AI-Enhanced Cyber Threat Detection and Response Systems
Main Article Content
Abstract
In this era of ubiquitous and highly developed cyber dangers, cybersecurity has emerged as an essential issue for modern organisations. Interest in using AI to improve cyber threat detection and response skills is on the rise as conventional approaches fall behind the dynamic threat environment. Recent advancements, problems, and future prospects are highlighted in this review paper's thorough overview of cyber threat detection and response systems augmented with AI. At the outset, we cover the basics of artificial intelligence (AI) in cybersecurity and trace the development of systems to identify cyber threats. We continue by outlining the benefits and drawbacks of supervised, unsupervised, and reinforcement learning, three of the AI-driven threat detection methods now available. Here, we show how AI-powered systems may effectively mitigate cyber risks in many sectors using real-world applications and case studies. Data quality, adversarial assaults, and ethical issues are just a few of the constraints and problems that we highlight and provide solutions for. Lastly, we go into the latest developments and potential paths forward in AI-powered cybersecurity, highlighting the need of working together across disciplines and continuously doing research to keep up with ever-changing threats. Researchers, practitioners, and policymakers may use this paper as a guide to better understand AI in cybersecurity, where it is now, and how to make future breakthroughs.
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
You are permitted to share and adapt the material under the terms of Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0). This means you can distribute and modify the work, provided appropriate credit is given, a link to the license is provided, and it's made clear if any changes were made. However, commercial use of the material is not allowed, meaning you may not use it for commercial purposes without prior permission from the copyright holder.
References
Alevizos, L., & Dekker, M. (2024). Towards an AI-Enhanced Cyber Threat Intelligence Processing Pipeline. Electronics, 13(11), 2021. https://doi.org/10.3390/electronics13112021
Arif, H., Kumar, A., Fahad, M., & Hussain, H. K. (2024). Future Horizons: AI-Enhanced Threat Detection in Cloud Environments: Unveiling Opportunities for Research. International Journal of Multidisciplinary Sciences and Arts, 2(2), 242–251. https://doi.org/10.47709/ijmdsa.v2i2.3452
Chahal, S. (2023). AI-Enhanced Cyber Incident Response and Recovery. International Journal of Science and Research (IJSR), 12(3), 1795–1801. https://doi.org/10.21275/SR231003163025
Chukwu, N., Yufenyuy, S., Ejiofor, E., Ekweli, D., Ogunleye, O., Clement, T., Obunadike, C., Adeniji, S., Elom, E., & Obunadike, C. (2024). Resilient Chain: AI-Enhanced Supply Chain Security and Efficiency Integration. International Journal of Scientific and Management Research, 07(03), 46–65. https://doi.org/10.37502/IJSMR.2024.7306
Kumar, S., Gupta, U., Singh, A. K., & Singh, A. K. (2023). Artificial Intelligence: Revolutionizing Cyber Security in the Digital Era. Journal of Computers, Mechanical and Management, 2(3), 31–42. https://doi.org/10.57159/gadl.jcmm.2.3.23064
Kuttiyappan, D., & V, R. (2024). AI-Enhanced Fraud Detection: Novel Approaches and Performance Analysis. Proceedings of the 1st International Conference on Artificial Intelligence, Communication, IoT, Data Engineering and Security, IACIDS 2023, 23-25 November 2023, Lavasa, Pune, India. Proceedings of the 1st International Conference on Artificial Intelligence, Communication, IoT, Data Engineering and Security, IACIDS 2023, 23-25 November 2023, Lavasa, Pune, India, Lavasa, India. https://doi.org/10.4108/eai.23-11-2023.2343170
Pooja, & Shilpa. (2017). IMPLEMENTATION ON INTRUSION DETECTION SYSTEM IN MOBILE COMPUTING. International Journal for Research Publication and Seminar, 8(5), 9–13. Retrieved from https://jrps.shodhsagar.com/index.php/j/article/view/1048
Singh, S. (2017). Study of Security in Cloud computing. Universal Research Reports, 4(1), 22–30. Retrieved from https://urr.shodhsagar.com/index.php/j/article/view/25
Stroup, R. L., Niewoehner, K. R., Apaza, R. D., Mielke, D., & Maurer, N. (2019). Application of AI in the NAS – the Rationale for AI-Enhanced Airspace Management. 2019 IEEE/AIAA 38th Digital Avionics Systems Conference (DASC), 1–10. https://doi.org/10.1109/DASC43569.2019.9081768
Thapa, P., & Arjunan, T. (n.d.). AI-Enhanced Cybersecurity: Machine Learning for Anomaly Detection in Cloud Computing.
Thapliyal, V., & Thapliyal, P. (2024). Machine Learning for Cybersecurity: Threat Detection, Prevention, and Response. Darpan International Research Analysis, 12(1), 1–7. https://doi.org/10.36676/dira.v12.i1.01
Yaseen, A. (n.d.). AI-DRIVEN THREAT DETECTION AND RESPONSE: A PARADIGM SHIFT IN CYBERSECURITY.