Jump to content
  • Advertisement

Archived

This topic is now archived and is closed to further replies.

sakky

Security Systems with AI

This topic is 5365 days old which is more than the 365 day threshold we allow for new replies. Please post a new topic.

If you intended to correct an error in the post then please contact us.

Recommended Posts

I was discussing computer security systems and viruses with one of my friends earlier today. We came up with this crazy idea for a supreme security system. It would be one that defends it’s self by attacking its attackers to protect its self from hacks and viruses. We came up with a name for it—“Tyrant”. A voice activated and operated security system. It would identify a person by their voice as you would identify a person with their finger prints. Tyrant’s primary goal is to serve you like a secretary. It would load programs and play games once you spoke the command. To protect it’s self, it would use many hack tricks against hackers trying to break the system. When a hack is uncovered, it then quickly finds a solution to deal with the offenders efficiently. This would include hacking their systems or dropping in a deadly computer virus to destroy or shutdown their system, making Tyrant an efficient system killer. It would make use out of some of the best AI algorithms to aid in it’s destruction against prying eyes. Just like a Quake3 bot seeks and destroys so does Tyrant. I think it would be awesome to have an artificial intelligent security system at your side. You could talk to it and it would listen to you. Better then some other people I know. My friend and I then came to the conclusion, what if the damn thing turned on us? We would be screwed.

Share this post


Link to post
Share on other sites
Advertisement
Also it should fly. And shoot lasers out of its eyes. Pizza lasers.


How appropriate. You fight like a cow.

Share this post


Link to post
Share on other sites
Don''t you watch scifi? It would do something like decide that the internet traffic you are requesting is really an attack and take down that web server, and then the next you asked for, ad infinitum(sp?) until it ruled the world.

Share this post


Link to post
Share on other sites
it would be great until it realized that humans are the greatest threat, and launch the nukes...

Share this post


Link to post
Share on other sites
Now, i know that most of you guys are going to think tha tI am crazy, and maybe I am, but me and one of my friends were talking about this at the time Blaster came out, and we came up with the same sort of idea, except our model had a "blocking" device that would not let it turn on us. Basicly, it couldn''t learn to much, it''s primary duty was to hack back at people and act as a proxy firewall. Our''s wasn''t voice activated though...

Anyway, I am a major computer security geek. I love the stuff... I check CERT at least once a day... like I said call me crazy... I also do think that some day in the near future something like this will happen. They''ve got to do something about proxy servers on a LAN though, the security for those is real weak. That would be the strong point of an AI system, it could strengthen its level of plociy denial whenever it saw fit. I think that an idea like this is very exciting... if you couldn''t already tell

Share this post


Link to post
Share on other sites
It might be done.. but throwing strong viruses to the attackers?, as long as they arent viruses that will spread through the web ...

Share this post


Link to post
Share on other sites
We can''t even teach a football to play football right... and football has rules! How are we going to have it stop hackers when there are no rules to hacking?

Dave Mark - President and Lead Designer
Intrinsic Algorithm -
"Reducing the world to mathematical equations!"

Share this post


Link to post
Share on other sites
There are already AI network monitors that attempt to identify illegitimate events on the network and discern whether these are security breaches or not. This sort of research has been going on for quite some time and there are several systems that I saw at PRICAI''00 that offered reasonable results.

None of these systems though attempted to attack the source. They merely cut it out of the network. With the advent of vLAN technology, this should be even easier to accomplish.

Timkin

Share this post


Link to post
Share on other sites

  • Advertisement
×

Important Information

By using GameDev.net, you agree to our community Guidelines, Terms of Use, and Privacy Policy.

Participate in the game development conversation and more when you create an account on GameDev.net!

Sign me up!