Continuous Exposure Management Using AI and Threat Intelligence

Authors

  • Gaurav Malik, Prashasti

Keywords:

Continuous Exposure Management, Artificial Intelligence (AI), Threat Intelligence, Cybersecurity, Vulnerability Management

Abstract

Continuous Exposure Management (CEM) is a recent development that has become an essential part of modern cybersecurity processes, as cybercrime threats are increasingly sophisticated and severe. The world is going digital, and organizations are becoming increasingly vulnerable to security risks such as malware, ransomware, and advanced threats. CEM provides an active approach that involves continuous identification, assessment, and response to vulnerabilities across a company's IT infrastructure, rather than conventional, reactive security approaches. The deployment of Artificial Intelligence (AI) and Threat Intelligence (TI) into managed CEM is a critical concept that will result in more effective, faster vulnerability management through faster threat acquisition, better vulnerability prioritization, and faster response times. The rapidity and multiplicity of analysis patterns, along with the large amounts of data, imply that AI can help identify abnormalities and generate threat intelligence, constantly updating organizations on evolving cyber threats and giving them the power to make better decisions. This study will review AI methods in CEM, particularly their practical utility, using a case study and research results. Important findings show that AI-based solutions are highly effective at improving detection rates and, by extension, accelerating response time and, consequently, the vulnerability window, as well as lessening harm. At the end of the article, there are recommendations for prioritizing integration into cybersecurity programs to make them more resilient against cyber threats.

Downloads

Download data is not yet available.

References

Pyroh, O., Kalachenkova, K., Kuybida, V., Chmil, H., Kiptenko, V., & Razumova, O. (2021). The influence of factors on the level of digitalization of world economies. International Journal of Computer Science & Network Security, 21(5), 183-191.

Hasan, K., Shetty, S., & Ullah, S. (2019, December). Artificial intelligence empowered cyber threat detection and protection for power utilities. In 2019 IEEE 5th international conference on collaboration and internet computing (CIC) (pp. 354-359). IEEE.

Rahalkar, S. (2018). Network Vulnerability Assessment: Identify security loopholes in your network’s infrastructure. Packt Publishing Ltd.

Nagar, G. (2018). Leveraging Artificial Intelligence to Automate and Enhance Security Operations: Balancing Efficiency and Human Oversight. Valley International Journal Digital Library, 78-94.

Tounsi, W. (2019). What is cyber threat intelligence and how is it evolving?. Cyber‐Vigilance and Digital Trust: Cyber Security in the Era of Cloud Computing and IoT, 1-49.

Damaraju, A. (2022). Adaptive Threat Intelligence: Enhancing Information Security Through Predictive Analytics and Real-Time Response Mechanisms. International Journal of Advanced Engineering Technologies and Innovations, 1(3), 82-120.

Mansfield-Devine, S. (2020). Nation-state attacks: the escalating menace. Network Security, 2020(12), 12-17.

Li, Z., Zou, D., Tang, J., Zhang, Z., Sun, M., & Jin, H. (2019). A comparative study of deep learning-based vulnerability detection system. IEEE Access, 7, 103184-103197.

Qiu, S., Liu, Q., Zhou, S., & Wu, C. (2019). Review of artificial intelligence adversarial attack and defense technologies. Applied Sciences, 9(5), 909.

Koloveas, P., Chantzios, T., Alevizopoulou, S., Skiadopoulos, S., & Tryfonopoulos, C. (2021). intime: A machine learning-based framework for gathering and leveraging web data to cyber-threat intelligence. Electronics, 10(7), 818.

Motlhabi, M., Pantsi, P., Mangoale, B., Netshiya, R., & Chishiri, S. (2022, March). Context-aware cyber threat intelligence exchange platform. In International Conference on Cyber Warfare and Security (Vol. 17, No. 1, pp. 201-210). Academic Conferences International Limited.

Chalapathy, R., & Chawla, S. (2019). Deep learning for anomaly detection: A survey. arXiv preprint arXiv:1901.03407.

Fletcher, S., & Islam, M. Z. (2019). Decision tree classification with differential privacy: A survey. ACM Computing Surveys (CSUR), 52(4), 1-33.

Dalal, A. (2020). Exploring next-generation cybersecurity tools for advanced threat detection and incident response. Available at SSRN 5424096.

Komaragiri, V. B., & Edward, A. (2022). AI-Driven Vulnerability Management and Automated Threat Mitigation. International Journal of Scientific Research and Management (IJSRM), 10(10), 981-998.

Tikkinen-Piri, C., Rohunen, A., & Markkula, J. (2018). EU General Data Protection Regulation: Changes and implications for personal data collecting companies. Computer Law & Security Review, 34(1), 134-153.

Kothamali, P. R., & Banik, S. (2019). Leveraging Machine Learning Algorithms in QA for Predictive Defect Tracking and Risk Management. International Journal of Advanced Engineering Technologies and Innovations, 1(4), 103-120.

Banik, S., Dandyala, S. S. M., & Nadimpalli, S. V. (2021). Deep learning applications in threat detection. International Journal of Advanced Engineering Technologies and Innovations, 1(2), 142-160.

Amomo, C. (2022). AI-enabled threat intelligence for early detection of intrusions in US federal information systems. International Journal of Science and Research Archive, 7(2), 912-923.

Routhu, K., Bodepudi, V., Jha, K. M., & Chinta, P. C. R. (2020). A Deep Learning Architectures for Enhancing Cyber Security Protocols in Big Data Integrated ERP Systems. Available at SSRN 5102662.

McKinnel, D. R., Dargahi, T., Dehghantanha, A., & Choo, K. K. R. (2019). A systematic literature review and meta-analysis on artificial intelligence in penetration testing and vulnerability assessment. Computers & Electrical Engineering, 75, 175-188.

Baviskar, D., Ahirrao, S., Potdar, V., & Kotecha, K. (2021). Efficient automated processing of the unstructured documents using artificial intelligence: A systematic literature review and future directions. Ieee Access, 9, 72894-72936.

Goswami, M. (2019). Utilizing AI for automated vulnerability assessment and patch management. Eduzone.

Kaul, D., & Khurana, R. (2021). AI to detect and mitigate security vulnerabilities in APIs: encryption, authentication, and anomaly detection in enterprise-level distributed systems. Eigenpub Review of Science and Technology, 5(1), 34-62.

Pandey, B. K., Tanikonda, A., Peddinti, S. R., & Katragadda, S. R. (2021). AI-Enabled Predictive Maintenance Strategies for Extending the Lifespan of Legacy Systems. Journal of Science & Technology (JST), 2(5).

Sundaramurthy, S. K., Ravichandran, N., Inaganti, A. C., & Muppalaneni, R. (2022). AI-powered operational resilience: Building secure, scalable, and intelligent enterprises. Artificial Intelligence and Machine Learning Review, 3(1), 1-10.

Rossi, J. G., Rojas-Perilla, N., Krois, J., & Schwendicke, F. (2022). Cost-effectiveness of artificial intelligence as a decision-support system applied to the detection and grading of melanoma, dental caries, and diabetic retinopathy. JAMA Network Open, 5(3), e220269-e220269.

Fouad, N. S. (2022). The security economics of EdTech: vendors’ responsibility and the cybersecurity challenge in the education sector. Digital Policy, Regulation and Governance, 24(3), 259-273.

Chau, T. T. M. (2020). Deep Reinforcement Learning for Automated Cyber Threat Intelligence and Defense in Online Retail Architectures. Journal of Applied Cybersecurity Analytics, Intelligence, and Decision-Making Systems, 10(8), 1-10.

Gschwandtner, M., Demetz, L., Gander, M., & Maier, R. (2018, August). Integrating threat intelligence to enhance an organization's information security management. In Proceedings of the 13th International Conference on Availability, Reliability and Security (pp. 1-8).

Kandregula, N. (2020). Exploring Software-Defined Vehicles: A Comparative Analysis of AI and ML Models for Enhanced Autonomy and Performance.

Pedral Sampaio, R., Aguiar Costa, A., & Flores-Colen, I. (2022). A systematic review of artificial intelligence applied to facility management in the building information modeling context and future research directions. Buildings, 12(11), 1939.

Downloads

Published

20.06.2023

How to Cite

Gaurav Malik. (2023). Continuous Exposure Management Using AI and Threat Intelligence. International Journal of Intelligent Systems and Applications in Engineering, 11(6s), 934–953. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/8043

Issue

Section

Research Article