Who has the best AI wins the games.
The term artificial intelligence or AI means computer or computer program. That can select the route for solving the problem. Artificial intelligence might have two or three routes that it can use in certain situations. In the simplest model, the AI has a mission to put the rain cover over some machines if there is a rainy day.
So the AI can simply ask the operator is there raining? If there is rain the AI can put the cover over machines. And if there is no rain that system can leave the machines without protection. In a little bit more complicated model the AI can select from two rain cover. The other uses a warming system- And another does not use them.
The AI can have a model that if the temperature is below zero. It selects the warmed cover. And if it's over zero. The AI selects a cover without a heater. That process can be automatized by connecting the computer with the thermometer. The data about the temperature can be taken automatically from the thermometer. This is a simplified version of the AI.
The AI is always the best in cases where the system operates in limited areas. And process only certain types of data. That kind of system uses precise logic. And solutions are programmed inside the system accurately by programmers. But then we can think of the situation that the AI must solve problems in a large or changing environment.
The protection against old-fashion computer viruses is quite easy.
The first computer programs were BAT:s the command lines that drove certain computer programs automatically. The normal virus was the BAT that activated some computer program like "format". In those cases, the name of the "format" was simply changed. The solution against that kind of viruses was simple. The "format" program must always warn what it is going to do. And then the modern computers must protect to deny the use of the old "format" programs.
The AI can search malicious code from the computers. This is the thing where AI is the best. The AI searches things like commands that purpose is to delete files from the system or open routes to the firewall. Normally destructive viruses simply tried to delete command files.
Or they have just automatized the use of some disk management programs. That is used as an example to erase the partition of the disks. The defense against that type of viruses can simply make. by denying echo the del-command and also the automatization of fdisk.com can be denied. That thing was enough against the old-time viruses. But the modern programming tools are making it possible to create more complicated code than ever before.
The race between advanced virus defense against advanced computer viruses.
That kind of AI can operate as a firewall or antivirus program. The AI should find the virus code from the trillions of bits of data. The form of computer viruses is always changing. And the AI should know what type of code it should be looking for. The modern viruses code of malicious software is hidden in the regular program code.
The thing that makes things like films very popular platforms for delivering viruses is simple. The malicious code is between the images of the film. And there is somewhere the computer program that collects the malicious code together.
The modern virus scanner must find the virus code. That is is slipping in the system in many forms. The virus code might be between the TCP-IP packages. But the problem is that the virus code is not between every package. And in the most modern viruses, the virus code can use uncertain geometry. That means the number of TCP/IP packages between virus codes is chancing.
Modern data viruses are slipped into the target system by using multiple files as the carrier. The system bases the idea that there is a collector. The computer program is not malicious itself. The purpose of that part of the code is to collect the data of the viruses together. The thing is the advanced virus scanners and firewalls should detect malicious code. And if the code can pass those barriers.
That means the hackers have very advanced tools for making the program code. But making that kind of software requires also other things than just good tools. That thing requires time and skills but also a test environment where hackers tested those viruses. That their code can pass the virus scanners and firewalls. Also, hackers must use customized programming tools that don't cause alarms. When they are making their code. Network-based applications are the tools that make alarm if somebody tries to create the malicious code.
Comments
Post a Comment