You are on page 1of 2

Abstract - Repetitive Security is biggest concern for Defense in depth2 is the concept of protecting a computer

emerging cyber atmosphere. It is very hard to develop network with a series of defensive mechanisms such that if
software to defend against cruelly developing assaults in one mechanism fails, another will already be in place to
system. Researchers have demonstrated evincive technical thwart an attack. Because there are so many potential
progress over the past ten years, much faster than was attackers with such a wide variety of attack methods
previously anticipated in the field of Artificial Intelligence. available, there is no single method for successfully
Artificial Intelligence techniques can enhance their overall protecting a computer network. Utilizing the strategy of
security deployment and give better security from an defense in depth will reduce the risk of having a successful
expanding continuous learning and adaptation through and likely very costly attack on a network.
feedback loops. For promoting the development of cyber
security, a defense in depth architecture is required in The first step of a defense in depth strategy to protect against
which AI is incorporated within each layer of that network breaches should be to establish proper access
architecture. In this paper, researcher has tried to deploy control systems. Before granting access rights, an
AI in a Defense in Depth Architecture of cyber security. enterprises system should check whether users have the
correct device identities (software, hardware and network
Within each layer of cyber defense attributes) and user identities (each individual attribute of a
user). They should also have to meet certain role
requirements. For example, a network could grant access
1.0 INTRODUCTION
only to employees using approved devices who are in
managerial positions at the company and using secure
Information and communication technologies are top
network connections.
handler of growth for our cyber society. Now Societies are
adopting Internet in many different ways and on many
Network and security components must be able to
different levels. This digital world not came only with communicate so that if an attacker penetrates one system,
benefits but also vulnerabilities. Cyber security incidents, others can respond immediately to take preventative
sometimes intentional or accidental that are increasing at an measures. IF-MAP (www.if-map.org) is a robust protocol
successive rate and are impacting on societal values. They that enables information sharing between disparate systems.
could also disrupt essential services such as healthcare,
electricity, water or mobile services. It covers everything If an unauthorized user is able to break through these first
from the internet vandalism to physical and criminal layers of defense, perhaps by stealing user credentials, an
enterprise can deprovision devices via a centrally managed
damage. The theft of intellectual property and economic or
VPN or revoke remote access rights. Both of these actions
state-sponsored espionage lies somewhere in between. could be triggered as soon as a breach is detected.
The core functionality of cybersecurity involves protecting
information and systems from major cyberthreats. These
cyber threats take many forms (e.g., application
attacks, malware, ransomware, phishing, exploit kits).
Unfortunately, cyber adversaries have learned to launch
automated and sophisticated attacks using these tactics at
lower and lower costs. As a result, keeping pace with
cybersecurity strategy and operations can be a challenge,
particularly in government and enterprise networks where, in
their most disruptive form, cyberthreats often take aim at
secret, political, military or infrastructural assets of a nation,
or its people.1

2
1
https://www.paloaltonetworks.com/cyberpedia/what-is- SANS Reading Room by Todd McGuiness Version 1.2E
cyber-security Defense In Depth
Now to defend these attacks our conventional security best
practices are deficient, against new frontier of
technologically advanced invader.

human knowledge, since neither individuals nor Artificial


Intelligence alone has proved overall success in this domain.
In this paper, Utilization of AI algorithm to defend security
risk and reduce potential business Impact.

You might also like