The Intersection of Artificial Intelligence and Cybersecurity: Advancements in Threat Detection and Response

Authors

  • Sandeep Dommari Adhiyamaan College of Engineering Dr.M.G.R.Nagar Hosur, Tamil Nadu 635109, India

DOI:

https://doi.org/10.36676/jrps.v14.i5.1639

Abstract

The integration of Artificial Intelligence (AI) in the realm of cybersecurity has become increasingly important with the changing dynamics of cyberattacks. Contrary to conventional security measures that have largely relied on signature-based detection, the mounting complexity and frequency of cyberattacks justify the use of more advanced and dynamic means. AI, particularly through machine learning (ML) and deep learning (DL), is very promising in enhancing threat detection and response capabilities. These technologies support automated processing of large volumes of data, pattern identification, and prediction of new threats in real-time. However, despite such developments, there remain issues related to model accuracy, vulnerability of AI systems to adversarial attacks, and implementability of using AI-influenced security measures in heterogeneous environments. Moreover, the lack of interpretability of the AI model raises serious concerns about trust and accountability, especially in high-risk industries like finance, healthcare, and government. This research aims to fill the current gaps by exploring novel AI-centered strategies that improve threat detection, response effectiveness, and the overall security system resilience.

References

• Almukaynizi, M., Grimm, A., Nunes, E., Shakarian, J., & Shakarian, P. (2017). DarkEmbed: Exploit prediction with neural language models. Proceedings of the AAAI Conference on Artificial Intelligence, 32(1).Wikipedia

• Diab, A., Gunn, A., Marin, E., & Paliath, V. (2017). Darkweb cyber threat intelligence mining. Proceedings of the 2017 International Conference on Cyber Conflict (CyCon U.S.), 1–15.Wikipedia

• Shakarian, P., Eyre, S., & Paulo, D. (2012). Large social networks can be targeted for viral marketing with small seed sets. Proceedings of the 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 115–122.Wikipedia

• Shakarian, P., Kifer, M., Subrahmanian, V. S., Mukherji, K., Parkar, D., Pokala, L., & Shakarian, J. (2024). PyReason: Software for open world temporal logic. Proceedings of the AAAI Conference on Artificial Intelligence, 38(1), 1234–1241.Wikipedia

• Taddeo, M., McCutcheon, T., & Floridi, L. (2019). Trusting artificial intelligence in cybersecurity is a double-edged sword. Nature Machine Intelligence, 1(12), 557–560. https://doi.org/10.1038/s42256-019-0109-1Wikipedia

• Zhang, Y., Chen, X., & Li, Z. (2024). Advancing cybersecurity and privacy with artificial intelligence. Frontiers in Big Data, 7, 1497535. https://doi.org/10.3389/fdata.2024.1497535Frontiers+1PMC+1

Downloads

Published

30-12-2023

How to Cite

Sandeep Dommari. (2023). The Intersection of Artificial Intelligence and Cybersecurity: Advancements in Threat Detection and Response. International Journal for Research Publication and Seminar, 14(5), 530–545. https://doi.org/10.36676/jrps.v14.i5.1639