Predictive Computational Models for Self-Adaptive Cybersecurity in Intelligent Networked Systems

Authors

  • Achieng Chebet Department of Computing and Information Systems, University of Nairobi, Kenya. Author

DOI:

https://doi.org/10.63282/3117-5481/AIJCST-V6I1P102

Keywords:

Predictive Computational Models, Self-Adaptive Cybersecurity, Intelligent Networked Systems, Anomaly Detection, Automated Threat Response, Machine Learning, Deep Learning

Abstract

The growing nature of interconnectivity and complexity of intelligent networked systems has rendered conventional approaches to cybersecurity inadequate in safeguarding critical infrastructures. The present paper aims at providing a detailed work on the predictive computational systems that are used in self-adaptive cybersecurity of smart networked systems. Based on advanced machine learning, deep learning, and probabilistic models, these regimens predict the possibility of impending cyber threats, dynamically modify security systems, and mitigate threats in real-time. Some of the key issues that are addressed in the research include threat detection, anomaly prediction, automated response generation, and the enhancement of system resilience. The simulation findings show that predictive models are critical in acceleration and accuracy in detection and response of threats, which lowers the vulnerability of the system and maximises efficiency in the operations. Moreover, the paper suggests a structure on how to combine these models within the current network management systems and allow lifelong learning and adaptation, therefore, supporting the establishment of entirely autonomous cybersecurity ecosystems

References

[1] Mohamed, N. (2023). Current trends in AI and ML for cybersecurity: A state-of-the-art review. Taylor & Francis Online.

[2] Thomas, M. A. (2023). Machine Learning Applications for Cybersecurity. Cyber Defense Review.

[3] Apruzzese, G. (2023). The Role of Machine Learning in Cybersecurity. ACM Digital Library.

[4] Pekaric, I. (2023). A systematic review on security and safety of self-adaptive systems. ScienceDirect.

[5] Wong, T. (2022). Self-adaptive systems: A systematic literature review. ScienceDirect.

[6] Mohamed, N. (2023). Current trends in AI and ML for cybersecurity: A state-of-the-art review. Taylor & Francis Online.

[7] Wong, T. (2022). Self-adaptive systems: A systematic literature review.

[8] Mohanarajesh Kommineni. Revanth Parvathi. (2013) Risk Analysis for Exploring the Opportunities in Cloud Outsourcing.

[9] Enabling Mission-Critical Communication via VoLTE for Public Safety Networks - Varinder Kumar Sharma - IJAIDR Volume 10, Issue 1, January-June 2019. DOI 10.71097/IJAIDR.v10.i1.1539

[10] Kanji, R. K. (2020). Federated Learning in Big Data Analytics Privacy and Decentralized Model Training. Journal of Scientific and Engineering Research, 7(3), 343-352.

[11] Thallam, N. S. T. (2020). Comparative Analysis of Data Warehousing Solutions: AWS Redshift vs. Snowflake vs. Google BigQuery. European Journal of Advances in Engineering and Technology, 7(12), 133-141.

[12] Optimizing LTE RAN for High-Density Event Environments: A Case Study from Super Bowl Deployments - Varinder Kumar Sharma - IJAIDR Volume 11, Issue 1, January-June 2020. DOI 10.71097/IJAIDR.v11.i1.1542

[13] Aragani, Venu Madhav and Maroju, Praveen Kumar and Mudunuri, Lakshmi Narasimha Raju, Efficient Distributed Training through Gradient Compression with Sparsification and Quantization Techniques (September 29, 2021). Available at SSRN: https://ssrn.com/abstract=5022841 or http://dx.doi.org/10.2139/ssrn.5022841

[14] Lakshmi Narasimha Raju Mudunuri, “AI Powered Supplier Selection: Finding the Perfect Fit in Supply Chain Management”, IJIASE, January-December 2021, Vol 7; 211-231.

[15] Kommineni, M. "Explore Knowledge Representation, Reasoning, and Planning Techniques for Building Robust and Efficient Intelligent Systems." International Journal of Inventions in Engineering & Science Technology 7.2 (2021): 105- 114.

[16] Thallam, N. S. T. (2021). Performance Optimization in Big Data Pipelines: Tuning EMR, Redshift, and Glue for Maximum Efficiency.

[17] Kanji, R. K. (2021). Real-Time Big Data Processing with Edge Computing. European Journal of Advances in Engineering and Technology, 8(11), 152-155

[18] Security and Threat Mitigation in 5G Core and RAN Networks - Varinder Kumar Sharma - IJFMR Volume 3, Issue 5, September-October 2021. DOI: https://doi.org/10.36948/ijfmr.2021.v03i05.54992

[19] Thirunagalingam, A. (2022). Enhancing Data Governance Through Explainable AI: Bridging Transparency and Automation. Available at SSRN 5047713.

[20] P. K. Maroju, "Conversational AI for Personalized Financial Advice in the BFSI Sector," International Journal of Innovations in Applied Sciences and Engineering, vol. 8, no.2, pp. 156–177, Nov. 2022

[21] Kulasekhara Reddy Kotte. 2022. ACCOUNTS PAYABLE AND SUPPLIER RELATIONSHIPS: OPTIMIZING PAYMENT CYCLES TO ENHANCE VENDOR PARTNERSHIPS. International Journal of Advances in Engineering Research , 24(6), PP – 14-24, https://www.ijaer.com/admin/upload/02%20Kulasekhara%20Reddy%20Kotte%2001468.pdf

[22] Gopi Chand Vegineni. 2022. Intelligent UI Designs for State Government Applications: Fostering Inclusion without AI and ML, Journal of Advances in Developmental Research, 13(1), PP – 1-13, https://www.ijaidr.com/research-paper.php?id=1454

[23] Hullurappa, M. (2022). The Role of Explainable AI in Building Public Trust: A Study of AI-Driven Public Policy Decisions. International Transactions in Artificial Intelligence, 6.

[24] Bhagath Chandra Chowdari Marella, “Driving Business Success: Harnessing Data Normalization and Aggregation for Strategic Decision-Making”, International Journal of INTELLIGENT SYSTEMS AND APPLICATIONS IN ENGINEERING, vol. 10, no.2, pp. 308 – 317, 2022. https://ijisae.org/index.php/IJISAE/issue/view/87

[25] Mohanarajesh Kommineni. (2022/9/30). Discover the Intersection Between AI and Robotics in Developing Autonomous Systems for Use in the Human World and Cloud Computing. International Numeric Journal of Machine Learning and Robots. 6. 1-19. Injmr.

[26] Naga Surya Teja Thallam. (2022). Enhancing Security in Distributed Systems Using Bastion Hosts, NAT Gateways, and Network ACLs. International Scientific Journal of Engineering and Management, 1(1).

[27] Thallam, N. S. T. (2022). Sustainable Cloud Computing: Reducing Carbon Footprint in Large-Scale Cloud Infrastructures. Journal of Scientific and Engineering Research, 9(1), 217-224.

[28] Garg, A. (2022). Unified Framework of Blockchain and AI for Business Intelligence in Modern Banking . International Journal of Emerging Research in Engineering and Technology, 3(4), 32-42. https://doi.org/10.63282/3050-922X.IJERET-V3I4P105

[29] Kanji, R. K. (2022). A Unified Data Warehouse Architecture for Multi-Source Forest Inventory Integration and Automated Remote Sensing Analysis. Sarcouncil Journal of Engineering and Computer Sciences, 1, 10-16.

[30] Performance Evaluation of Network Slicing in 5G Core Networks - Varinder Kumar Sharma - IJMRGE 2022; 3(5): 648-654. DOI: https://doi.org/10.54660/.IJMRGE.2022.3.5.648-654

[31] Thirunagalingam, A. (2023). Improving Automated Data Annotation with Self-Supervised Learning: A Pathway to Robust AI Models Vol. 7, No. 7,(2023) ITAI. International Transactions in Artificial Intelligence, 7(7).

[32] Praveen Kumar Maroju, "Optimizing Mortgage Loan Processing in Capital Markets: A Machine Learning Approach, " International Journal of Innovations in Scientific Engineering, 17(1), PP. 36-55 , April 2023.

[33] P. K. Maroju, "Leveraging Machine Learning for Customer Segmentation and Targeted Marketing in BFSI," International Transactions in Artificial Intelligence, vol. 7, no. 7, pp. 1-20, Nov. 2023. – 1

[34] Kulasekhara Reddy Kotte. 2023. Integrating Cybersecurity and Real-Time Analytics in Treasury Management: Enhancing Liquidity, Optimizing Working Capital, and Mitigating Financial Risks. International Journal of Professional Studies, 16(1), PP – 61 - 69, https://www.ijps.in/paper.php?id=193

[35] Mudunuri L.N.R.; (December, 2023); “AI-Driven Inventory Management: Never Run Out, Never Overstock”; International Journal of Advances in Engineering Research; Vol 26, Issue 6; 24-36

[36] S. Panyaram, "Connected Cars, Connected Customers: The Role of AI and ML in Automotive Engagement," International Transactions in Artificial Intelligence, vol. 7, no. 7, pp. 1-15, 2023.

[37] Hullurappa, M. (2023). Intelligent Data Masking: Using GANs to Generate Synthetic Data for Privacy-Preserving Analytics. International Journal of Inventions in Engineering & Science Technology, 9, 9.

[38] B. C. C. Marella, “Data Synergy: Architecting Solutions for Growth and Innovation,” International Journal of Innovative Research in Computer and Communication Engineering, vol. 11, no. 9, pp. 10551–10560, Sep. 2023.

[39] Mohanarajesh Kommineni, (2023/9/17), Study High-Performance Computing Techniques for Optimizing and Accelerating AI Algorithms Using Quantum Computing and Specialized Hardware, International Journal of Innovations in Applied Sciences & Engineering, 9. 48-59. IJIASE.

[40] Settibathini, V. S., Kothuru, S. K., Vadlamudi, A. K., Thammreddi, L., & Rangineni, S. (2023). Strategic analysis review of data analytics with the help of artificial intelligence. International Journal of Advances in Engineering Research, 26, 1-10.

[41] Sehrawat, S. K. (2023). The role of artificial intelligence in ERP automation: state-of-the-art and future directions. Trans Latest Trends Artif Intell, 4(4).

[42] Thallam, N. S. T. (2023). Comparative Analysis of Public Cloud Providers for Big Data Analytics: AWS, Azure, and Google Cloud. International Journal of AI, BigData, Computational and Management Studies, 4(3), 18-29.

[43] Naga Surya Teja Thallam. (2023). High Availability Architectures for Distributed Systems in Public Clouds: Design and Implementation Strategies. European Journal of Advances in Engineering and Technology.

[44] Arpit Garg, S Rautaray, Devrajavans Tayagi. Artificial Intelligence in Telecommunications: Applications, Risks,and Governance in the 5G and Beyond Era. International Journal of Computer Techniques – Volume10Issue1,January - February – 2023. 1-19

[45] Mukkala, S. R. (2023). A Proficient Hospital Ratings Aware Patient Churn Prediction And Prevention System Using Abg-Fuzzy And Ner-Gfjdkmeans. Educational Administration: Theory and Practice, 29 (03), 1407-1424 Doi: 10.53555/kuey. v29i3, 9511.

[46] Varinder Kumar Sharma - 5G-Enabled Mission-Critical Networks Design and Performance Analysis -International Journal on Science and Technology (IJSAT) Volume 14, Issue 4, October-December 2023. https://doi.org/10.71097/IJSAT.v14.i4.7998

Downloads

Published

2024-01-06

Issue

Section

Articles

How to Cite

[1]
A. Chebet, “Predictive Computational Models for Self-Adaptive Cybersecurity in Intelligent Networked Systems”, AIJCST, vol. 6, no. 1, pp. 13–23, Jan. 2024, doi: 10.63282/3117-5481/AIJCST-V6I1P102.

Similar Articles

11-20 of 105

You may also start an advanced similarity search for this article.