Role of Artificial Intelligence in Cyber Security

Authors

  • Parth Trivedi Research Scholar, MCA Thakur Institute of Management Studies, Career Development & Research (TIMSCDR) Mumbai, India
  • Naitik Bohra Research Scholar, MCA Thakur Institute of Management Studies, Career Development & Research (TIMSCDR) Mumbai, India

Keywords:

Cybersecurity, Artificial Intelligence, Cyberattacks, Intelligent Models, Data Analysis, Cyber Defenses, IoT, Digital Age, Threats, Comprehensive Strategy.

Abstract

In the digital age, the escalating threat of cyberattacks has become a major concern, with stories of identity theft, data breaches, and sophisticated cybercrimes impacting individuals and organizations worldwide. The advent of artificial intelligence (AI) has not only revolutionized various scientific and technical fields, such as robotics and healthcare, but has also given rise to a new era of intelligent cyberattacks. The widespread use of IoT has further intensified the impact of cyber threats globally. In response, the imperative to formulate a comprehensive cybersecurity strategy has become paramount. Cybersecurity involves the deployment of technology, procedures, and controls to safeguard against cyberattacks on devices, programs, networks, systems, and data. Traditional security measures alone prove insufficient against the evolving tactics of cybercriminals who employ cutting-edge methods. Fortunately, AI technologies have emerged as a crucial tool in fortifying cyber defences. This essay explores the application of AI in combating cyberattacks, showcasing its potential in developing intelligent models capable of analysing data and making informed decisions to protect against the ever-growing sophistication of cyber threats

References

Morris, Robert T. "The Morris Worm: A Fifteen-Year Perspective." Proceedings of the 15th USENIX Security Symposium, 1988.

Messmer, Ellen. "Melissa Worm Turning 10: What Did We Learn?" NetworkWorld, 1999.

Krebs, Brian. "The Value of a Hacked Email Account." Krebs on Security, 2013.

The White House. "International Strategy for Cyberspace." 2011.

U.S. Cybersecurity and Infrastructure Security Agency (CISA). "SolarWinds and Supply Chain Security." 2021.

Axelsson, Stefan. "The Base-Rate Fallacy and the Difficulty of Intrusion Detection." ACM Transactions on Information and System Security (TISSEC), 2000.

Christodorescu, M., Jha, S., Kruegel, C., & Robertson, W. "Mining Specifications of Malicious Behavior." ACM Transactions on Information and System Security (TISSEC), 2007.

CERT Division, Software Engineering Institute. "Common Sense Guide to Mitigating Insider Threats, 5th Edition." 2020.

Gragido, Will, & Pirc, Joseph. "Blackhatonomics: An Inside Look at the Economics of Cybercrime." Syngress, 2011.

Cimpanu, Catalin. "Ransomware: An Executive Guide to One of the Biggest Menaces on the Web." ZDNet, 2019.

Shabtai, Asaf, et al. "Detection of Malicious Code in Android Applications." 2011 IEEE 35th Annual Computer Software and Applications Conference.

U.S. Cybersecurity and Infrastructure Security Agency (CISA). "Advanced Persistent Threat Compromise of Government Agencies, Critical Infrastructure, and Private Sector Organizations." 2020.

Ray, Pradip P. "A Survey of IoT Architectures, Protocols, and Security." Internet of Things: Challenges, Advances, and Applications, 2018.

Anderson, Ross, & Moore, Tyler. "The Economics of Information Security." Science, 2006.

Symantec. "Internet Security Threat Report." Symantec Corporation, 2018.

National Institute of Standards and Technology (NIST). "NIST Special Publication 800-53, Revision 5: Security and Privacy Controls for Information Systems and Organizations." 2018.

Rass, S., & Dssouli, R. "Artificial Intelligence in Network Security: A Review." Artificial Intelligence Review, 2019.

Miller, S., et al. "A Survey of Artificial Intelligence for Cybersecurity." Journal of Cybersecurity and Mobility, 2018.

Chen, M., & Zhu, Y. "Artificial Intelligence-Based Cybersecurity Defense: A Review." IEEE Access, 2019.

Jagadeesan, V., Sivasankari, M., & Sivakumari, M. "A Review on AI Based Solutions for Network Security." Procedia Computer Science, 2016.

Haider, S., Khan, R. A., & Khan, S. U. "A Survey of Artificial Intelligence for Cybersecurity." Journal of King Saud University - Computer and Information Sciences, 2019.

Kumar, P., Zhang, J., & Li, T. "A Survey of Network Vulnerability Assessment." IEEE Communications Surveys & Tutorials, 2020.

Husain, I. "Artificial Intelligence-Driven Multi-Factor Authentication and Its Application in Securing Digital Resources." International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions), 2020.

Damjanovic, D., Shishika, A., & Nastasijevic, A. "Artificial Intelligence-Driven Biometric Authentication for Mobile Applications." IEEE EUROCON, 2017.

Pradhan, A. K., et al. "Behavioral Authentication System Using Deep Learning." Third International Conference on Information and Communication Technology for Intelligent Systems (ICTIS2019), 2019

Published

2024-05-13