Authors :
Rajeshree Parihar
Volume/Issue :
Volume 9 - 2024, Issue 11 - November
Google Scholar :
https://tinyurl.com/3frhhtj6
Scribd :
https://tinyurl.com/4u3w7f3e
DOI :
https://doi.org/10.38124/ijisrt/24nov1610
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
The rapid evolution of cyber threats has outpaced traditional security measures, prompting organizations to
explore innovative solutions for threat detection and response. Artificial Intelligence (AI) has emerged as a powerful tool in
enhancing cybersecurity mechanisms, offering the potential to improve the speed, accuracy, and adaptability of threat
identification and mitigation. This paper investigates the role of AI in cybersecurity, focusing on its impact on threat
detection, response strategies, and overall system defense. By reviewing AI's capabilities in anomaly detection, malware
analysis, and automated response, the paper highlights both the advantages and challenges associated with AI adoption in
cybersecurity. It concludes that while AI significantly strengthens cybersecurity measures, its integration requires
addressing issues such as algorithm bias, data privacy concerns, and the potential for adversarial attacks.
Keywords :
Artificial Intelligence (AI), Cybersecurity, Threat Detection, Machine Learning (ML),Deep Learning (DL),Anomaly Detection.
References :
- Ahmed, M., et al. (2020). "Anomaly detection in network traffic using machine learning algorithms." IEEE Access, 8, 123456-123465.
- Binns, R. (2018). "Understanding privacy in AI and machine learning." Journal of Ethics and Information Technology, 20(2), 115-124.
- Buczak, A. L., & Guven, E. (2021). "A survey of data mining and machine learning methods for cybersecurity." International Journal of Computer Applications, 183(10), 1-13.
- Cath, C. (2018). "Governing artificial intelligence: Ethical and political challenges." Philosophy & Technology, 31(4), 517-540.
- Denev, G., et al. (2020). "AI-based detection of phishing attacks." International Journal of Artificial Intelligence and Data Mining, 11(2), 61-75.
- Fritz, D. (2022). Advanced Persistent Threats: Detection and Defense. Springer.
- Goodfellow, I., Bengio, Y., & Courville, A. (2016). Deep Learning. MIT Press.
- Krebs, B. (2021). The Impact of Ransomware on Organizations. Krebs on Security.
- Lloyd, D. (2020). Cyberattack Trends: The New Age of Threats. Cybersecurity Press.
- NIST (2020). Cybersecurity Framework. National Institute of Standards and Technology.
- Papernot, N., et al. (2016). "The limitations of deep learning in adversarial settings." IEEE European Symposium on Security and Privacy.
- Raj, S., & Saha, D. (2022). "Machine learning for network intrusion detection: A comparative analysis." Journal of Information Security, 35(1), 102-115.
- Zhou, X., et al. (2021). "AI-based cybersecurity for intrusion detection systems: Trends and applications." Computers & Security, 98, 102033.
The rapid evolution of cyber threats has outpaced traditional security measures, prompting organizations to
explore innovative solutions for threat detection and response. Artificial Intelligence (AI) has emerged as a powerful tool in
enhancing cybersecurity mechanisms, offering the potential to improve the speed, accuracy, and adaptability of threat
identification and mitigation. This paper investigates the role of AI in cybersecurity, focusing on its impact on threat
detection, response strategies, and overall system defense. By reviewing AI's capabilities in anomaly detection, malware
analysis, and automated response, the paper highlights both the advantages and challenges associated with AI adoption in
cybersecurity. It concludes that while AI significantly strengthens cybersecurity measures, its integration requires
addressing issues such as algorithm bias, data privacy concerns, and the potential for adversarial attacks.
Keywords :
Artificial Intelligence (AI), Cybersecurity, Threat Detection, Machine Learning (ML),Deep Learning (DL),Anomaly Detection.