The Impact of AI on Cybersecurity: Emerging Threats and Solutions
Downloads
Keywords:
Artificial Intelligence, Cybersecurity, Emerging Threats, Machine Learning, AI-driven Attacks, Security Solutions, Threat Detection, Malware Detection, Vulnerability Management,, Data PrivacyAbstract
The impact of artificial intelligence (AI) on cybersecurity is examined in this paper, emphasizing new risks and countermeasures. The primary goals are to explore the difficulties presented by AI-driven cyber threats and study how AI improves threat detection, incident response, and vulnerability management. A thorough examination of secondary data, including case studies and real-world applications from various industries, including e-commerce, healthcare, and finance, is part of the process. Important discoveries show that artificial intelligence (AI) dramatically enhances endpoint security, automates incident response, and increases the capacity to identify advanced persistent threats (APTs), insider threats, and zero-day exploits. However, AI makes it possible to attack more complexly, such as malware with AI capabilities and hostile approaches. Future perspectives emphasize the significance of creating strong adversarial defenses and explainable AI (XAI) and the possibilities of increased threat intelligence, autonomous security systems, and quantum computing integration. The policy implications emphasize the necessity of all-encompassing legal frameworks to guarantee data privacy, accountability, and ethical AI use. They also highlight the importance of encouraging public-private partnerships and funding AI research. Based on responsible AI use and addressing associated problems, this study indicates that AI can build a digital ecosystem that is more resilient and safe.Downloads
References
AboulEla, S., Ibrahim, N., Shehmir, S., Yadav, A., Kashef, R. (2024). Navigating the Cyber Threat Landscape: An In-Depth Analysis of Attack Detection within IoT Ecosystems. AI, 5(2), 704. https://doi.org/10.3390/ai5020037
Ahakonye, L. A. C., Nwakanma, C. I., Dong-Seong, K. (2024). Tides of Blockchain in IoT Cybersecurity. Sensors, 24(10), 3111. https://doi.org/10.3390/s24103111
Ahmad, S. F., Han, H., Alam, M. M., Rehmat, M. K., Irshad, M. (2023). Impact of Artificial Intelligence on Human Loss in Decision Making, Laziness and Safety in Education. Humanities & Social Sciences Communications, 10(1), 311. https://doi.org/10.1057/s41599-023-01787-8
Alevizos, L., Dekker, M. (2024). Towards an AI-Enhanced Cyber Threat Intelligence Processing Pipeline. Electronics, 13(11), 2021. https://doi.org/10.3390/electronics13112021
Bergadano, F., Giacinto, G. (2023). Special Issue “AI for Cybersecurity: Robust Models for Authentication, Threat and Anomaly Detection”. Algorithms, 16(7), 327. https://doi.org/10.3390/a16070327
Eze, C. S., Shamir, L. (2024). Analysis and Prevention of AI-Based Phishing Email Attacks. Electronics, 13(10), 1839. https://doi.org/10.3390/electronics13101839
Garg, R., Devi, J. (2023). Empowering Cybersecurity: A Deep Dive into AI-Driven Security Intelligence Modelling. i-Manager's Journal on Information Technology, 12(4), 1-6. https://doi.org/10.26634/jit.12.4.20363
Garg, R., Devi, J. (2023). Preventing Cyber Attacks using Artificial Intelligence. i-Manager's Journal on Software Engineering, 18(2), 1-9. https://doi.org/10.26634/jse.18.2.20367
Govea, J., Gaibor-Naranjo, W., Villegas-Ch, W. (2024). Transforming Cybersecurity into Critical Energy Infrastructure: A Study on the Effectiveness of Artificial Intelligence. Systems, 12(5), 165. https://doi.org/10.3390/systems12050165
Illiashenko, O., Kharchenko, V., Babeshko, I., Fesenko, H., Di Giandomenico, F. (2023). Security-Informed Safety Analysis of Autonomous Transport Systems Considering AI-Powered Cyberattacks and Protection. Entropy, 25(8), 1123. https://doi.org/10.3390/e25081123
Kalogiannidis, S., Kalfas, D., Papaevangelou, O., Giannarakis, G., Chatzitheodoridis, F. (2024). The Role of Artificial Intelligence Technology in Predictive Risk Assessment for Business Continuity: A Case Study of Greece. Risks, 12(2), 19. https://doi.org/10.3390/risks12020019
Kim, J., Park, N. (2020). Blockchain-Based Data-Preserving AI Learning Environment Model for AI Cybersecurity Systems in IoT Service Environments. Applied Sciences, 10(14), 4718. https://doi.org/10.3390/app10144718
Lysenko, S., Bobro, N., Korsunova, K., Vasylchyshyn, O., Tatarchenko, Y. (2024). The Role of Artificial Intelligence in Cybersecurity: Automation of Protection and Detection of Threats. Economic Affairs, suppl. Special Issue, 69, 43-51. https://doi.org/10.46852/0424-2513.1.2024.6
Moghadasi, N., Valdez, R. S., Piran, M., Moghaddasi, N., Linkov, I. (2024). Risk Analysis of Artificial Intelligence in Medicine with a Multilayer Concept of System Order. Systems, 12(2), 47. https://doi.org/10.3390/systems12020047
Mohamed, N. (2023). Current Trends in AI and ML for Cybersecurity: A State-of-the-art Survey. Cogent Engineering, 10(2). https://doi.org/10.1080/23311916.2023.2272358
Preuveneers, D., Joosen, W. (2024). An Ontology-Based Cybersecurity Framework for AI-Enabled Systems and Applications. Future Internet, 16(3), 69. https://doi.org/10.3390/fi16030069
Radanliev, P. (2024). Artificial Intelligence and Quantum Cryptography. Journal of Analytical Science and Technology, 15(1), 4. https://doi.org/10.1186/s40543-024-00416-6
Sangwan, R. S., Badr, Y., Srinivasan, S. M. (2023). Cybersecurity for AI Systems: A Survey. Journal of Cybersecurity and Privacy, 3(2), 166. https://doi.org/10.3390/jcp3020010
Seara, J. P., Serrão, C. (2024). Automation of System Security Vulnerabilities Detection Using Open-Source Software. Electronics, 13(5), 873. https://doi.org/10.3390/electronics13050873
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
License Terms
Ownership and Licensing:
Authors of this research paper submitted to the journal owned and operated by The Science Brigade Group retain the copyright of their work while granting the journal certain rights. Authors maintain ownership of the copyright and have granted the journal a right of first publication. Simultaneously, authors agreed to license their research papers under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License.
License Permissions:
Under the CC BY-NC-SA 4.0 License, others are permitted to share and adapt the work, as long as proper attribution is given to the authors and acknowledgement is made of the initial publication in the Journal. This license allows for the broad dissemination and utilization of research papers.
Additional Distribution Arrangements:
Authors are free to enter into separate contractual arrangements for the non-exclusive distribution of the journal's published version of the work. This may include posting the work to institutional repositories, publishing it in journals or books, or other forms of dissemination. In such cases, authors are requested to acknowledge the initial publication of the work in this Journal.
Online Posting:
Authors are encouraged to share their work online, including in institutional repositories, disciplinary repositories, or on their personal websites. This permission applies both prior to and during the submission process to the Journal. Online sharing enhances the visibility and accessibility of the research papers.
Responsibility and Liability:
Authors are responsible for ensuring that their research papers do not infringe upon the copyright, privacy, or other rights of any third party. The Science Brigade Publishers disclaim any liability or responsibility for any copyright infringement or violation of third-party rights in the research papers.
Plaudit
License Terms
Ownership and Licensing:
Authors of this research paper submitted to the Journal of Science & Technology retain the copyright of their work while granting the journal certain rights. Authors maintain ownership of the copyright and have granted the journal a right of first publication. Simultaneously, authors agreed to license their research papers under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License.
License Permissions:
Under the CC BY-NC-SA 4.0 License, others are permitted to share and adapt the work, as long as proper attribution is given to the authors and acknowledgement is made of the initial publication in the Journal of Science & Technology. This license allows for the broad dissemination and utilization of research papers.
Additional Distribution Arrangements:
Authors are free to enter into separate contractual arrangements for the non-exclusive distribution of the journal's published version of the work. This may include posting the work to institutional repositories, publishing it in journals or books, or other forms of dissemination. In such cases, authors are requested to acknowledge the initial publication of the work in the Journal of Science & Technology.
Online Posting:
Authors are encouraged to share their work online, including in institutional repositories, disciplinary repositories, or on their personal websites. This permission applies both prior to and during the submission process to the Journal of Science & Technology. Online sharing enhances the visibility and accessibility of the research papers.
Responsibility and Liability:
Authors are responsible for ensuring that their research papers do not infringe upon the copyright, privacy, or other rights of any third party. The Journal of Science & Technology and The Science Brigade Publishers disclaim any liability or responsibility for any copyright infringement or violation of third-party rights in the research papers.