The Role of AI In Enhancing Threat Detection and Response in Cybersecurity Infrastructures
Valentine A. Onih1, Yufenyuy S. Sevidzem2 & Sulaimon Adeniji3
1Cybersecurity. University of Hertfordshire, Hertfordshire, United Kingdom
2Austin Peay State University, Clarksville, Tennessee, USA
3Computer Science, University of Lagos, Lagos, Nigeria
DOI – http://doi.org/10.37502/IJSMR.2024.7404
Abstract
Introduction: Considering growing cyber risks, this study aims to investigate how artificial intelligence (AI) can enhance threat detection and response rates, thereby enhancing cybersecurity systems. It specifically focuses on addressing the urgent requirement for enhanced defence strategies.
Methodology: The research utilised a quantitative approach to analyse data gathered from cybersecurity professionals. Surveys are carried out to assess how well AI technologies work in ensuring safety, the challenges faced, and their practical use in various industries.
Discussion: The findings show that artificial intelligence, specifically utilizing machine learning and deep learning, significantly improves the capability to detect and mitigate potential risks. Despite this, there are major challenges including high implementation costs, lack of skilled employees, and concerns about data security that act as significant barriers. The study also highlights the broad consensus on the transformative power of AI in revolutionizing cybersecurity, despite the existence of these challenges.
Conclusion: It has become obvious that AI technologies have the capability to improve cybersecurity practices through improved identification and response to cyberattacks. However, to make this work, allocating strategic resources for AI infrastructure development, providing extensive training for professionals, and thoroughly assessing ethical implications are crucial.
Keywords: artificial intelligence, cybersecurity, threat detection, machine learning, data privacy.
Reference
- Sarker, M. H. Furhad, and R. Nowrozy, “AI-Driven Cybersecurity: An Overview, Security Intelligence Modeling and Research Directions,” SN Computer Science, vol. 2, no. 3, Mar. 2021, doi: https://doi.org/10.1007/s42979-021-00557-0.
- Kaloudi and J. Li, “The AI-Based Cyber Threat Landscape,” ACM Computing Surveys (CSUR), vol. 53, no. 1, pp. 1–34, Feb. 2020, doi: https://doi.org/10.1145/3372823.
- D. Trump, M.-V. Florin, E. Perkins, and I. Linkov, Emerging Threats of Synthetic Biology and Biotechnology : Addressing Security and Resilience Issues. Springer Nature, 2021. Available: https://library.oapen.org/handle/20.500.12657/50742
- Capuano, G. Fenza, V. Loia, and C. Stanzione, “Explainable Artificial Intelligence in Cybersecurity: A Survey,” IEEE Access, pp. 1–1, 2022, doi: https://doi.org/10.1109/access.2022.3204171.
- Arora, S. K. Yadav, and K. Sharma, “Denial-of-Service (DoS) Attack and Botnet: Network Analysis, Research Tactics, and Mitigation,” Research Anthology on Combating Denial-of-Service Attacks, 2021. https://www.igi-global.com/chapter/denial-of-service-dos-attack-and-botnet/261970 (accessed Dec. 12, 2021).
- James, Gender, Internet Use, and Covid-19 in the Global South: Multiple Causalities and Policy Options. Springer Nature, 2022. Accessed: Mar. 23, 2024. [Online]. Available: https://books.google.com/books?hl=en&lr=&id=oJCREAAAQBAJ&oi=fnd&pg=PR5&dq=Gender
- A. Jawaid, “Artificial Intelligence with Respect to Cyber Security,” Preprints.org, Apr. 25, 2023. https://www.preprints.org/manuscript/202304.0923/v1
- N. Abbas, T. Ahmed, S. H. U. Shah, M. Omar, and H. W. Park, “Investigating the applications of artificial intelligence in cyber security,” Scientometrics, vol. 121, no. 2, pp. 1189–1211, Sep. 2019, doi: https://doi.org/10.1007/s11192-019-03222-9.
- K. Francia and L. H. Encinas, Breakthroughs in Digital Biometrics and Forensics. Springer Nature, 2022. doi: https://doi.org/10.1007/978-3-031-10706-1.
- Tomašev et al., “AI for social good: unlocking the opportunity for positive impact,” Nature Communications, vol. 11, no. 1, May 2020, doi: https://doi.org/10.1038/s41467-020-15871-z.
- Mayer, Big Data and Artificial Intelligence in Management. Disruptive Technologies as a success factor for decision-making. GRIN Verlag, 2022. Accessed: Mar. 23, 2024. [Online]. Available: https://books.google.com/books/about/Big_Data_and_Artificial_Intelligence_in.html?id=0ZprEAAAQBAJ
- Shutenko, “AI in Cyber Security: Top 6 Use Cases – TechMagic,” Blog | TechMagic, Sep. 13, 2023. https://www.techmagic.co/blog/ai-in-cybersecurity/
- Kumar and P. K. Pattnaik, “Risk Detection and Cyber Security for the Success of Contemporary Computing,” Advances in information security, privacy, and ethics book series, Nov. 2023, doi: https://doi.org/10.4018/978-1-6684-9317-5.
- Shehu, M. Umar, and A. Aliyu, “Cyber Kill Chain Analysis Using Artificial Intelligence,” Asian Journal of Research in Computer Science, vol. 16, no. 3, pp. 210–219, Aug. 2023, doi: https://doi.org/10.9734/ajrcos/2023/v16i3357.
- Nayak, C. L. Rao, T. Alam, S. Singh, S. Islam, and U. H. MaginmanI, “The Empirical Evaluation of Artificial Intelligence-based Techniques for Improving Cyber Security,” IEEE Xplore, Mar. 01, 2023. https://ieeexplore.ieee.org/document/10085368 (accessed Jul. 01, 2023).
- Ahmed, “AI and Cyber Attacks: The Growing Threat of AI-Enhanced Hacking|Paperback,” Barnes & Noble, 2023. https://www.barnesandnoble.com/w/ai-and-cyber-attacks-aqeel-ahmed/1143581084 (accessed Mar. 16, 2024).
- Antoniou, “The accelerating transport innovation revolution: a global, case study-based assessment of current experience, cross-sectorial effects, and socioeconomic transformations,” Transport Reviews, vol. 40, no. 6, pp. 814–816, Jun. 2020, doi: https://doi.org/10.1080/01441647.2020.1779385.
- N. Bauer, D. M. Truxillo, M. P. Jones, and G. Brady, “Privacy and cybersecurity challenges, opportunities, and recommendations: Personnel selection in an era of online application systems and big data.,” Big data in psychological research., pp. 393–409, 2020, doi: https://doi.org/10.1037/0000193-018.
- Stanham, “AI-Powered Behavioral Analysis in Cybersecurity | CrowdStrike,” crowdstrike.com, Sep. 07, 2023. https://www.crowdstrike.com/cybersecurity-101/secops/ai-powered-behavioral-analysis/
- Hayadi and E. V. Haryanto, “Data Encryption and Decryption Techniques for a High Secure Dataset using Artificial Intelligence,” International Innovative Research Journal of Engineering and Technology, vol. 6, no. 1, p. CS-27-CS-37, Sep. 2020, doi: https://doi.org/10.32595/iirjet.org/v6i1.2020.133.
- CyberSecura, “AI : a help or a danger for cybersecurity?,” CyberSecura, Apr. 13, 2023. https://www.cybersecura.com/en/post/artificial-intelligence-a-help-or-a-danger-for-cybersecurity (accessed Mar. 23, 2024).
- Tolba, “Cryptanalysis and improvement of multimodal data encryption by machine-learning-based system,” arXiv.org, Feb. 24, 2024. https://arxiv.org/abs/2402.15779 (accessed Mar. 23, 2024).
- Walker, “Why we’re committing $10 billion to advance cybersecurity,” Google, Aug. 25, 2021. https://blog.google/technology/safety-security/why-were-committing-10-billion-to-advance-cybersecurity/
- Jakkal, “Cyber Signals: Defending against cyber threats with the latest research, insights, and trends,” Microsoft Security Blog, Feb. 03, 2022. https://www.microsoft.com/en-us/security/blog/2022/02/03/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends/
- ADF, “Cyber Scammers, Hackers Pose Continuing Threat to Africa in 2023,” Africa Defense Forum, Dec. 20, 2022. https://adf-magazine.com/2022/12/cyber-scammers-hackers-pose-continuing-threat-to-africa-in-2023/
- Tariq, I. Ahmed, A. K. Bashir, and K. Shaukat, “A critical cybersecurity analysis and future research directions for the internet of things: A comprehensive review,” Sensors, vol. 23, no. 8, Apr. 2023, doi: https://doi.org/10.3390/s23084117.
- Silvestri, S. Islam, Dmitry Amelin, G. Weiler, Spyridon Papastergiou, and M. Ciampi, “Cyber threat assessment and management for securing healthcare ecosystems using natural language processing,” International Journal of Information Security, Oct. 2023, doi: https://doi.org/10.1007/s10207-023-00769-w.
- Kaur, D. Gabrijelčič, and T. Klobučar, “Artificial Intelligence for Cybersecurity: Literature Review and Future Research Directions,” Information Fusion, vol. 97, no. 101804, p. 101804, Apr. 2023, doi: https://doi.org/10.1016/j.inffus.2023.101804.
- Al-Mansoori and M. B. Salem, “The Role of Artificial Intelligence and Machine Learning in Shaping the Future of Cybersecurity: Trends, Applications, and Ethical Considerations,” International Journal of Social Analytics, vol. 8, no. 9, pp. 1–16, Sep. 2023, Available: https://norislab.com/index.php/ijsa/article/view/36
- Grassini, “Development and validation of the AI attitude scale (AIAS-4): a brief measure of general attitude toward artificial intelligence,” Frontiers in Psychology, vol. 14, p. 1191628, Jul. 2023, doi: https://doi.org/10.3389/fpsyg.2023.1191628.
- Brandy, J. (2024). Harnessing Artificial Intelligence for Unrivaled Cyber Security in the Digital Frontier. [online] Independently Published. Available at: https://www.betterworldbooks.com/product/detail/harnessing-artificial-intelligence-for-unrivaled-cyber-security-in-the-digital-frontier-repelling-9798873771523.
- Finlay, J. (2020). An Introduction To Artificial Intelligence. [online] CRC Press. Available at: https://www.weltbild.de/artikel/ebook/an-introduction-to-artificial-intelligence_33457692-1.
- Green, S. (2017). Culture hacker : reprogramming your employee experience to improve customer service, retention, and performance. [online] Hoboken, New Jersey: Wiley. Available at: https://www.oreilly.com/library/view/culture-hacker/9781119405726/.
- Yadav, S., Yadav, S.P., Raj, P., Tiwari, P. and Hugo, V. (2023). Novel AI Applications for Advancing Earth Sciences. [online] IGI Global. Available at: https://books.google.com/books/about/Novel_AI_Applications_for_Advancing_Eart.html?id=B1hd0AEACAAJ.
- Chawki, M., Darwish, A., Mohammad Ayoub Khan and Tyagi, S. (2015). Cybercrime, Digital Forensics and Jurisdiction. Springer.
- empreender (2021). Artificial Intelligence In Digital Marketing. [online] Editora Bibliomundi. Available at: https://books.google.com/books/about/Artificial_Intelligence_In_Digital_Marke.html?id=FGv_DwAAQBAJ.
- Bhardwaj, T., Upadhyay, H., Tarun Kumar Sharma and Steven Lawrence Fernandes (2023). Artificial Intelligence in Cyber Security: Theories and Applications. [online] Springer Nature. Available at: https://www.kobo.com/za/en/ebook/artificial-intelligence-in-cyber-security-theories-and-applications.
- Smith, D. (2021). Promoting Integrity in the Work of International Organisations. [online] Springer Nature. Available at: https://www.vitalsource.com/products/promoting-integrity-in-the-work-of-international-duncan-smith-v9783030739164.
- Mongeau, S. and Andrzej Hajdasinski (2021). Cybersecurity Data Science. [online] Springer Nature. Available at: https://www.vitalsource.com/products/cybersecurity-data-science-scott-mongeau-andrzej-v9783030748968.
- Swarnalatha, P. and Prabu, S. (2023). Handbook of Research on Deep Learning Techniques for Cloud-Based Industrial IoT. [online] IGI Global. Available at: https://www.igi-global.com/book/handbook-research-deep-learning-techniques/311057.
- Pei-Luen Patrick Rau (2023). Cross-Cultural Design. [online] Springer Nature. Available at: https://books.google.com/books/about/_.html?id=nGfKEAAAQBAJ.
- Allin, D. (2023). Survival 49.3. [online] Taylor & Francis. Available at: https://www.booktopia.com.au/survival-49-3-dana-allin/ebook/9781000938999.html.
- Neural, A. (2023). Introduction to Artificial Intelligence and Generative AI for Novice. [online] Adam Neural. Available at: https://www.indigo.ca/en-ca/introduction-to-artificial-intelligence-and-generative-ai-for-novice/9798223220138.html.