Open Access Open Access  Restricted Access Subscription Access

Role and Efficacy of Artificial Intelligence in Cyber-security

Megha Gupta, Mithlesh Ayra, Abha Jain

Abstract


The internet is growing and so is the cyber world, more and more people, companies, organizations and governments, etc., who were previously ignorant or just didn’t want to enter the digital world have now started to reap its benefits as technology advances and provides more solutions to the existing real-world problems. This has unfortunately also increased the number of attackers, whether they may be cybercriminals, hacktivists, sponsored attackers or an insider of the organization. Whatever may be the motive of these attackers, malicious or not, but attacks such as data breaches, identity theft, malware attacks, phishing, social engineering, network intrusion and what not, have become extensively common and are causing millions of dollars’ worth loss to various companies each year. This number has increased each year despite of all the traditional security mechanisms in places such as firewalls, traditional ids, etc. It’s possible that this is due to the fact that the attackers have become quite intelligent and well versed with their techniques over time, but at the same time, this also highlights a critical flaw in the traditional cyber security implementation, and that is the lack of intelligence and dynamism. Attackers use this to their advantage to circumvent any defence mechanism in place as these mechanisms are dumb and would only ever complain if any rule enlisted within them is violated for example. This is where artificial intelligence becomes important, an emerging field that shows promise in enabling intelligent cyber security solutions that can counter the modern and sophisticated cyber attackers. In this article various artificial intelligence methods that can be leveraged to design powerful and dynamic solutions for cyber security along with major limitations and challenges faced.


Keywords


Cybersecurity, Machine Learning, threats, Artificial Intelligence, Cyberattacks, Cybercrimes, Data Breach

Full Text:

PDF

References


Sarker IH, Farhad MH, Nowrozy R. AI-Driven Cybersecurity: An Overview, Security Intelligence Modeling and Research Directions. SN Comput. Sci. 2, 173 (2021). https://doi.org/10.1007/s42979-021-00557-0

Bhatele Kirti Raj, Shrivastava Harsh, Kumari Neha. The role of artificial intelligence in cyber security, 2019, 10.4018/978-1-5225- 8241-0.ch009.

Zeadally Sherali, Adi Erwin, Baig Zubair, Khan Imran. (2020). Harnessing Artificial Intelligence Capabilities to Improve Cybersecurity. IEEE Access. PP.1-1.10.1109/ACCESS.2020.2968045

Sarker IH, Kayes ASM, Badsha S, et al. Cybersecurity data science: an overview from machine learning perspective. J Big Data 2020; 7(41). https://doi.org/10.1186/s40537-020-00318-5

Apruzzese G, Colajanni M, Ferretti L, Guido A, Marchetti M. On the effectiveness of machine and deep learning for cyber security, 2018 10th International Conference on Cyber Conflict (CyCon), 2018, pp. 371–390, DOI: 10.23919/CYCON.2018.8405026.

Alassery F, Alzahrani A, Khan AI, Sharma K, Ahmad M, Khan RA. Evaluating security of big data through fuzzy based decision-making technique. Comput Syst Sci Eng. 2023 Jan 1; 44(1): 859–72.

Zeadally S, Adi E, Baig Z, Khan IA. Harnessing artificial intelligence capabilities to improve cybersecurity. IEEE Access. 2020 Jan 20; 8: 23817–37.

Paudel R, Muncy T, Eberle W. Detecting dos attack in smart home iot devices using a graph-based approach. In2019 IEEE international conference on big data (big data) 2019 Dec 9 (pp. 5249–5258). IEEE.

Apruzzese G, Colajanni M, Ferretti L, Guido A, Marchetti M. On the effectiveness of machine and deep learning for cyber security. In2018 10th international conference on cyber Conflict (CyCon) 2018 May 29 (pp. 371–390). IEEE.

Abu-Nimeh S, Nappa D, Wang X, Nair S. A comparison of machine learning techniques for phishing detection. InProceedings of the anti-phishing working groups 2nd annual eCrime researchers summit 2007 Oct 4 (pp. 60–69).


Refbacks

  • There are currently no refbacks.


Copyright (c) 2022 Journal of Network Security

  • eISSN: 2395–6739
  • ISSN: 2321–8517