Assessing the Effectiveness of Artificial Intelligence Techniques in Mitigating Cyber security Risks

Authors

  • Chennu Naga Venkata Sai Student, Department of Computer Science and Engineering, KL Deemed to be university, Green Fields vaddeswaram-522302, INDIA https://orcid.org/0009-0000-8252-8682
  • Rangu Jaswanth Student, Department of Computer Science and Engineering, KL Deemed to be university, Green Fields vaddeswaram-522302, INDIA https://orcid.org/0009-0003-5493-9339
  • Avula Manasa Student, Department of Computer Science and Engineering, KL Deemed to be university, Green Fields vaddeswaram-522302, INDIA https://orcid.org/0009-0003-3524-0573
  • Yaramakula Sai Pranathi Reddy Student, Department of Computer Science and Engineering, KL Deemed to be university, Green Fields vaddeswaram-522302, INDIA https://orcid.org/0009-0003-7685-2066
  • Suryakanth V. Gangashetty Professor, Department of Computer Science and Engineering, KL Deemed to be university, Green Fields vaddeswaram-522302, INDIA https://orcid.org/0000-0001-6745-4363
  • D. Govind Professor, Department of Computer Science and Engineering, KL Deemed to be university, Green Fields vaddeswaram-522302, INDIA

Keywords:

Machine Learning Techniques, Cyber security Threats, Qualitative Study, Information Technology Personne

Abstract

The goal of the research was to determine whether or whether dangers to cyber security might be mitigated using approaches based on machine learning, with a particular focus on Iraq. The main data and the qualitative research approach were the ones that were chosen. The information needed for the study was collected from members of staff working in the information technology department. The sample size for this particular investigation was 468, and the researchers performed confirmation factor analysis of discriminant validity, basic analysis of models, and assessment of the hypotheses. All of the P-values were determined to be significant, with the only exception being the expert system, which did not demonstrate any association with machine learning and cyber security. Accessibility, geographical location, the size of the sample, and the number of components comprised the majority of the most critical variables.

Downloads

Download data is not yet available.

References

B. Thuraisingham, "The Role of Artificial Intelligence and Cyber Security for Social Media," 2020 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), New Orleans, LA, USA, 2020, pp. 1-3, doi: 10.1109/IPDPSW50202.2020.00184.

Zhang, Z., Ning, H., Shi, F. et al. Artificial intelligence in cyber security: research advances, challenges, and opportunities. Artif Intell Rev 55, 1029–1053 (2022). https://doi.org/10.1007/s10462-021-09976-0

Bhatele, Kirti Raj, et al. "The Role of Artificial Intelligence in Cyber Security." Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems, edited by S. Geetha and Asnath Victy Phamila, IGI Global, 2019, pp. 170-192. https://doi.org/10.4018/978-1-5225-8241-0.ch009

Prasad, R., Rohokale, V. (2020). Artificial Intelligence and Machine Learning in Cyber Security. In: Cyber Security: The Lifeline of Information and Communication Technology. Springer Series in Wireless Technology. Springer, Cham. https://doi.org/10.1007/978-3-030-31703-4_16]

Abbas, N.N., Ahmed, T., Shah, S.H.U. et al. Investigating the applications of artificial intelligence in cyber security. Scientometrics 121, 1189–1211 (2019). https://doi.org/10.1007/s11192-019-03222-9

H. Sedjelmaci, F. Guenab, S. -M. Senouci, H. Moustafa, J. Liu and S. Han, "Cyber Security Based on Artificial Intelligence for Cyber-Physical Systems," in IEEE Network, vol. 34, no. 3, pp. 6-7, May/June 2020, doi: 10.1109/MNET.2020.9105926.

Li, Jh. Cyber security meets artificial intelligence: a survey. Frontiers Inf Technol Electronic Eng 19, 1462–1474 (2018). https://doi.org/10.1631/FITEE.1800573

Okutan and C. Eyüpoğlu, "A Review on Artificial Intelligence and Cyber Security," 2021 6th International Conference on Computer Science and Engineering (UBMK), Ankara, Turkey, 2021, pp. 304-309, doi: 10.1109/UBMK52708.2021.9558949.

S. B.S., N. S., N. Kashyap and S. D.N., "Providing Cyber Security using Artificial Intelligence – A survey," 2019 3rd International Conference on Computing Methodologies and Communication (ICCMC), Erode, India, 2019, pp. 717-720, doi: 10.1109/ICCMC.2019.8819719.

R. Trifonov, O. Nakov and V. Mladenov, "Artificial Intelligence in Cyber Threats Intelligence," 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC), Mon Tresor, Mauritius, 2018, pp. 1-4, doi: 10.1109/ICONIC.2018.8601235.

Ali, A. W. Septyanto, I. Chaudhary, H. A. Hamadi, H. M. Alzoubi and Z. F. Khan, "Applied Artificial Intelligence as Event Horizon Of Cyber Security," 2022 International Conference on Business Analytics for Technology and Security (ICBATS), Dubai, United Arab Emirates, 2022, pp. 1-7, doi: 10.1109/ICBATS54253.2022.9759076.

Z. Zhang, H. A. Hamadi, E. Damiani, C. Y. Yeun and F. Taher, "Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research," in IEEE Access, vol. 10, pp. 93104-93139, 2022, doi: 10.1109/ACCESS.2022.3204051.

Demertzis, K., Iliadis, L. (2015). A Bio-Inspired Hybrid Artificial Intelligence Framework for Cyber Security. In: Daras, N., Rassias, M. (eds) Computation, Cryptography, and Network Security. Springer, Cham. https://doi.org/10.1007/978-3-319-18275-9_7

Khan, S.U., Eusufzai, F., Azharuddin Redwan, M., Ahmed, M., Sabuj, S.R. (2022). Artificial Intelligence for Cyber Security: Performance Analysis of Network Intrusion Detection. In: Ahmed, M., Islam, S.R., Anwar, A., Moustafa, N., Pathan, AS.K. (eds) Explainable Artificial Intelligence for Cyber Security. Studies in Computational Intelligence, vol 1025. Springer, Cham. https://doi.org/10.1007/978-3-030-96630-0_6

A. Kuppa and N. -A. Le-Khac, "Black Box Attacks on Explainable Artificial Intelligence(XAI) methods in Cyber Security," 2020 International Joint Conference on Neural Networks (IJCNN), Glasgow, UK, 2020, pp. 1-8, doi: 10.1109/IJCNN48605.2020.9206780.

Andraško, J., Mesarčík, M. & Hamuľák, O. The regulatory intersections between artificial intelligence, data protection and cyber security: challenges and opportunities for the EU legal framework. AI & Soc 36, 623–636 (2021). https://doi.org/10.1007/s00146-020-01125-5

S. Merat and W. Almuhtadi, "Artificial intelligence application for improving cyber-security acquirement," 2015 IEEE 28th Canadian Conference on Electrical and Computer Engineering (CCECE), Halifax, NS, Canada, 2015, pp. 1445-1450, doi: 10.1109/CCECE.2015.7129493.

Mrs. Leena Rathi. (2014). Ancient Vedic Multiplication Based Optimized High Speed Arithmetic Logic . International Journal of New Practices in Management and Engineering, 3(03), 01 - 06. Retrieved from http://ijnpme.org/index.php/IJNPME/article/view/29

Jaruwatcharaset, C. . (2023). Effects of Using a Temperature Control System in Bandicota indica Stalls with Internet of Things Technology. International Journal on Recent and Innovation Trends in Computing and Communication, 11(4s), 166–170. https://doi.org/10.17762/ijritcc.v11i4s.6324

Downloads

Published

21.09.2023

How to Cite

Venkata Sai, C. N. ., Jaswanth, R. ., Manasa, A. ., Pranathi Reddy, Y. S. ., Gangashetty, S. V. ., & Govind, D. . (2023). Assessing the Effectiveness of Artificial Intelligence Techniques in Mitigating Cyber security Risks. International Journal of Intelligent Systems and Applications in Engineering, 11(4), 763–771. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3610

Issue

Section

Research Article

Most read articles by the same author(s)