive anomaly-based intrusion detection system using genetic algorithm and profiling. Secur Privacy 1(4):e36","journal-title":"Secur Privacy"},{"issue":"1","key":"494_CR76","first-page":"63","volume":"45","author":"S Riaty","year":"2017","unstructured":"Riaty S, Sharieh A, Al Bdour H (2017) Enhance detecting phishing websites based on machine learning techniques of fuzzy logic with associative rules. Kasmera J 45(1):63\u201375","journal-title":"Kasmera J"},{"key":"494_CR77","first-page":"44","volume-title":"International Conference on Mathematics and Computing","author":"SS Roy","year":"2017","unstructured":"Roy SS, Mallik A, Gulati R, Obaidat MS, Krishna PV (2017) A deep learning based artificial neural network approach for intrusion detection. International Conference on Mathematics and Computing. Springer, Singapore, pp 44\u201353"},{"issue":"2","key":"494_CR78","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.icte.2018.04.003","volume":"4","author":"A Shenfield","year":"2018","unstructured":"Shenfield A, Day D, Ayesh A (2018) Intelligent intrusion detection systems using artificial neural networks. ICT Express 4(2):95\u201399","journal-title":"ICT Express"},{"key":"494_CR79","unstructured":"Siddiqui MZ, Yadav S, Husain MS (2018) Application of artificial intelligence in fighting against cyber crimes: a review. Int J Adv Res Comput Sci 9(2)"},{"key":"494_CR80","doi-asserted-by":"crossref","unstructured":"Stango A, Prasad NR, Kyriazanos DM (2009) A threat analysis methodology for security evaluation and enhancement planning. In: 2009 Third international conference on emerging security information, systems and technologies, IEEE, pp 262\u2013267","DOI":"10.1109\/SECURWARE.2009.47"},{"key":"494_CR81","doi-asserted-by":"crossref","unstructured":"Stytz MR, Lichtblau DE, Banks SB (2005) Toward using intelligent agents to detect, assess, and counter cyberattacks in a network-centric environment. Institute for Defense Analyses Alexandria VA.","DOI":"10.21236\/ADA464134"},{"issue":"3","key":"494_CR82","doi-asserted-by":"crossref","first-page":"1593","DOI":"10.11591\/ijeecs.v16.i3.pp1593-1599","volume":"16","author":"H Suhaimi","year":"2019","unstructured":"Suhaimi H, Suliman SI, Musirin I, Harun AF, Mohamad R (2019) Network intrusion detection system by using genetic algorithm. Indonesian J Electr Eng Comput Sci 16(3):1593\u20131599","journal-title":"Indonesian J Electr Eng Comput Sci"},{"key":"494_CR83","doi-asserted-by":"crossref","unstructured":"Suliman SI, Abd Shukor MS, Kassim M, Mohamad R, Shahbudin S (2018). Network intrusion detection system using artificial immune system (AIS). In: 2018 3rd International Conference on Computer and Communication Systems (ICCCS), IEEE, pp 178\u2013182","DOI":"10.1109\/CCOMS.2018.8463274"},{"issue":"2","key":"494_CR84","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1007\/s11023-019-09504-8","volume":"29","author":"M Taddeo","year":"2019","unstructured":"Taddeo M (2019) Three ethical challenges of applications of artificial intelligence in cybersecurity. Mind Mach 29(2):187\u2013191","journal-title":"Mind Mach"},{"issue":"6404","key":"494_CR85","doi-asserted-by":"crossref","first-page":"751","DOI":"10.1126\/science.aat5991","volume":"361","author":"M Taddeo","year":"2018","unstructured":"Taddeo M, Floridi L (2018) How AI can be a force for good. Science 361(6404):751\u2013752","journal-title":"Science"},{"key":"494_CR86","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3198556","author":"M Taddeo","year":"2018","unstructured":"Taddeo M, Floridi L (2018) Regulate artificial intelligence to avert cyber arms race. SSRN J. https:\/\/doi.org\/10.2139\/ssrn.3198556","journal-title":"SSRN J"},{"key":"494_CR87","doi-asserted-by":"crossref","first-page":"13624","DOI":"10.1109\/ACCESS.2018.2810198","volume":"6","author":"P Tao","year":"2018","unstructured":"Tao P, Sun Z, Sun Z (2018) An improved intrusion detection algorithm based on GA and SVM. IEEE Access 6:13624\u201313631","journal-title":"IEEE Access"},{"issue":"2","key":"494_CR88","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/j.dcan.2019.01.005","volume":"6","author":"PJ Taylor","year":"2020","unstructured":"Taylor PJ, Dargahi T, Dehghantanha A, Parizi RM, Choo KKR (2020) A systematic literature review of blockchain cyber security. Digit Commun Netw 6(2):147\u2013156","journal-title":"Digit Commun Netw"},{"key":"494_CR89","doi-asserted-by":"crossref","unstructured":"Trifonov R, Nakov O, Mladenov V (2018) Artificial intelligence in cyber threats intelligence. In: 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC), IEEE, pp 1\u20134","DOI":"10.1109\/ICONIC.2018.8601235"},{"key":"494_CR90","doi-asserted-by":"crossref","unstructured":"Tyagi I, Shad J, Sharma S, Gaur S, Kaur G (2018) A novel machine learning approach to detect phishing websites. In: 2018 5th international conference on signal processing and integrated networks (SPIN), pp 425\u2013430, IEEE","DOI":"10.1109\/SPIN.2018.8474040"},{"key":"494_CR91","unstructured":"Tyugu E (2011) Artificial intelligence in cyber defense. In: 2011 3rd International conference on cyber conflict, pp 1\u201311, IEEE"},{"key":"494_CR92","doi-asserted-by":"publisher","unstructured":"Ubing AA, Jasmi SKB, Abdullah A, Jhanjhi NZ, Supramaniam M (2019) Phishing website detection: an improved accuracy through feature selection and ensemble learning. IJACSA. https:\/\/doi.org\/10.14569\/IJACSA.2019.0100133","DOI":"10.14569\/IJACSA.2019.0100133"},{"key":"494_CR93","doi-asserted-by":"crossref","unstructured":"Wang XB, Yang GY, Li YC, Liu D (2008) Review on the application of artificial intelligence in antivirus detection system i. In: 2008 IEEE conference on cybernetics and intelligent systems, IEEE, pp 506\u2013509","DOI":"10.1109\/ICCIS.2008.4670733"},{"key":"494_CR94","doi-asserted-by":"crossref","unstructured":"Wang X, Li K, Li H, Li Y, Liang Z (2017) ConsortiumDNS: a distributed domain name service based on consortium chain. In: 2017 IEEE 19th international conference on high performance computing and communications; IEEE 15th International Conference on Smart City; IEEE 3rd International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS), IEEE, pp 617\u2013620","DOI":"10.1109\/HPCC-SmartCity-DSS.2017.83"},{"key":"494_CR95","doi-asserted-by":"crossref","unstructured":"Xu L, Chen L, Shah N, Gao Z, Lu Y, Shi W (2017) Dl-bac: distributed ledger based access control for web applications. In: Proceedings of the 26th international conference on world wide web companion, pp 1445\u20131450","DOI":"10.1145\/3041021.3053897"},{"key":"494_CR96","doi-asserted-by":"crossref","unstructured":"Xu Z, Liu W, Huang J, Yang C, Lu J, Tan H (2020). Artificial intelligence for securing IoT services in edge computing: a survey. Security and communication networks","DOI":"10.1155\/2020\/8872586"},{"key":"494_CR97","doi-asserted-by":"crossref","unstructured":"Yue L, Junqin H, Shengzhi Q, Ruijin W (2017) Big data model of security sharing based on blockchain. In: 2017 3rd International conference on big data computing and communications (BIGCOM), IEEE, pp 117\u2013121","DOI":"10.1109\/BIGCOM.2017.31"},{"key":"494_CR98","doi-asserted-by":"crossref","unstructured":"Zaman M, Lung CH (2018) Evaluation of machine learning techniques for network intrusion detection. In: NOMS 2018\u20132018 IEEE\/IFIP network operations and management symposium, pp 1\u20135. IEEE","DOI":"10.1109\/NOMS.2018.8406212"},{"key":"494_CR99","doi-asserted-by":"crossref","unstructured":"Zamir A, Khan HU, Iqbal T, Yousaf N, Aslam F, Anjum A, Hamdani M (2020) Phishing web site detection using diverse machine learning algorithms. The Electronic Library","DOI":"10.1108\/EL-05-2019-0118"},{"key":"494_CR100","doi-asserted-by":"crossref","first-page":"31711","DOI":"10.1109\/ACCESS.2019.2903723","volume":"7","author":"Y Zhang","year":"2019","unstructured":"Zhang Y, Li P, Wang X (2019) Intrusion detection for IoT based on improved genetic algorithm and deep belief network. IEEE Access 7:31711\u201331722","journal-title":"IEEE Access"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-021-00494-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-021-00494-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-021-00494-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,29]],"date-time":"2022-04-29T17:33:54Z","timestamp":1651253634000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-021-00494-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,24]]},"references-count":100,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["494"],"URL":"https:\/\/doi.org\/10.1007\/s40747-021-00494-8","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,24]]},"assertion":[{"value":"1 December 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 August 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 August 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"All relevant data and material are presented in the main paper.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Availability of data and material"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}}]}}