{"id":78968,"date":"2021-11-27T00:50:59","date_gmt":"2021-11-27T00:50:59","guid":{"rendered":"https:\/\/websitedesigns.com.au\/elankanew\/?p=78968"},"modified":"2021-11-27T01:03:03","modified_gmt":"2021-11-27T01:03:03","slug":"ai-usages-in-cyber-security-by-aditya-abeysinghe","status":"publish","type":"post","link":"https:\/\/websitedesigns.com.au\/elankanew\/ai-usages-in-cyber-security-by-aditya-abeysinghe\/","title":{"rendered":"AI usages in cyber security  By Aditya Abeysinghe"},"content":{"rendered":"<h1 style=\"text-align: center;\"><span style=\"font-size: 24px; color: #000080;\"><strong>AI usages in cyber security<\/strong><\/span><\/h1>\n<h1 style=\"text-align: center;\"><span style=\"font-size: 24px; color: #008080;\"><strong>By Aditya Abeysinghe<\/strong><\/span><\/h1>\n<p><strong> <img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-78969\" src=\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2021\/11\/Cyber-Security-AI.jpg\" alt=\"AI usages in cyber security By Aditya Abeysinghe\" width=\"400\" height=\"126\" \/><\/strong><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 16px; color: #000000;\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-75845 alignleft\" src=\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2021\/10\/Aditya-Abeysinghe160.jpg\" alt=\"\" width=\"160\" height=\"141\" \/>Security on the internet has been a discussed issue for quite some time. When thinking about security on the internet, security in communications between users and services, security in the cloud and other types of security need to be thought. With increasing use of the internet and newer attacks to systems, securing internet systems has been a long-discussed issue. Many systems which have higher user interactions are using Artificial intelligence (AI) to automate prevention of attacks to safeguard systems.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 16px; color: #000000;\"><strong>Where is AI in cyber security?<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 16px; color: #000000;\">AI systems can detect, predict or classify attacks from captured network data. Different types of algorithms which either predict or classify output(s) based on network data can be used to detect attacks. AI systems trained on data from a network can be used to detect when a change from the normal network activity is detected. Classification algorithms can be used to classify anomalies in networks and predictions can be used to predict network activity. Therefore, different types of attacks which are new to systems can be detected and prevented using AI models.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 16px; color: #000000;\">Natural language processing is a technique where data is processed using natural language and speech. Many systems use AI for interacting with users such as using chatbots, voice and text input menus etc. Natural language processing can be used to convert user inputs to machine readable format and break sentences to words. Then AI algorithms can detect anomalies in these data and predict attacks based on these anomalies.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 16px; color: #000000;\">Cloud services use AI to monitor systems and fix issues in networks and different services allocated by users. Many resources provided by these cloud services are used by large number of customers and their usage vary based on various factors. Monitoring such a large volume of user interactions using usual network attack detecting methods is often not feasible. Therefore, AI is used to automatically detect any anomalies from known network activity and then alert both users and providers.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 16px; color: #000000;\"><strong>What are the advantages?<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 16px; color: #000000;\">With the volume of users on the internet monitoring network attacks is often not practical for detection systems which are based on non-AI based methods. Reasons for this are varied network attacks on the internet and the inability of non-AI methods to perform predictions on how the network will behave under certain event triggers. AI algorithms which classify attacks in networks often can self-learn and change their functions automatically without manual training. Therefore, novel attacks could be detected using AI-based detections as opposed to signature-based methods used in non-AI detection methods.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 16px; color: #000000;\">Most network detectors used to detect network attacks are costly to purchase and maintain. However, most AI models could be purchased and used without any additional charges. Large businesses which need to detect attacks in their systems also develop their own AI algorithms. Therefore, these AI models could be made for their own needs and have minimal side effects when deployed. AI models also have minimal storage requirements compared to most hardware-based monitoring systems and can be easily upgraded at less cost and effort.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 16px; color: #000000;\"><strong>Downsides<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 16px; color: #000000;\">The main disadvantage of using AI models is that they require large datasets to train and test before being used. These datasets are often not available for public or are not suitable for most custom AI models. Therefore, network data required to train models need to be obtained and then cleaned. This is often a time consuming and costly process which also require experts in data analysis and AI.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 16px; color: #000000;\">Another disadvantage of AI models is their high computational usage during detection and model training. Many large-scale businesses use large scale servers which are costly and need separate space for hosting. Also, other services which should be used with AI services need to be merged. Therefore, additional costs in designing, integrating, and testing the platform need to be incurred.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 16px; color: #000000;\"><strong>Image Courtesy: <\/strong><a style=\"color: #000000;\" href=\"https:\/\/xgrcsoftware.com\" target=\"_blank\" rel=\"noopener\"><strong>https:\/\/xgrcsoftware.com<\/strong><\/a><\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>AI usages in cyber security By Aditya Abeysinghe Security on the internet has been a discussed issue for quite some time. When thinking about security on the internet, security in communications between users and services, security in the cloud and other types of security need to be thought. With increasing use of the internet and [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":78969,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"aside","meta":{"footnotes":""},"categories":[33978,20],"tags":[39717,39718,30135,39719,5812],"class_list":{"0":"post-78968","1":"post","2":"type-post","3":"status-publish","4":"format-aside","5":"has-post-thumbnail","7":"category-aditya-abeysinghe","8":"category-articles","9":"tag-ai","10":"tag-ai-services","11":"tag-artificial-intelligence","12":"tag-cloud-services","13":"tag-security","14":"post_format-post-format-aside"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.7.1 (Yoast SEO v25.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>AI usages in cyber security By Aditya Abeysinghe - eLanka<\/title>\n<meta name=\"description\" content=\"Security on the internet has been a discussed issue for quite some time. When thinking about security on the internet, security in communications between users and services, security in the cloud and other types of security need to be thought. With increasing use of the internet and newer attacks to systems, securing internet systems has been a long-discussed issue. Many systems which have higher user interactions are using Artificial intelligence (AI) to automate prevention of attacks to safeguard systems.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI usages in cyber security By Aditya Abeysinghe\" \/>\n<meta property=\"og:description\" content=\"Security on the internet has been a discussed issue for quite some time. When thinking about security on the internet, security in communications between users and services, security in the cloud and other types of security need to be thought. With increasing use of the internet and newer attacks to systems, securing internet systems has been a long-discussed issue. Many systems which have higher user interactions are using Artificial intelligence (AI) to automate prevention of attacks to safeguard systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/websitedesigns.com.au\/elankanew\/ai-usages-in-cyber-security-by-aditya-abeysinghe\/\" \/>\n<meta property=\"og:site_name\" content=\"eLanka\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/eLanka.com.au\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-27T00:50:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-27T01:03:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2021\/11\/Cyber-Security-AI.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"126\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"eLanka admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"eLanka admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/ai-usages-in-cyber-security-by-aditya-abeysinghe\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/ai-usages-in-cyber-security-by-aditya-abeysinghe\/\"},\"author\":{\"name\":\"eLanka admin\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/person\/f6e635b74ab35ef88a68a9973cacc5bd\"},\"headline\":\"AI usages in cyber security By Aditya Abeysinghe\",\"datePublished\":\"2021-11-27T00:50:59+00:00\",\"dateModified\":\"2021-11-27T01:03:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/ai-usages-in-cyber-security-by-aditya-abeysinghe\/\"},\"wordCount\":654,\"publisher\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#organization\"},\"image\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/ai-usages-in-cyber-security-by-aditya-abeysinghe\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2021\/11\/Cyber-Security-AI.jpg\",\"keywords\":[\"AI\",\"AI services\",\"Artificial intelligence\",\"Cloud services\",\"Security\"],\"articleSection\":[\"Aditya Abeysinghe\",\"Articles\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/ai-usages-in-cyber-security-by-aditya-abeysinghe\/\",\"url\":\"https:\/\/websitedesigns.com.au\/elankanew\/ai-usages-in-cyber-security-by-aditya-abeysinghe\/\",\"name\":\"AI usages in cyber security By Aditya Abeysinghe - eLanka\",\"isPartOf\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/ai-usages-in-cyber-security-by-aditya-abeysinghe\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/ai-usages-in-cyber-security-by-aditya-abeysinghe\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2021\/11\/Cyber-Security-AI.jpg\",\"datePublished\":\"2021-11-27T00:50:59+00:00\",\"dateModified\":\"2021-11-27T01:03:03+00:00\",\"description\":\"Security on the internet has been a discussed issue for quite some time. When thinking about security on the internet, security in communications between users and services, security in the cloud and other types of security need to be thought. With increasing use of the internet and newer attacks to systems, securing internet systems has been a long-discussed issue. Many systems which have higher user interactions are using Artificial intelligence (AI) to automate prevention of attacks to safeguard systems.\",\"breadcrumb\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/ai-usages-in-cyber-security-by-aditya-abeysinghe\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/websitedesigns.com.au\/elankanew\/ai-usages-in-cyber-security-by-aditya-abeysinghe\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/ai-usages-in-cyber-security-by-aditya-abeysinghe\/#primaryimage\",\"url\":\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2021\/11\/Cyber-Security-AI.jpg\",\"contentUrl\":\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2021\/11\/Cyber-Security-AI.jpg\",\"width\":400,\"height\":126,\"caption\":\"AI usages in cyber security By Aditya Abeysinghe\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/ai-usages-in-cyber-security-by-aditya-abeysinghe\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/websitedesigns.com.au\/elankanew\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Articles\",\"item\":\"https:\/\/websitedesigns.com.au\/elankanew\/category\/articles\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"AI usages in cyber security By Aditya Abeysinghe\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#website\",\"url\":\"https:\/\/websitedesigns.com.au\/elankanew\/\",\"name\":\"eLanka\",\"description\":\"eLanka - Sri lanka events in Australia\",\"publisher\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/websitedesigns.com.au\/elankanew\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#organization\",\"name\":\"eLanka\",\"url\":\"https:\/\/websitedesigns.com.au\/elankanew\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2020\/03\/elanka-logo.jpg\",\"contentUrl\":\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2020\/03\/elanka-logo.jpg\",\"width\":192,\"height\":82,\"caption\":\"eLanka\"},\"image\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/eLanka.com.au\/\",\"https:\/\/www.linkedin.com\/in\/elanka\/\",\"https:\/\/www.youtube.com\/user\/SriLankanDownUnder\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/person\/f6e635b74ab35ef88a68a9973cacc5bd\",\"name\":\"eLanka admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2e0d346a7f97b80e861cdeafe7b7de523b59f5060666f1a5da8369457bf9b6c3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2e0d346a7f97b80e861cdeafe7b7de523b59f5060666f1a5da8369457bf9b6c3?s=96&d=mm&r=g\",\"caption\":\"eLanka admin\"},\"sameAs\":[\"https:\/\/websitedesigns.com.au\/elankanew\"],\"url\":\"https:\/\/websitedesigns.com.au\/elankanew\/author\/elanka\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"AI usages in cyber security By Aditya Abeysinghe - eLanka","description":"Security on the internet has been a discussed issue for quite some time. When thinking about security on the internet, security in communications between users and services, security in the cloud and other types of security need to be thought. With increasing use of the internet and newer attacks to systems, securing internet systems has been a long-discussed issue. Many systems which have higher user interactions are using Artificial intelligence (AI) to automate prevention of attacks to safeguard systems.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"AI usages in cyber security By Aditya Abeysinghe","og_description":"Security on the internet has been a discussed issue for quite some time. When thinking about security on the internet, security in communications between users and services, security in the cloud and other types of security need to be thought. With increasing use of the internet and newer attacks to systems, securing internet systems has been a long-discussed issue. Many systems which have higher user interactions are using Artificial intelligence (AI) to automate prevention of attacks to safeguard systems.","og_url":"https:\/\/websitedesigns.com.au\/elankanew\/ai-usages-in-cyber-security-by-aditya-abeysinghe\/","og_site_name":"eLanka","article_publisher":"https:\/\/www.facebook.com\/eLanka.com.au\/","article_published_time":"2021-11-27T00:50:59+00:00","article_modified_time":"2021-11-27T01:03:03+00:00","og_image":[{"width":400,"height":126,"url":"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2021\/11\/Cyber-Security-AI.jpg","type":"image\/jpeg"}],"author":"eLanka admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"eLanka admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/websitedesigns.com.au\/elankanew\/ai-usages-in-cyber-security-by-aditya-abeysinghe\/#article","isPartOf":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/ai-usages-in-cyber-security-by-aditya-abeysinghe\/"},"author":{"name":"eLanka admin","@id":"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/person\/f6e635b74ab35ef88a68a9973cacc5bd"},"headline":"AI usages in cyber security By Aditya Abeysinghe","datePublished":"2021-11-27T00:50:59+00:00","dateModified":"2021-11-27T01:03:03+00:00","mainEntityOfPage":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/ai-usages-in-cyber-security-by-aditya-abeysinghe\/"},"wordCount":654,"publisher":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/#organization"},"image":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/ai-usages-in-cyber-security-by-aditya-abeysinghe\/#primaryimage"},"thumbnailUrl":"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2021\/11\/Cyber-Security-AI.jpg","keywords":["AI","AI services","Artificial intelligence","Cloud services","Security"],"articleSection":["Aditya Abeysinghe","Articles"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/websitedesigns.com.au\/elankanew\/ai-usages-in-cyber-security-by-aditya-abeysinghe\/","url":"https:\/\/websitedesigns.com.au\/elankanew\/ai-usages-in-cyber-security-by-aditya-abeysinghe\/","name":"AI usages in cyber security By Aditya Abeysinghe - eLanka","isPartOf":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/#website"},"primaryImageOfPage":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/ai-usages-in-cyber-security-by-aditya-abeysinghe\/#primaryimage"},"image":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/ai-usages-in-cyber-security-by-aditya-abeysinghe\/#primaryimage"},"thumbnailUrl":"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2021\/11\/Cyber-Security-AI.jpg","datePublished":"2021-11-27T00:50:59+00:00","dateModified":"2021-11-27T01:03:03+00:00","description":"Security on the internet has been a discussed issue for quite some time. When thinking about security on the internet, security in communications between users and services, security in the cloud and other types of security need to be thought. With increasing use of the internet and newer attacks to systems, securing internet systems has been a long-discussed issue. Many systems which have higher user interactions are using Artificial intelligence (AI) to automate prevention of attacks to safeguard systems.","breadcrumb":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/ai-usages-in-cyber-security-by-aditya-abeysinghe\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/websitedesigns.com.au\/elankanew\/ai-usages-in-cyber-security-by-aditya-abeysinghe\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/websitedesigns.com.au\/elankanew\/ai-usages-in-cyber-security-by-aditya-abeysinghe\/#primaryimage","url":"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2021\/11\/Cyber-Security-AI.jpg","contentUrl":"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2021\/11\/Cyber-Security-AI.jpg","width":400,"height":126,"caption":"AI usages in cyber security By Aditya Abeysinghe"},{"@type":"BreadcrumbList","@id":"https:\/\/websitedesigns.com.au\/elankanew\/ai-usages-in-cyber-security-by-aditya-abeysinghe\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/websitedesigns.com.au\/elankanew\/"},{"@type":"ListItem","position":2,"name":"Articles","item":"https:\/\/websitedesigns.com.au\/elankanew\/category\/articles\/"},{"@type":"ListItem","position":3,"name":"AI usages in cyber security By Aditya Abeysinghe"}]},{"@type":"WebSite","@id":"https:\/\/websitedesigns.com.au\/elankanew\/#website","url":"https:\/\/websitedesigns.com.au\/elankanew\/","name":"eLanka","description":"eLanka - Sri lanka events in Australia","publisher":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/websitedesigns.com.au\/elankanew\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/websitedesigns.com.au\/elankanew\/#organization","name":"eLanka","url":"https:\/\/websitedesigns.com.au\/elankanew\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/logo\/image\/","url":"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2020\/03\/elanka-logo.jpg","contentUrl":"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2020\/03\/elanka-logo.jpg","width":192,"height":82,"caption":"eLanka"},"image":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/eLanka.com.au\/","https:\/\/www.linkedin.com\/in\/elanka\/","https:\/\/www.youtube.com\/user\/SriLankanDownUnder"]},{"@type":"Person","@id":"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/person\/f6e635b74ab35ef88a68a9973cacc5bd","name":"eLanka admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2e0d346a7f97b80e861cdeafe7b7de523b59f5060666f1a5da8369457bf9b6c3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2e0d346a7f97b80e861cdeafe7b7de523b59f5060666f1a5da8369457bf9b6c3?s=96&d=mm&r=g","caption":"eLanka admin"},"sameAs":["https:\/\/websitedesigns.com.au\/elankanew"],"url":"https:\/\/websitedesigns.com.au\/elankanew\/author\/elanka\/"}]}},"_links":{"self":[{"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/posts\/78968","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/comments?post=78968"}],"version-history":[{"count":2,"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/posts\/78968\/revisions"}],"predecessor-version":[{"id":78974,"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/posts\/78968\/revisions\/78974"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/media\/78969"}],"wp:attachment":[{"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/media?parent=78968"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/categories?post=78968"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/tags?post=78968"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}