Today, the diversity of malware and threats exponentially increases. The increase in malware and threat types is estimated to exceed 8 million annually. CYBERDROIDs have significant operational potentials, especially in the maintenance of cyber security and information systems. In cyber security infrastructures against threats and malware, the development process started from the installation of devices and security software at different levels on the network to the establishment of the security operations center (SOC).
However, determination of the best strategies to identify the threats and their content variability for different situations are still carried out with intensive cyber security expertise. As artificial intelligence technology advances, the possibility of computers to provide autonomous services including intensive cognitive functions increases. CYBERDROIDs have emerged as an important tool in spite of increasing diverse threat and malware with high cognitive functions. In addition to mobile devices, we are in a period of widespread Internet of Things (IoT) applications. The number of devices connected to the Internet has exceeded 20 billion in the world and continues to increase rapidly. Research has shown that the growing need is actually higher than predicted and this leads to a number of undiagnosed problems, the effects of information security to system operating defects can be partially comprehensible at further stages. The use of CYBERDROIDs for cyber security is a strategic move in meeting the evolving need of human-like cognitive functions. CRYPTTECH is the first cyber security company in the world that demonstrates the use of CYBERDROID with humanoid cognitive functions. The use of CYBERDROID in the future cyber defense systems is considered to be inevitable.
Unlike traditional methods of machine learning, CYBERDROIDs have four main features that bring them closer to humanoid behavior and abilities. There are cortical networks between their sensor and perception just like human beings. These networks provide efficient coding of data-to-information conversion and inferring their differentiating properties by coding based on neuromorphic calculation as in humans. Another important feature is the state awareness by fusion to the coded information passing through different sensor cortices. This is a very important stage in the acquisition of humanoid behavior skills into machines. Sequential coding of the sensor cortices with contextual cortical networks provides state awareness.
CYBERDROIDs can be adapted to fixed network security devices in a discrete box structure in the future or can be used in mobile critical infrastructure such as transportation systems, autonomous vehicles. They will also provide high energy efficiency in cyber security with the development of neuromorphic computing. The first examples of neuromorphic processors have been successfully implemented by DARPA, which established the first internet network, in target tracking application in combat aircraft. Machine learning, especially developed with artificial neural networks, gained momentum with convolutional neural networks after 2010 and increased the commercialization rate after 2015. In this development process, CYBERDROIDs have a significant advantage especially in cyber security and cyber defense by its ability to making decisions to inferences with context awareness. CYBERDROIDs will continue to increase their superiority in services & applications in the road map of artificial intelligence on low power consumption structures parallel to neuromorphism.