CryptoGenSec: A Hybrid Generative AI Algorithm for Dynamic Cryptographic Cyber Defence
Main Article Content
Abstract
As the world of cybersecurity constantly changes, traditional cryptographic techniques have faced limitations in the context of today's sophisticated and dynamic threats. Existing protections usually adopt static algorithms and key structures, making it difficult for them to resist the categories of modern attacks. This research paper, therefore, presents CryptoGenSec, a brand-new generative AI algorithm based on a hybrid consisting of generative adversarial networks (GANs) on reconnaissance learning (RL), for the purpose of increasing cryptographic cyber defences. CryptoGenSec applies a GAN to simulate various types of attack scenarios in cyberspace to perceive possible vulnerabilities. Then, RL refines the response strategies of our algorithm through recursive learning from the above simulations in real time and realizes the dynamic adaptation and evolution of defense mechanisms. By assessing the results of CryptoGenSec’s performance when traditional security methods are used as baselines, we can use several metrics for evaluation, such as detection accuracy, response time, resilience and evolution ability. According to these findings, the superiority of CryptoGenSec over conventional mechanisms becomes evident. To be more specific, it even shows an overwhelming edge in terms of threat detection, resulting in a 20% increase in speed of response, a 30% decrease in speed of response, and resisting power, making it 25% harder than the other methods. Moreover, it has a greater possibility of eliminating false-positive effects, which usually come from new and even dawned jeopardy: 50%. Moreover, to highlight the making-a-fortune frauds in the zero-day world, a comparison of the cohorts makes CryptoGenSec a 40% upper step. Stopping attackers from taking away all their data is also its plus point, which gains 95% achievement, whereas using mere methods only results in a 70% possibility. An enormous step in cybersecurity was taken with the combination of GANs and RL within the CryptoGenSec algorithm. Instead of being defenceless against all attacks, this approach changes and matches the threat level when necessary. The highly promising results presented here demonstrate its potential as a crucial technology for addressing the growing complexities of cyber challenges. This is a large step toward making defensive mechanisms more efficient and reliable.
Downloads
Article Details
This work is licensed under a Creative Commons Attribution 4.0 International License.
References
N. Vemuri, "Adaptive generative ai for dynamic cybersecurity threat detection in enterprises", International Journal of Science and Research Archive, vol. 11, no. 1, p. 2259-2265, 2024. https://doi.org/10.30574/ijsra.2024.11.1.0313.
J. Chen, C. Su, & Z. Yan, "Ai-driven cyber security analytics and privacy protection", Security and Communication Networks, vol. 2019, p. 1-2, 2019. https://doi.org/10.1155/2019/1859143.
B. Narsimha, C. Raghavendran, P. Rajyalakshmi, G. Reddy, M. Bhargavi, & P. Naresh, "Cyber defence in the age of artificial intelligence and machine learning for financial fraud detection application", International Journal of Electrical and Electronics Research, vol. 10, no. 2, p. 87-92, 2022. https://doi.org/10.37391/ijeer.100206.
M. Krelina, "Quantum technology for military applications", Epj Quantum Technology, vol. 8, no. 1, 2021. https://doi.org/10.1140/epjqt/s40507-021-00113-y.
G. Al-Kateb, M. M. Mijwil, M. Aljanabi, M. Abotaleb, S. R. K. Priya, and P. Mishra, "AI PotatoGuard: Leveraging Generative Models for Early Detection of Potato Diseases," Potato Research. Available: https://doi.org/10.1007/s11540-024-09751-y
X. Zhou, B. Li, Y. Qi, & W. Dong, "Mimic encryption box for network multimedia data security", Security and Communication Networks, vol. 2020, p. 1-24, 2020. https://doi.org/10.1155/2020/8868672.
W. Kaleem, "Salp swarm algorithm to solve cryptographic key generation problem for cloud computing", International Academic Publishing House, vol. 31, no. Spl Volume, p. 85-97, 2023. https://doi.org/10.52756/10.52756/ijerr.2023.v31spl.009.
A. Nitaj and T. Rachidi, "Applications of neural network-based ai in cryptography", Cryptography, vol. 7, no. 3, p. 39, 2023. https://doi.org/10.3390/cryptography7030039.
Z. Teo, A. Lee, P. Campbell, R. Chan, & D. Ting, "Developments in artificial intelligence for ophthalmology: federated learning", Asia-Pacific Journal of Ophthalmology, vol. 11, no. 6, p. 500-502, 2022. https://doi.org/10.1097/apo.0000000000000582.
a. admin, D. Dr.P. Kavitha2, A. Akshaya, P. P.Shalin, & R. R.Ramya, "A survey on cyber security meets artificial intelligence: ai– driven cyber security", JCHCI, p. 50-55, 2022. https://doi.org/10.54216/jchci.020202.
G. Al-Kateb and S. H. Hashem, "DMAV: Enhanced MAV Link Protocol Using Dynamic DNA Coding for Unmanned Aerial Vehicles," International Journal of Online and Biomedical Engineering (IJOE), vol. 18, no. 11, pp. 1-16, 2022, doi: 10.3991/ijoe. v18i11.34085.
S. Shandilya, "Design and deployment of network testbed for web data security", Journal of Cyber Security and Mobility, 2021. https://doi.org/10.13052/jcsm2245-1439.112.
U. Sakthivelu and C. Kumar, "Advanced persistent threat detection and mitigation using machine learning model", Intelligent Automation & Soft Computing, vol. 36, no. 3, p. 3691-3707, 2023. https://doi.org/10.32604/iasc.2023.036946.
J. Li, A. Zhou, P. Jia, L. Liu, Y. Wang, & L. Liu, "A neural network-based approach for cryptographic function detection in malware", Ieee Access, vol. 8, p. 23506-23521, 2020. https://doi.org/10.1109/access.2020.2966860.
K. Duy, T. Noh, S. Huh, & H. Lee, "Confidential machine learning computation in untrusted environments: a systems security perspective", Ieee Access, vol. 9, p. 168656-168677, 2021. https://doi.org/10.1109/access.2021.3136889.
J. Johnson, "The ai-cyber nexus: implications for military escalation, deterrence and strategic stability", Journal of Cyber Policy, vol. 4, no. 3, p. 442-460, 2019. https://doi.org/10.1080/23738871.2019.1701693.
G. E. Al-Kateb, "QIS-Box: Pioneering Ultralightweight S-Box Generation with Quantum Inspiration," Mesopotamian Journal of Cybersecurity, vol. 1, no. 1, pp. 15-25, May 2024.
R. Choumanof, S. Sanchez, V. Mayo, M. Balufo, M. Castrillo, F. Garridoet al., "Introducing the cysas-s3 dataset for operationalizing a mission-oriented cyber situational awareness", Sensors, vol. 22, no. 14, p. 5104, 2022. https://doi.org/10.3390/s22145104.
S. Zhang, J. Zhang, L. Chen, & X. Li, "Oscillatory evolution of collective behaviour in evolutionary games played with reinforcement learning", Nonlinear Dynamics, vol. 99, no. 4, p. 3301-3312, 2020. https://doi.org/10.1007/s11071-019-05398-4.
S. Dontu, "Applications of deep learning approaches to detect advanced cyber attacks", International Journal on Recent and Innovation Trends in Computing and Communication, vol. 11, no. 9s, p. 849-854, 2023. https://doi.org/10.17762/ijritcc.v11i9s.9493.
E. Esenogho, K. Djouani, & A. Kurien, "Integrating artificial intelligence internet of things and 5g for next-generation smartgrid: a survey of trends challenges and prospect", Ieee Access, vol. 10, p. 4794-4831, 2022. https://doi.org/10.1109/access.2022.3140595.
S. Zeadally, E. Adi, Z. Baig, & I. Khan, "Harnessing artificial intelligence capabilities to improve cybersecurity", Ieee Access, vol. 8, p. 23817-23837, 2020. https://doi.org/10.1109/access.2020.2968045.
K. Yang, "The future of the “metaverse”: artificial intelligence and cybersecurity",, p. 1627-1632, 2023. https://doi.org/10.2991/978-94-6463-040-4_246.
F. Tao, M. Akhtar, & J. Zhang, "The future of artificial intelligence in cybersecurity: a comprehensive survey", Eai Endorsed Transactions on Creative Technologies, vol. 8, no. 28, p. 170285, 2021. https://doi.org/10.4108/eai.7-7-2021.170285.
J. Ruan, G. Liang, J. Zhao, H. Zhao, J. Qiu, F. Wenet al., "Deep learning for cybersecurity in smart grids: review and perspectives", Energy Conversion and Economics, vol. 4, no. 4, p. 233-251, 2023. https://doi.org/10.1049/enc2.12091.
S. Samtani, M. Kantarcioglu, & H. Chen, "Trailblazing the artificial intelligence for cybersecurity discipline", Acm Transactions on Management Information Systems, vol. 11, no. 4, p. 1-19, 2020. https://doi.org/10.1145/3430360.
N. Capuano, G. Fenza, V. Loia, & C. Stanzione, "Explainable artificial intelligence in cybersecurity: a survey", Ieee Access, vol. 10, p. 93575-93600, 2022. https://doi.org/10.1109/access.2022.3204171.
F. Charmet, H. Tanuwidjaja, S. Ayoubi, P. Gimenez, Y. Han, H. Jmilaet al., "Explainable artificial intelligence for cybersecurity: a literature survey", Annals of Telecommunications - Annales Des Télécommunications, vol. 77, no. 11-12, p. 789-812, 2022. https://doi.org/10.1007/s12243-022-00926-7.
M. Nyre-Yu, E. Morris, M. Smith, B. Moss, & C. Smutz, "Explainable ai in cybersecurity operations: lessons learned from xai tool deployment”, 2022. https://doi.org/10.14722/usec.2022.23014.
K. Komarudin, I. Maulani, T. Herdianto, M. Laksana, & D. Syawaludin, "Exploring the effectiveness of artificial intelligence in detecting malware and improving cybersecurity in computer networks", Eduvest - Journal of Universal Studies, vol. 3, no. 4, p. 836-841, 2023. https://doi.org/10.59188/eduvest.v3i4.793.
N. Mohamed, A. Oubelaid, & S. Almazrouei, "Staying ahead of threats: a review of ai and cyber security in power generation and distribution", International Journal of Electrical and Electronics Research, vol. 11, no. 1, p. 143-147, 2023. https://doi.org/10.37391/ijeer.110120.
I. Sarker, "Multi‐aspects ai‐based modeling and adversarial learning for cybersecurity intelligence and robustness: a comprehensive overview", Security and Privacy, vol. 6, no. 5, 2023. https://doi.org/10.1002/spy2.295.
B. Sadeghi, "Modelling the ethical priorities influencing decision-making in cybersecurity contexts", Organizational Cybersecurity Journal Practice Process and People, vol. 3, no. 2, p. 127-149, 2023. https://doi.org/10.1108/ocj-09-2022-0015.
B. Naik, A. Mehta, H. Yagnik, & M. Shah, "The impacts of artificial intelligence techniques in augmentation of cybersecurity: a comprehensive review", Complex & Intelligent Systems, vol. 8, no. 2, p. 1763-1780, 2021. https://doi.org/10.1007/s40747-021-00494-8.
G. Lami and F. Merola, "Integrating cybersecurity concerns in functional safety assurance of ai-based automotive functions”, 2023. https://doi.org/10.21203/rs.3.rs-2495054/v1.