A Comparative Study of Artificial Intelligence and Machine Learning Algorithms for Cybersecurity
Keywords:
Artificial Intelligence; Machine Learning; Cyber Security; Security Analysis; Risks; Threats.Abstract
The rapid expansion of cyberspace has been facilitated by a range of innovative networking and computing technologies, including software-defined networking, big data, and fog computing. Currently, cyber security has emerged as a paramount concern in the realm of cyberspace. The security of cyberspace has had significant effects on multiple essential infrastructures. The passive protection approach is no longer effective in safeguarding systems against emerging cyber risks, such as advanced persistent threats and zero-day assaults. So, the main objective of this study is to conduct a thorough examination of different implementations of artificial intelligence in the field of cybersecurity, encompassing activities such as identifying potential risks, responding to security incidents, and utilizing predictive analytics. The methodology employed in this study is qualitative research technique. The study emphasizes the efficacy of AI-powered solutions in strengthening the robustness of contemporary cybersecurity frameworks, based on current case studies and breakthroughs in machine learning algorithms. The paper critically examines the constraints and possible prejudices in AI systems used for cybersecurity, highlighting the significance of responsible AI methodologies. The study will be a contribution to the researchers, practitioners, and policymakers to know about the present condition of artificial intelligence (AI) in cybersecurity. It aims to encourage discussions on the efficient incorporation of AI technologies to tackle the continuously expanding challenges in the field of cyber threats.
Downloads
References
Li, J. H. (2018). Cyber security meets artificial intelligence: a survey. Frontiers of Information Technology & Electronic Engineering, 19(12), 1462-1474.
Apruzzese, G., Colajanni, M., Ferretti, L., Guido, A., & Marchetti, M. (2018, May). On the effectiveness of machine and deep learning for cyber security. In 2018 10th international conference on cyber Conflict (CyCon) (pp. 371-390). IEEE.
Xin, Y., Kong, L., Liu, Z., Chen, Y., Li, Y., Zhu, H., ... & Wang, C. (2018). Machine learning and deep learning methods for cybersecurity. Ieee access, 6, 35365-35381.
Martínez Torres, J., Iglesias Comesaña, C., & García-Nieto, P. J. (2019). Machine learning techniques applied to cybersecurity. International Journal of Machine Learning and Cybernetics, 10(10), 2823-2836.
Halbouni, A., Gunawan, T. S., Habaebi, M. H., Halbouni, M., Kartiwi, M., & Ahmad, R. (2022). Machine learning and deep learning approaches for cybersecurity: A review. IEEE Access, 10, 19572-19585.
Husák, M., Bartoš, V., Sokol, P., & Gajdoš, A. (2021). Predictive methods in cyber defense: Current experience and research challenges. Future Generation Computer Systems, 115, 517-530.
Vemuri, N., Thaneeru, N., & Tatikonda, V. M. (2023). Securing Trust: Ethical Considerations in AI for Cybersecurity. Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online), 2(2), 167-175.
Rangaraju, S. (2023). Secure by Intelligence: Enhancing Products with AI-Driven Security Measures. EPH-International Journal of Science And Engineering,” 9(3), 36-41.
Labu, M. R., & Ahammed, M. F. (2024). Next-Generation Cyber Threat Detection and Mitigation Strategies: A Focus on Artificial Intelligence and Machine Learning. Journal of Computer Science and Technology Studies, 6(1), 179-188.
Kasowaki, L., & Emre, B. (2024). Fortifying Cyber Defenses: Tactics for Secure Digital Environments (No. 11702). EasyChair.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.