The Impact of AI on Cybersecurity: Emerging Threats and Solutions

The Impact of AI on Cybersecurity: Emerging Threats and Solutions

Authors

  • Oluebube Princess Egbuna Engineering Lead, WellBeyond Water, Texas, United States

Downloads

Keywords:

Artificial Intelligence, Cybersecurity, Emerging Threats, Machine Learning, AI-driven Attacks, Security Solutions, Threat Detection, Malware Detection, Vulnerability Management,, Data Privacy

Abstract

The impact of artificial intelligence (AI) on cybersecurity is examined in this paper, emphasizing new risks and countermeasures. The primary goals are to explore the difficulties presented by AI-driven cyber threats and study how AI improves threat detection, incident response, and vulnerability management. A thorough examination of secondary data, including case studies and real-world applications from various industries, including e-commerce, healthcare, and finance, is part of the process. Important discoveries show that artificial intelligence (AI) dramatically enhances endpoint security, automates incident response, and increases the capacity to identify advanced persistent threats (APTs), insider threats, and zero-day exploits. However, AI makes it possible to attack more complexly, such as malware with AI capabilities and hostile approaches. Future perspectives emphasize the significance of creating strong adversarial defenses and explainable AI (XAI) and the possibilities of increased threat intelligence, autonomous security systems, and quantum computing integration. The policy implications emphasize the necessity of all-encompassing legal frameworks to guarantee data privacy, accountability, and ethical AI use. They also highlight the importance of encouraging public-private partnerships and funding AI research. Based on responsible AI use and addressing associated problems, this study indicates that AI can build a digital ecosystem that is more resilient and safe.

Downloads

Download data is not yet available.

References

AboulEla, S., Ibrahim, N., Shehmir, S., Yadav, A., Kashef, R. (2024). Navigating the Cyber Threat Landscape: An In-Depth Analysis of Attack Detection within IoT Ecosystems. AI, 5(2), 704. https://doi.org/10.3390/ai5020037

Ahakonye, L. A. C., Nwakanma, C. I., Dong-Seong, K. (2024). Tides of Blockchain in IoT Cybersecurity. Sensors, 24(10), 3111. https://doi.org/10.3390/s24103111

Ahmad, S. F., Han, H., Alam, M. M., Rehmat, M. K., Irshad, M. (2023). Impact of Artificial Intelligence on Human Loss in Decision Making, Laziness and Safety in Education. Humanities & Social Sciences Communications, 10(1), 311. https://doi.org/10.1057/s41599-023-01787-8

Alevizos, L., Dekker, M. (2024). Towards an AI-Enhanced Cyber Threat Intelligence Processing Pipeline. Electronics, 13(11), 2021. https://doi.org/10.3390/electronics13112021

Bergadano, F., Giacinto, G. (2023). Special Issue “AI for Cybersecurity: Robust Models for Authentication, Threat and Anomaly Detection”. Algorithms, 16(7), 327. https://doi.org/10.3390/a16070327

Eze, C. S., Shamir, L. (2024). Analysis and Prevention of AI-Based Phishing Email Attacks. Electronics, 13(10), 1839. https://doi.org/10.3390/electronics13101839

Garg, R., Devi, J. (2023). Empowering Cybersecurity: A Deep Dive into AI-Driven Security Intelligence Modelling. i-Manager's Journal on Information Technology, 12(4), 1-6. https://doi.org/10.26634/jit.12.4.20363

Garg, R., Devi, J. (2023). Preventing Cyber Attacks using Artificial Intelligence. i-Manager's Journal on Software Engineering, 18(2), 1-9. https://doi.org/10.26634/jse.18.2.20367

Govea, J., Gaibor-Naranjo, W., Villegas-Ch, W. (2024). Transforming Cybersecurity into Critical Energy Infrastructure: A Study on the Effectiveness of Artificial Intelligence. Systems, 12(5), 165. https://doi.org/10.3390/systems12050165

Illiashenko, O., Kharchenko, V., Babeshko, I., Fesenko, H., Di Giandomenico, F. (2023). Security-Informed Safety Analysis of Autonomous Transport Systems Considering AI-Powered Cyberattacks and Protection. Entropy, 25(8), 1123. https://doi.org/10.3390/e25081123

Kalogiannidis, S., Kalfas, D., Papaevangelou, O., Giannarakis, G., Chatzitheodoridis, F. (2024). The Role of Artificial Intelligence Technology in Predictive Risk Assessment for Business Continuity: A Case Study of Greece. Risks, 12(2), 19. https://doi.org/10.3390/risks12020019

Kim, J., Park, N. (2020). Blockchain-Based Data-Preserving AI Learning Environment Model for AI Cybersecurity Systems in IoT Service Environments. Applied Sciences, 10(14), 4718. https://doi.org/10.3390/app10144718

Lysenko, S., Bobro, N., Korsunova, K., Vasylchyshyn, O., Tatarchenko, Y. (2024). The Role of Artificial Intelligence in Cybersecurity: Automation of Protection and Detection of Threats. Economic Affairs, suppl. Special Issue, 69, 43-51. https://doi.org/10.46852/0424-2513.1.2024.6

Moghadasi, N., Valdez, R. S., Piran, M., Moghaddasi, N., Linkov, I. (2024). Risk Analysis of Artificial Intelligence in Medicine with a Multilayer Concept of System Order. Systems, 12(2), 47. https://doi.org/10.3390/systems12020047

Mohamed, N. (2023). Current Trends in AI and ML for Cybersecurity: A State-of-the-art Survey. Cogent Engineering, 10(2). https://doi.org/10.1080/23311916.2023.2272358

Preuveneers, D., Joosen, W. (2024). An Ontology-Based Cybersecurity Framework for AI-Enabled Systems and Applications. Future Internet, 16(3), 69. https://doi.org/10.3390/fi16030069

Radanliev, P. (2024). Artificial Intelligence and Quantum Cryptography. Journal of Analytical Science and Technology, 15(1), 4. https://doi.org/10.1186/s40543-024-00416-6

Sangwan, R. S., Badr, Y., Srinivasan, S. M. (2023). Cybersecurity for AI Systems: A Survey. Journal of Cybersecurity and Privacy, 3(2), 166. https://doi.org/10.3390/jcp3020010

Seara, J. P., Serrão, C. (2024). Automation of System Security Vulnerabilities Detection Using Open-Source Software. Electronics, 13(5), 873. https://doi.org/10.3390/electronics13050873

Downloads

Published

10-04-2021

How to Cite

Princess Egbuna, O. “The Impact of AI on Cybersecurity: Emerging Threats and Solutions”. Journal of Science & Technology, vol. 2, no. 2, Apr. 2021, pp. 43-67, https://thesciencebrigade.com/jst/article/view/232.
PlumX Metrics

Plaudit

License Terms

Ownership and Licensing:

Authors of this research paper submitted to the Journal of Science & Technology retain the copyright of their work while granting the journal certain rights. Authors maintain ownership of the copyright and have granted the journal a right of first publication. Simultaneously, authors agreed to license their research papers under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License.

License Permissions:

Under the CC BY-NC-SA 4.0 License, others are permitted to share and adapt the work, as long as proper attribution is given to the authors and acknowledgement is made of the initial publication in the Journal of Science & Technology. This license allows for the broad dissemination and utilization of research papers.

Additional Distribution Arrangements:

Authors are free to enter into separate contractual arrangements for the non-exclusive distribution of the journal's published version of the work. This may include posting the work to institutional repositories, publishing it in journals or books, or other forms of dissemination. In such cases, authors are requested to acknowledge the initial publication of the work in the Journal of Science & Technology.

Online Posting:

Authors are encouraged to share their work online, including in institutional repositories, disciplinary repositories, or on their personal websites. This permission applies both prior to and during the submission process to the Journal of Science & Technology. Online sharing enhances the visibility and accessibility of the research papers.

Responsibility and Liability:

Authors are responsible for ensuring that their research papers do not infringe upon the copyright, privacy, or other rights of any third party. The Journal of Science & Technology and The Science Brigade Publishers disclaim any liability or responsibility for any copyright infringement or violation of third-party rights in the research papers.

Loading...