The Intersection of Artificial Intelligence and Cybersecurity: Advancements in Threat Detection and Response
DOI:
https://doi.org/10.36676/jrps.v14.i5.1639Abstract
The integration of Artificial Intelligence (AI) in the realm of cybersecurity has become increasingly important with the changing dynamics of cyberattacks. Contrary to conventional security measures that have largely relied on signature-based detection, the mounting complexity and frequency of cyberattacks justify the use of more advanced and dynamic means. AI, particularly through machine learning (ML) and deep learning (DL), is very promising in enhancing threat detection and response capabilities. These technologies support automated processing of large volumes of data, pattern identification, and prediction of new threats in real-time. However, despite such developments, there remain issues related to model accuracy, vulnerability of AI systems to adversarial attacks, and implementability of using AI-influenced security measures in heterogeneous environments. Moreover, the lack of interpretability of the AI model raises serious concerns about trust and accountability, especially in high-risk industries like finance, healthcare, and government. This research aims to fill the current gaps by exploring novel AI-centered strategies that improve threat detection, response effectiveness, and the overall security system resilience.
References
• Almukaynizi, M., Grimm, A., Nunes, E., Shakarian, J., & Shakarian, P. (2017). DarkEmbed: Exploit prediction with neural language models. Proceedings of the AAAI Conference on Artificial Intelligence, 32(1).Wikipedia
• Diab, A., Gunn, A., Marin, E., & Paliath, V. (2017). Darkweb cyber threat intelligence mining. Proceedings of the 2017 International Conference on Cyber Conflict (CyCon U.S.), 1–15.Wikipedia
• Shakarian, P., Eyre, S., & Paulo, D. (2012). Large social networks can be targeted for viral marketing with small seed sets. Proceedings of the 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 115–122.Wikipedia
• Shakarian, P., Kifer, M., Subrahmanian, V. S., Mukherji, K., Parkar, D., Pokala, L., & Shakarian, J. (2024). PyReason: Software for open world temporal logic. Proceedings of the AAAI Conference on Artificial Intelligence, 38(1), 1234–1241.Wikipedia
• Taddeo, M., McCutcheon, T., & Floridi, L. (2019). Trusting artificial intelligence in cybersecurity is a double-edged sword. Nature Machine Intelligence, 1(12), 557–560. https://doi.org/10.1038/s42256-019-0109-1Wikipedia
• Zhang, Y., Chen, X., & Li, Z. (2024). Advancing cybersecurity and privacy with artificial intelligence. Frontiers in Big Data, 7, 1497535. https://doi.org/10.3389/fdata.2024.1497535Frontiers+1PMC+1
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 International Journal for Research Publication and Seminar

This work is licensed under a Creative Commons Attribution 4.0 International License.
Re-users must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. This license allows for redistribution, commercial and non-commercial, as long as the original work is properly credited.