AI-Based Cybersecurity Solutions in Threat Detection and Incident Response
This work provides an in-depth analysis of the impact of artificial intelligence (AI) in cybersecurity. With the rise of cybercrime and the increasing sophistication of cyberattacks, organizations are implementing advanced cybersecurity measures, and AI is emerging as a critical tool. The work discusses the benefits of AI in cybersecurity, including enhanced threat detection, reduced false positives, automation, improved response time, and predictive analytics. However, it also highlights the challenges associated with AI in cybersecurity, such as lack of transparency, bias, adversarial attacks, integration, and skill gap. The work concludes that AI is not a panacea for all cybersecurity problems, but it is a critical tool that can help organizations defend against ever-evolving cyber threats. Addressing the challenges associated with AI in cybersecurity requires ongoing monitoring and refinement to ensure that AI-powered cybersecurity solutions remain effective and secure. Finally, the work identifies ethical considerations and regulatory frameworks that organizations must consider when implementing AI in cybersecurity. Overall, this work provides valuable insights into the current state and future of AI in cybersecurity and highlights the importance of a holistic approach to cybersecurity.
Kemmerer, R. A. (2003). Cyber security. 25th International Conference on Software Engineering, 2003.
C.Felix. Freiling Laboratory for Dependable Distributed Systems University of Mannheim, Bastian Schwittay Symantec (Deutschland) GmbH.
LJUBOMIR LAZIĆ Belgrade Metropolitan University, Faculty of Information Technologies, BENEFIT FROM AI IN CYBERSECURITY the 11th International Conference on Business Information Security, 18th October.
R.Trifonov, R.Yoshinov, S.Manolov, G.Tsoche, & G.Pavlova. Artificial Intelligence methods are suitable for Incident Handling Automation. MATEC Web of Conferences, 292, 01044.
Vasileios Anastopoulos, PhD Davide Giovannelli, LL. M./05/2022/Automated/ Autonomous Incident Response [Online]. Available: https://www.bath.ac.uk/publications/li-brary-guides-to-cit-ing-referencing/attachments/ieee-styleguide.pdf
Q. Zhu, L. Liang, “Research on Security Vulnerabilities Based on Artificial Intelligence,” in ICIC, 2019, pp. 377-387.
S. A. Jawaid, “Artificial Intelligence with respect to Cyber Security,” Vienna, USA, 2023.
Nan Sun, Jun Zhang, Paul Rimba, Shang Gao, Leo Yu Zhang, and Yang Xiang. Data-driven cybersecurity incident prediction: A survey. IEEE Communications Surveys & Tutorials, 21(2):1744{1772, 2018.
Ansam Khraisat, Iqbal Gondal, Peter Vamplew, and Joarder Kamruzzaman. Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity, 2(1):20, 2019.
Hui Qi, Xiaoqiang Di, and Jinqing Li. Formal definition and analysis of access control model based on role and attribute. Journal of information security and applications, 43:53-60, 2018.
Jun Yin. Firewall policy management, May 10 2016. US Patent 9,338,134.
Yinxing Xue, Guozhu Meng, Yang Liu, Tian Huat Tan, Hongxu Chen, Jun Sun, and Jie Zhang. Auditing antimalware tools by evolving android malware and dynamic loading technique. IEEE Transactions on Information Forensics and Security, 12(7):1529-1544, 2017.
Tyler Hunt, Zhiting Zhu, Yuanzhong Xu, Simon Peter, and Emmett Witchel. Ryoan: A distributed sandbox for untrusted computation on secret data. ACM Transactions on Computer Systems (TOCS), 35(4):1-32, 2018.
Muhammad Irfan, Haider Abbas, Yunchuan Sun, Anam Sajid, and Maruf Pasha. A framework for cloud forensics evidence collection and analysis using security information and event management. Security and Communication Networks, 9(16):3790-3807, 2016.
Omar G Abood and Shawkat K Guirguis. A survey on cryptography algorithms. International Journal of Scientific and Research Publications, 8(7):410-415, 2018.
Shahid Anwar, Jasni Mohamad Zain, Mohamad Fadli Zolkipli, Zakira Inayat, Suleman Khan, Bokolo Anthony, and Victor Chang. From intrusion detection to an intrusion response system: fundamentals, requirements, and future directions. Algorithms, 10(2):39, 2017.
Sara Mohammadi, Hamid Mirvaziri, Mostafa Ghazizadeh-Ahsaee, and Hadis Karimipour. Cyber intrusion detection by combined feature selection algorithm. Journal of information security and applications, 44:80-88, 2019.
Juan E Tapiador, Agustin Or la, Arturo Ribagorda, and Benjamin Ramos. Key-recovery attacks on kids, a keyed anomaly detection system. IEEE Transactions on Dependable and Secure Computing, 12(3):312-325,2013.
Mahbod Tavallaee, Natalia Stakhanova, and Ali Akbar Ghorbani. Toward credible evaluation of anomalybased intrusion-detection methods. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 40(5):516-524, 2010.
Leighton Johnson. Computer incident response and forensics team management: Conducting a successful incident response. 2013.
Dash, B. (2021). A hybrid solution for extracting information from unstructured data using optical character recognition (OCR) with natural language processing (NLP).
S. Lee, (2021). AI-based Cybersecurity: Benefits and Limitations. Robotics & AI Ethics, 6(1), 18-28.
Copyright (c) 2023 International Journal of Engineering and Computer Science

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.