{"id":99732,"date":"2022-09-17T04:18:56","date_gmt":"2022-09-17T04:18:56","guid":{"rendered":"https:\/\/websitedesigns.com.au\/elankanew\/?p=99732"},"modified":"2022-09-17T04:21:59","modified_gmt":"2022-09-17T04:21:59","slug":"changing-cybersecurity-use-with-ai-models-by-aditya-abeysinghe","status":"publish","type":"post","link":"https:\/\/websitedesigns.com.au\/elankanew\/changing-cybersecurity-use-with-ai-models-by-aditya-abeysinghe\/","title":{"rendered":"Changing cybersecurity use with AI models &#8211; By Aditya Abeysinghe"},"content":{"rendered":"<h2 style=\"text-align: center;\"><span style=\"color: #333333;\"><strong>Changing cybersecurity use with AI models\u00a0 &#8211; <\/strong><span style=\"color: #666699;\"><strong>By Aditya Abeysinghe<\/strong><\/span><\/span><\/h2>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 16px; color: #000000;\"><strong><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-75845 alignleft\" src=\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2021\/10\/Aditya-Abeysinghe160.jpg\" alt=\"Aditya-Abeysinghe\" width=\"160\" height=\"141\" \/>Use of AI and Machine learning<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 16px; color: #000000;\">There are many uses of Artificial Intelligence (AI) and machine learning (ML) in cybersecurity. The advantage of using AI and ML for cybersecurity is that AI and ML models can learn and then identify attacks which are known and\/or unknown in a system. Models which are based on AI and ML can identify anomalies when there is a change of usual traffic. In classification, content is classified as attacks based on the output of a model.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 16px; color: #000000;\"><strong>Benefits of AI models to identify attacks<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 16px; color: #000000;\">AI models can be used to automate detection of attacks more effectively than by using other methods. AI models are used to enhance anomaly identification or classifications in networks with less time than manual identification based on analysis. Unlike other attack classification and anomaly detection methods, methods that use AI models can identify attacks which are unknown more precisely as models can learn and improve inner classification or detection properties.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 16px; color: #000000;\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-99733 alignright\" src=\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2022\/09\/AI-in-Cybersecurity.jpg\" alt=\"cybersecurity | elanka\" width=\"259\" height=\"194\" \/>AI models can also decrease time taken to detect attacks by improving model properties. Systems that do not use AI models use only rules that are defined before being used in a system. They can hardly be updated after being used in a system and hence are hard to adapt to new attacks. However, manual analysis and changes in components used for identification is usually not necessary in AI and ML models which reduces time taken for identification.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 16px; color: #000000;\">Extensibility and adaptability of AI models are higher compared to other methods of identifying cyberattacks. AI models can easily be trained with new parameters and tested on new data. In contrast, testing non-AI based systems require large time, effort and cost due to large amount of changes and tools required. Also, changes and tests using one method might not be suitable for all components of a system. However, in AI models a standardized methodology is used to train and test based on known methods. This reduces extra time and costs for applying separate changes in a system.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 16px; color: #000000;\"><strong>Issues with AI<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 16px; color: #000000;\">AI models are often known to be biased in output. Biasness often has issues with the accuracy of classification or prediction of a model. Therefore, on AI-based systems cyberattacks could be classified as benign and non-attacks could be classified as attacks when used in networks. Also, biasness is an issue in most modern AI models as they could learn from current data and improve without manual input.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 16px; color: #000000;\">Another issue is that complex AI-based models are often not explainable due to hidden processes used. Output of neural networks and deep learning models are often difficult to be explained due to this issue. Due to issues in explainability, issues in non-AI based components are often easy to be identified as there are less hidden processes that such systems use.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 16px; color: #000000;\"><strong>AI use in cybersecurity is rising<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 16px; color: #000000;\">AI was rarely used when cybersecurity was initially added to secure networks. Also, many complex models are used only recently. Lack of tools, technical expertise, and resources to deploy models are the possible causes of not using models during this early usage. With rising use of AI in many applications and tools required to build models are downloadable at low cost, use of AI models to secure cybersecurity apps is growing.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 16px; color: #000000;\"><strong>Image Courtesy: <\/strong><span style=\"color: #000080;\"><a style=\"color: #000080;\" href=\"https:\/\/ciosea.economictimes.indiatimes.com\/\" target=\"_blank\" rel=\"noopener\"><strong>https:\/\/ciosea.economictimes.indiatimes.com\/<\/strong><\/a><\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Changing cybersecurity use with AI models\u00a0 &#8211; By Aditya Abeysinghe &nbsp; Use of AI and Machine learning There are many uses of Artificial Intelligence (AI) and machine learning (ML) in cybersecurity. The advantage of using AI and ML for cybersecurity is that AI and ML models can learn and then identify attacks which are known [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":99733,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"aside","meta":{"footnotes":""},"categories":[33978,20],"tags":[47786,30135,47783,47785,28336,47788,35809,47784,47787],"class_list":{"0":"post-99732","1":"post","2":"type-post","3":"status-publish","4":"format-aside","5":"has-post-thumbnail","7":"category-aditya-abeysinghe","8":"category-articles","9":"tag-ai-based-systems","10":"tag-artificial-intelligence","11":"tag-benefits-of-ai-models","12":"tag-cyberattacks","13":"tag-cybersecurity","14":"tag-cybersecurity-apps","15":"tag-machine-learning","16":"tag-ml-models","17":"tag-secure-networks","18":"post_format-post-format-aside"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.7.1 (Yoast SEO v25.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Changing cybersecurity use with AI models - By Aditya Abeysinghe - eLanka<\/title>\n<meta name=\"description\" content=\"There are many uses of Artificial Intelligence (AI) and machine learning (ML) in cybersecurity. The advantage of using AI and\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Changing cybersecurity use with AI models - By Aditya Abeysinghe\" \/>\n<meta property=\"og:description\" content=\"There are many uses of Artificial Intelligence (AI) and machine learning (ML) in cybersecurity. The advantage of using AI and\" \/>\n<meta property=\"og:url\" content=\"https:\/\/websitedesigns.com.au\/elankanew\/changing-cybersecurity-use-with-ai-models-by-aditya-abeysinghe\/\" \/>\n<meta property=\"og:site_name\" content=\"eLanka\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/eLanka.com.au\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-17T04:18:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-17T04:21:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2022\/09\/AI-in-Cybersecurity.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"259\" \/>\n\t<meta property=\"og:image:height\" content=\"194\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"eLanka admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"eLanka admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/changing-cybersecurity-use-with-ai-models-by-aditya-abeysinghe\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/changing-cybersecurity-use-with-ai-models-by-aditya-abeysinghe\/\"},\"author\":{\"name\":\"eLanka admin\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/person\/f6e635b74ab35ef88a68a9973cacc5bd\"},\"headline\":\"Changing cybersecurity use with AI models &#8211; By Aditya Abeysinghe\",\"datePublished\":\"2022-09-17T04:18:56+00:00\",\"dateModified\":\"2022-09-17T04:21:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/changing-cybersecurity-use-with-ai-models-by-aditya-abeysinghe\/\"},\"wordCount\":570,\"publisher\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#organization\"},\"image\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/changing-cybersecurity-use-with-ai-models-by-aditya-abeysinghe\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2022\/09\/AI-in-Cybersecurity.jpg\",\"keywords\":[\"AI-based systems\",\"Artificial intelligence\",\"Benefits of AI models\",\"cyberattacks\",\"cybersecurity\",\"cybersecurity apps\",\"Machine Learning\",\"ML models\",\"secure networks\"],\"articleSection\":[\"Aditya Abeysinghe\",\"Articles\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/changing-cybersecurity-use-with-ai-models-by-aditya-abeysinghe\/\",\"url\":\"https:\/\/websitedesigns.com.au\/elankanew\/changing-cybersecurity-use-with-ai-models-by-aditya-abeysinghe\/\",\"name\":\"Changing cybersecurity use with AI models - By Aditya Abeysinghe - eLanka\",\"isPartOf\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/changing-cybersecurity-use-with-ai-models-by-aditya-abeysinghe\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/changing-cybersecurity-use-with-ai-models-by-aditya-abeysinghe\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2022\/09\/AI-in-Cybersecurity.jpg\",\"datePublished\":\"2022-09-17T04:18:56+00:00\",\"dateModified\":\"2022-09-17T04:21:59+00:00\",\"description\":\"There are many uses of Artificial Intelligence (AI) and machine learning (ML) in cybersecurity. The advantage of using AI and\",\"breadcrumb\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/changing-cybersecurity-use-with-ai-models-by-aditya-abeysinghe\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/websitedesigns.com.au\/elankanew\/changing-cybersecurity-use-with-ai-models-by-aditya-abeysinghe\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/changing-cybersecurity-use-with-ai-models-by-aditya-abeysinghe\/#primaryimage\",\"url\":\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2022\/09\/AI-in-Cybersecurity.jpg\",\"contentUrl\":\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2022\/09\/AI-in-Cybersecurity.jpg\",\"width\":259,\"height\":194,\"caption\":\"cybersecurity | elanka\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/changing-cybersecurity-use-with-ai-models-by-aditya-abeysinghe\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/websitedesigns.com.au\/elankanew\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Articles\",\"item\":\"https:\/\/websitedesigns.com.au\/elankanew\/category\/articles\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Changing cybersecurity use with AI models &#8211; By Aditya Abeysinghe\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#website\",\"url\":\"https:\/\/websitedesigns.com.au\/elankanew\/\",\"name\":\"eLanka\",\"description\":\"eLanka - Sri lanka events in Australia\",\"publisher\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/websitedesigns.com.au\/elankanew\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#organization\",\"name\":\"eLanka\",\"url\":\"https:\/\/websitedesigns.com.au\/elankanew\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2020\/03\/elanka-logo.jpg\",\"contentUrl\":\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2020\/03\/elanka-logo.jpg\",\"width\":192,\"height\":82,\"caption\":\"eLanka\"},\"image\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/eLanka.com.au\/\",\"https:\/\/www.linkedin.com\/in\/elanka\/\",\"https:\/\/www.youtube.com\/user\/SriLankanDownUnder\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/person\/f6e635b74ab35ef88a68a9973cacc5bd\",\"name\":\"eLanka admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2e0d346a7f97b80e861cdeafe7b7de523b59f5060666f1a5da8369457bf9b6c3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2e0d346a7f97b80e861cdeafe7b7de523b59f5060666f1a5da8369457bf9b6c3?s=96&d=mm&r=g\",\"caption\":\"eLanka admin\"},\"sameAs\":[\"https:\/\/websitedesigns.com.au\/elankanew\"],\"url\":\"https:\/\/websitedesigns.com.au\/elankanew\/author\/elanka\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Changing cybersecurity use with AI models - By Aditya Abeysinghe - eLanka","description":"There are many uses of Artificial Intelligence (AI) and machine learning (ML) in cybersecurity. The advantage of using AI and","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Changing cybersecurity use with AI models - By Aditya Abeysinghe","og_description":"There are many uses of Artificial Intelligence (AI) and machine learning (ML) in cybersecurity. The advantage of using AI and","og_url":"https:\/\/websitedesigns.com.au\/elankanew\/changing-cybersecurity-use-with-ai-models-by-aditya-abeysinghe\/","og_site_name":"eLanka","article_publisher":"https:\/\/www.facebook.com\/eLanka.com.au\/","article_published_time":"2022-09-17T04:18:56+00:00","article_modified_time":"2022-09-17T04:21:59+00:00","og_image":[{"width":259,"height":194,"url":"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2022\/09\/AI-in-Cybersecurity.jpg","type":"image\/jpeg"}],"author":"eLanka admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"eLanka admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/websitedesigns.com.au\/elankanew\/changing-cybersecurity-use-with-ai-models-by-aditya-abeysinghe\/#article","isPartOf":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/changing-cybersecurity-use-with-ai-models-by-aditya-abeysinghe\/"},"author":{"name":"eLanka admin","@id":"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/person\/f6e635b74ab35ef88a68a9973cacc5bd"},"headline":"Changing cybersecurity use with AI models &#8211; By Aditya Abeysinghe","datePublished":"2022-09-17T04:18:56+00:00","dateModified":"2022-09-17T04:21:59+00:00","mainEntityOfPage":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/changing-cybersecurity-use-with-ai-models-by-aditya-abeysinghe\/"},"wordCount":570,"publisher":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/#organization"},"image":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/changing-cybersecurity-use-with-ai-models-by-aditya-abeysinghe\/#primaryimage"},"thumbnailUrl":"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2022\/09\/AI-in-Cybersecurity.jpg","keywords":["AI-based systems","Artificial intelligence","Benefits of AI models","cyberattacks","cybersecurity","cybersecurity apps","Machine Learning","ML models","secure networks"],"articleSection":["Aditya Abeysinghe","Articles"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/websitedesigns.com.au\/elankanew\/changing-cybersecurity-use-with-ai-models-by-aditya-abeysinghe\/","url":"https:\/\/websitedesigns.com.au\/elankanew\/changing-cybersecurity-use-with-ai-models-by-aditya-abeysinghe\/","name":"Changing cybersecurity use with AI models - By Aditya Abeysinghe - eLanka","isPartOf":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/#website"},"primaryImageOfPage":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/changing-cybersecurity-use-with-ai-models-by-aditya-abeysinghe\/#primaryimage"},"image":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/changing-cybersecurity-use-with-ai-models-by-aditya-abeysinghe\/#primaryimage"},"thumbnailUrl":"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2022\/09\/AI-in-Cybersecurity.jpg","datePublished":"2022-09-17T04:18:56+00:00","dateModified":"2022-09-17T04:21:59+00:00","description":"There are many uses of Artificial Intelligence (AI) and machine learning (ML) in cybersecurity. The advantage of using AI and","breadcrumb":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/changing-cybersecurity-use-with-ai-models-by-aditya-abeysinghe\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/websitedesigns.com.au\/elankanew\/changing-cybersecurity-use-with-ai-models-by-aditya-abeysinghe\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/websitedesigns.com.au\/elankanew\/changing-cybersecurity-use-with-ai-models-by-aditya-abeysinghe\/#primaryimage","url":"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2022\/09\/AI-in-Cybersecurity.jpg","contentUrl":"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2022\/09\/AI-in-Cybersecurity.jpg","width":259,"height":194,"caption":"cybersecurity | elanka"},{"@type":"BreadcrumbList","@id":"https:\/\/websitedesigns.com.au\/elankanew\/changing-cybersecurity-use-with-ai-models-by-aditya-abeysinghe\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/websitedesigns.com.au\/elankanew\/"},{"@type":"ListItem","position":2,"name":"Articles","item":"https:\/\/websitedesigns.com.au\/elankanew\/category\/articles\/"},{"@type":"ListItem","position":3,"name":"Changing cybersecurity use with AI models &#8211; By Aditya Abeysinghe"}]},{"@type":"WebSite","@id":"https:\/\/websitedesigns.com.au\/elankanew\/#website","url":"https:\/\/websitedesigns.com.au\/elankanew\/","name":"eLanka","description":"eLanka - Sri lanka events in Australia","publisher":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/websitedesigns.com.au\/elankanew\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/websitedesigns.com.au\/elankanew\/#organization","name":"eLanka","url":"https:\/\/websitedesigns.com.au\/elankanew\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/logo\/image\/","url":"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2020\/03\/elanka-logo.jpg","contentUrl":"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2020\/03\/elanka-logo.jpg","width":192,"height":82,"caption":"eLanka"},"image":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/eLanka.com.au\/","https:\/\/www.linkedin.com\/in\/elanka\/","https:\/\/www.youtube.com\/user\/SriLankanDownUnder"]},{"@type":"Person","@id":"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/person\/f6e635b74ab35ef88a68a9973cacc5bd","name":"eLanka admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2e0d346a7f97b80e861cdeafe7b7de523b59f5060666f1a5da8369457bf9b6c3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2e0d346a7f97b80e861cdeafe7b7de523b59f5060666f1a5da8369457bf9b6c3?s=96&d=mm&r=g","caption":"eLanka admin"},"sameAs":["https:\/\/websitedesigns.com.au\/elankanew"],"url":"https:\/\/websitedesigns.com.au\/elankanew\/author\/elanka\/"}]}},"_links":{"self":[{"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/posts\/99732","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/comments?post=99732"}],"version-history":[{"count":1,"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/posts\/99732\/revisions"}],"predecessor-version":[{"id":99734,"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/posts\/99732\/revisions\/99734"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/media\/99733"}],"wp:attachment":[{"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/media?parent=99732"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/categories?post=99732"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/tags?post=99732"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}