AI-Driven Threat Detection: A Brief Overview of AI Techniques in Cybersecurity

Authors

  • Muhammad Ismaeel Khan MSIT at Washington university of science and technology‬ - ‪information technology‬ - ‪database management‬
  • Aftab Arif Washington University of Science and Technology
  • Ali Raza A Khan Virginia University of Science & Technology

Keywords:

AI, automation, ethical issues, explainable AI, cybersecurity, threat detection, machine learning, deep learning, data quality, adversarial attacks, predictive analytics, and a comprehensive approach

Abstract

Artificial intelligence (AI) is developing as a revolutionary answer to cybersecurity practices, which are becoming more and more difficult due to the frequency and complexity of cyber threats. This article offers a thorough introduction to AI-driven threat detection, examining its uses, methods, difficulties, and potential developments in the field of cybersecurity. It begins by highlighting several AI methods that improve the capacity to recognize and react to threats instantly, like machine learning and deep learning. The conversation also covers the various uses of AI in cybersecurity, such as endpoint security, predictive analytics, and intrusion detection systems, which all serve to enhance threat mitigation and expedite security procedures. The application of AI in cybersecurity is not without difficulties, though. Organizations face many challenges, including those related to data quality, implementation complexity, and the possibility of hostile assaults. Furthermore, ethical concerns about privacy and bias demand that AI be used responsibly. The essay also looks at new developments that are influencing cybersecurity in the future, like explainable AI, AI-driven automation, sophisticated machine learning techniques, and partnerships between human and AI professionals. In the end, the paper emphasizes the significance of a comprehensive strategy for cybersecurity that incorporates AI tools with human knowledge and conventional security procedures. Organizations may improve their security posture and maintain resilience against emerging cyber threats by implementing AI-driven solutions and cultivating a culture of awareness and continuous learning. Organizations may strengthen their defenses and proactively handle the problems posed by an increasingly linked digital world by integrating AI.

References

Thanh SN, Stege M, El-Habr PI, Bang J, Dragoni N. Survey on botnets: incentives, evolution, detection and current trends. Future Internet. 2021. https://doi.org/10.3390/f13080198.

Perwej Y, Qamar Abbas S, Pratap Dixit J, Akhtar N, Kumar Jaiswal A. A systematic literature review on the cyber security. Int J Sci Res Manag. 2021; 9(12):669–710. https://doi.org/10.18535/ijsrm/v9i12.ec04.

AbuBakar A, Zolkipli MF. Cyber security threats and predictions: a survey. Int J Adv Eng Manag (IJAEM). 2023; 5(2):733. https://doi.org/10.35629/5252-0502733741.

Parizad A, Hatziadoniu CJ. Cyber-attack detection using principal component analysis and noisy clustering algorithms: a collaborative machine learning-based framework. IEEE Trans Smart Grid. 2022; 13(6):4848–61. https://doi.org/10.1109/TSG.2022.3176311

Welukar JN, Bajoria GP. Artifcial intelligence in cyber security—a review. Int J Sci Res Sci Technol. 2021. https://doi.org/10.32628/IJSRST218675

Shuford, J. . . (2024). Quantum Computing and Artificial Intelligence: Synergies and Challenges. Journal of Artificial Intelligence General Science (JAIGS) ISSN: 3006-4023, 1(1). https://doi.org/10.60087/jaigs.v1i1.35

Shuford, J (2024). Deep Reinforcement Learning Unleashing the Power of AI in DecisionMaking. Journal of Artificial Intelligence General Science (JAIGS) ISSN: 3006-4023, 1(1). https://doi.org/10.60087/jaigs.v1i1.36

Islam, M. M. . . (2024). The Impact of Transfer Learning on AI Performance Across Domains. Journal of Artificial Intelligence General Science (JAIGS) ISSN: 3006-4023, 1(1). https://doi.org/10.60087/jaigs.v1i1.37

Smith, J. (2021). Artificial Intelligence in Cybersecurity: A Comprehensive Review. Journal of Cybersecurity, 7(2), 45-62. 9808:675X Highly Cited Journal Acceptance Ratio below: 8%

Johnson, R., & Patel, K. (2019). Enhancing Threat Detection Using Machine Learning Algorithms. International Journal of Information Security, 12(4), 321-335.

Lee, S., & Kim, H. (2020). Deep Learning Approaches for Cyber Threat Analysis. IEEE Transactions on Cybernetics, 50(3), 189-201.

Chen, L., & Wang, Q. (2018). Real-time Detection of Network Intrusions Using AI Models. Journal of Network Security, 15(1), 78-91

Garcia, M., et al. (2022). Ethical Considerations in AI-driven Cybersecurity: A Case Study Analysis. Journal of Ethics in Technology, 3(2), 112-125.

Brown, A., & Clark, B. (2017). Human-Machine Collaboration in Cybersecurity: Challenges and Opportunities. ACM Transactions on Internet Technology, 9(4), 255-268

Nguyen, T., et al. (2019). Enhancing Cybersecurity with Explainable AI: A Survey. Journal of Artificial Intelligence Research, 28(3), 201-215.

Patel, S., et al. (2020). The Role of AI Models in Adaptive Cyber Threat Detection. Journal of Computer Security, 14(2), 167-180.

Kim, Y., & Park, W. (2018). AI-driven Threat Intelligence: Challenges and Solutions. International Journal of Intelligent Systems, 25(1), 45-58.

Wilson, D., & White, L. (2021). Cybersecurity Resilience: The Role of AI Models in Adaptive Defense Mechanisms. Journal of Resilience Engineering, 6(2), 87-99.

Johnson, P., & Miller, R. (2019). Evaluating AI-driven Cybersecurity Solutions: A Comparative Analysis. Journal of Information Systems, 11(3), 301-315. 9808:

Lee, H., & Kim, S. (2020). AI-powered Threat Hunting: Techniques and Applications. Journal of Computer Forensics, 8(1), 55-68.

Smith, R., et al. (2017). AI-driven Vulnerability Management: A Comprehensive Framework. Journal of Cyber Defense, 5(2), 123-137

Nguyen, Q., & Tran, T. (2019). A Survey of AI Techniques for Cybersecurity. Journal of Information Assurance & Cybersecurity, 12(3), 221-235.

Patel, N., et al. (2021). Advancements in AI-driven Cyber Threat Analysis: A Case Study. Journal of Security Engineering, 18(4), 309-322.

Kim, S., & Lee, J. (2018). The Role of AI Models in Proactive Cyber Defense. Journal of Digital Security, 9(1), 67-79.

Wilson, L., et al. (2020). AI-driven Incident Response: Challenges and Solutions. Journal of Incident Management, 14(3), 231-245.

Brown, M., & Jones, D. (2019). AI Models for Malware Detection: A Comparative Study. Journal of Malware Research, 7(2), 145-158.

Garcia, T., et al. (2018). AI-driven Threat Intelligence Sharing: Opportunities and Challenges. Journal of Information Sharing & Cybersecurity, 11(4), 387-401.

Thomas T, Vijayaraghavan AP, Emmanuel S. Machine learning approaches in cyber security analytics. 2019. https://doi.org/10.1007/978-981-15-1706-8

Barik K, Misra S, Konar K, Fernandez-Sanz L, Koyuncu M. Cybersecurity deep: approaches, attacks dataset, and comparative study. Appl Artif Intell. 2022. https://doi.org/10.1080/08839514.2022.2055399

Nordin NS, et al. A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection. Indonesian J Electr Eng Comput Sci. 2021; 23(2):1146–58. https://doi.org/10.11591/ijeecs.v23.i2.pp1146-1158

Agrawal P, Abutarboush HF, Ganesh T, Mohamed AW. Metaheuristic algorithms on feature selection: a survey of one decade of research (2009–2019). IEEE Access. 2021; 9:26766–91. https://doi.org/10.1109/ACCESS.2021.30564 07

Kuntla GS, Tian X, Li Z. Security and privacy in machine learning: a survey. Issues Inf Syst. 2021;22(3):224–40. https://doi.org/10.48009/3_iis_2021_242-258.

Peng J, Jury EC, Dönnes P, Ciurtin C. Machine learning techniques for personalised medicine approaches in immune-mediated chronic infammatory diseases: applications and challenges. Front Pharmacol. 2021; 12(September):1–18. https://doi.org/10.3389/fphar.2021.720694

Alduailij M, Khan QW, Tahir M, Sardaraz M, Alduailij M, Malik F. Machine-learning-based DDoS attack detection using mutual information and random forest feature importance method. Symmetry (Basel). 2022; 14(6):1–15. https://doi.org/10.3390/sym14061095.

Sarker IH. CyberLearning: efectiveness analysis of machine learning security modeling to detect cyber-anomalies and multi-attacks. Internet Things. 2021; 14:100393. https://doi.org/10.1016/j.iot.2021.100393.

Hasan M, Islam MM, Zarif MII, Hashem MMA. Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet Things. 2019; 7:100059. https://doi.org/10.1016/j.iot.2019.100059.

Sarker IH, Kayes ASM, Badsha S, Alqahtani H, Watters P, Ng A. Cybersecurity data science: an overview from machine learning perspective. J Big Data. 2020. https://doi.org/10.1186/s40537-020-00318-5.

Rodriguez E, Otero B, Gutierrez N, Canal R. A survey of deep learning techniques for cybersecurity in mobile networks. IEEE Commun Surv Tutor. 2021; 23(3):1920–55. https://doi.org/10.1109/COMST.2021.3086296

Pourafshin F. Big data mining in internet of things using fusion of deep features. Int J Sci Res Eng Trends. 2021; 7(2):1089–93.

Gu H, Wang Y, Hong S, Gui G. Blind channel identifcation aided generalized automatic modulation recognition based on deep learning. IEEE Access. 2019; 7:110722–9. https://doi.org/10.1109/ACCESS.2019.2934354.

Salem et al. Journal of Big Data (2024) 11:105 Page 36 of 38

Hassan IH, Mohammed A, Masama MA. Metaheuristic algorithms in network intrusion detection. In: Comprehensive metaheuristics. Elsevier; 2023. p. 95–129. https://doi.org/10.1016/B978-0-323-91781-0.00006-5.

Rajwar K, Deep K, Das S. An exhaustive review of the metaheuristic algorithms for search and optimization: taxonomy, applications, and open challenges. Artif Intell Rev. 2023. https://doi.org/10.1007/s10462-023-10470-y.

Role of AI in cyber security through Anomaly detection and Predictive analysis. J Inf Educ Res. 2023; 3:2. https://doi.org/10.52783/jier.v3i2.314.

Ozkan-Okay M, et al. A comprehensive survey: evaluating the efciency of artifcial intelligence and machine learning techniques on cyber security solutions. IEEE Access. 2024; 12:12229–56. https://doi.org/10.1109/ACCESS.2024.3355547

Sangwan RS, Badr Y, Srinivasan SM. Cybersecurity for AI systems: a survey. J Cybersecur Privacy. 2023; 3(2):166–90. https://doi.org/10.3390/jcp3020010

Mohamed N. Current trends in AI and ML for cybersecurity: a state-of-the-art survey. Cogent Eng. 2023. https://doi.org/10.1080/23311916.2023.2272358

Kaur R, Gabrijelčič D, Klobučar T. Artifcial intelligence for cybersecurity: literature review and future research directions. Inf Fusion. 2023. https://doi.org/10.1016/j.infus.2023.101804

Bin Hulayyil S, Li S, Xu L. Machine-learning-based vulnerability detection and classifcation in internet of things device security. Electronics (Switzerland). 2023. https://doi.org/10.3390/electronics12183927

Asiri MM, et al. Hybrid metaheuristics feature selection with stacked deep learning-enabled cyber-attack detection model. Comput Syst Sci Eng. 2023; 45(2):1679–94. https://doi.org/10.32604/csse.2023.031063.

Caviglione L, et al. Tight arms race: overview of current malware threats and trends in their detection. IEEE Access. 2021; 9:5371–96. https://doi.org/10.1109/ACCESS.2020.3048319.

A JH, Wang Z, Joe I. A CNN-based automatic vulnerability detection. EURASIP J Wirel Commun Netw. 2023. https://doi.org/10.1186/s13638-023-02255-2.

Lucky G, Jjunju F, Marshall A. A lightweight decision-tree algorithm for detecting DDoS fooding attacks. In Proceedings—companion of the 2020 IEEE 20th international conference on software quality, reliability, and security, QRS-C 2020, Institute of Electrical and Electronics Engineers Inc., Dec. 2020, pp. 382–389. https://doi.org/10.1109/QRS-C51114.2020.00072.

Mynuddin M, Hossain MI, Uddin Khan S, Islam MA, Mohammed Abdul Ahad D, Tanvir MS. Cyber security system using fuzzy logic. In International Conference on Electrical, Computer, Communications and Mechatronics Engineering, ICECCME 2023, Institute of Electrical and Electronics Engineers Inc., 2023. https://doi.org/10.1109/ICECCME57830.2023.10252778

ElDahshan KA, AlHabshy AAA, Hameed BI. Meta-heuristic optimization algorithm-based hierarchical intrusion detection system. Computers. 2022. https://doi.org/10.3390/computers11120170.

Downloads

Published

2024-10-04

How to Cite

Muhammad Ismaeel Khan, Aftab Arif, & Ali Raza A Khan. (2024). AI-Driven Threat Detection: A Brief Overview of AI Techniques in Cybersecurity. BIN : Bulletin Of Informatics, 2(2), 248–261. Retrieved from https://ojs.jurnalmahasiswa.com/ojs/index.php/bin/article/view/357