SUN’IY INTELLEKT VA KIBERXAVFSIZLIK: IMKONIYATLAR VA XAVF-XATARLAR

Qurbonaliyev G’olibjon Alisher o’g’li

Ichki Ishlar Vazirligi Akademiyasi

Keywords: Kalit so‘zlar: Sun’iy intellekt, kiberxavfsizlik, mashinani o‘rganish, tahdidlarni aniqlash, avtomatlashtirilgan xavfsizlik, kiberhujumlar, tahdidlarni prognozlash, SI xatarlar.


Abstract

Annotatsiya: Ushbu maqolada sun’iy intellekt (SI) texnologiyalarining kiberxavfsizlik sohasidagi roli, imkoniyatlari va yuzaga keladigan xavf-xatarlar tahlil qilinadi. SI yordamida kiberxavflarni aniqlash, oldini olish va ularga qarshi tezkor javob berish tizimlari samaradorligi oshirilmoqda. Biroq, ayni paytda SI texnologiyalarining noto‘g‘ri qo‘llanilishi yoki yomon niyatli subyektlar tomonidan suiiste’mol qilinishi yangi tahdidlarni keltirib chiqaradi. Maqolada SI asosida ishlovchi kiberxavfsizlik tizimlari, ularning afzalliklari va kamchiliklari, shuningdek, sun’iy intellektning kiberhujumlarda qo‘llanilishi bilan bog‘liq xavf-xatarlar muhokama qilinadi. Kiberxavfsizlikda SI texnologiyalarining xavfsiz va samarali qo‘llanilishi uchun tavsiyalar beriladi.


References

Foydalanilgan adabiyotlar

1. Russell, S., & Norvig, P. (2021). Artificial Intelligence: A Modern Approach (4th ed.). Pearson.

2. Goodfellow, I., Bengio, Y., & Courville, A. (2016). Deep Learning. MIT Press.

3. Sommer, R., & Paxson, V. (2010). Outside the Closed World: On Using Machine Learning for Network Intrusion Detection. IEEE Symposium on Security and Privacy, 305–316.

4. Bostrom, N. (2017). Superintelligence: Paths, Dangers, Strategies. Oxford University Press.

5. Huang, L., Joseph, A. D., Nelson, B., Rubinstein, B. I., & Tygar, J. D. (2011). Adversarial Machine Learning. Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, 43–58.

6. Barreno, M., Nelson, B., Joseph, A. D., & Tygar, J. D. (2010). The Security of Machine Learning. Machine Learning, 81(2), 121–148.

7. Buczak, A. L., & Guven, E. (2016). A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection. IEEE Communications Surveys & Tutorials, 18(2), 1153–1176.

8. Sommer, R. (2017). Machine Learning and Security: The Future. IEEE Security & Privacy, 15(4), 14–16.

9. Kaspersky Lab. (2023). Artificial Intelligence in Cybersecurity: Opportunities and Threats.

10. FireEye. (2022). M-Trends Report: Cyber Threat Landscape and AI.

11. National Institute of Standards and Technology (NIST). (2020). Special Publication 800-207: Zero Trust Architecture.

12. Chio, C., & Freeman, D. (2018). Machine Learning and Security: Protecting Systems with Data and Algorithms. O'Reilly Media.

13. Zhang, C., & Chen, H. (2019). Artificial Intelligence in Cybersecurity: The State of the Art. Computers & Security, 85, 1–15.

14. Bower, D. J., & Butt, S. (2021). AI and Cybersecurity: Understanding Risks and Benefits. Journal of Cybersecurity Technology, 5(3), 148–163.

15. Ng, A. (2018). Machine Learning Yearning. [Online] Available at: https://www.mlyearning.org/