International Journal For Multidisciplinary Research
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Plagiarism is checked by the leading plagiarism checker
Volume 5 Issue 6
Agent Tarini: A New Generation of AI Cyber Security Agents
|Author(s)||Mandar Borkar, Naman Shetty, Vijay Hatte, Hashmi Omer, Priyans hu Jadhav, Prof. Nikita Kawase, Prof. Deepak K. Sharma|
|Abstract||Cyber attacks pose a serious threat to organizations of all sizes. It is important to have good security to prevent these attacks. One promising approach to cybersecurity is the use of artificial intelligence (AI) agents. AI agents can be used to detect, identify and respond to cyber attacks in real time.
This article introduces Tarini, a new AI agent that can be used to block network attacks and create advanced viruses to attack attackers so that the body that causes connection and connection failure does not infect one's computer. network A security system that leaks sensitive information and prints and stores evidence of an attacker's attack. Tarini is also ready to protect and remove beacons, constantly track the attacker's information and network activity, contact the server to continue the attack, and use all evidence to defeat the opponent. Once Tarini completes his mission to destroy all of the network attacker's defenses, he will delete his characters and hide them on the server until he receives orders from the agent.
|Published In||Volume 5, Issue 6, November-December 2023|
|Cite This||Agent Tarini: A New Generation of AI Cyber Security Agents - Mandar Borkar, Naman Shetty, Vijay Hatte, Hashmi Omer, Priyans hu Jadhav, Prof. Nikita Kawase, Prof. Deepak K. Sharma - IJFMR Volume 5, Issue 6, November-December 2023. DOI 10.36948/ijfmr.2023.v05i06.8902|
CrossRef DOI is assigned to each research paper published in our journal.
IJFMR DOI prefix is
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.