0% found this document useful (0 votes)
22 views12 pages

Advancements in AI

The document discusses advancements in AI-driven cybersecurity, highlighting the importance of artificial intelligence in enhancing threat detection and response capabilities. It reviews various AI techniques such as machine learning, natural language processing, and computer vision, which are crucial for identifying and mitigating evolving cyber threats. The paper also addresses challenges related to explainability and biases in AI systems, while emphasizing the need for organizations to integrate AI into their cybersecurity frameworks for improved defenses.

Uploaded by

fajaranwar957
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views12 pages

Advancements in AI

The document discusses advancements in AI-driven cybersecurity, highlighting the importance of artificial intelligence in enhancing threat detection and response capabilities. It reviews various AI techniques such as machine learning, natural language processing, and computer vision, which are crucial for identifying and mitigating evolving cyber threats. The paper also addresses challenges related to explainability and biases in AI systems, while emphasizing the need for organizations to integrate AI into their cybersecurity frameworks for improved defenses.

Uploaded by

fajaranwar957
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Advancements in AI-Driven Cybersecurity and

Comprehensive Threat Detection and Response


Nguyen Thi Minh Huyen
Hanoi University of Science and Technology
huyen.nguyen@hust.vn
Tran Quoc Bao
Vietnam National University, Ho Chi Minh City
bao.tran@vnuhcm.edu.vn
Abstract
Cyber threats are continuously evolving, requiring advanced technologies to detect and
Keywords: respond to attacks. Artificial intelligence (AI) has emerged as a crucial tool for
• Artificial Intelligence enhancing cybersecurity and enabling comprehensive threat detection and automated
(AI) response. This paper reviews the latest advancements in applying AI for cyber defense,
• Machine Learning focusing on machine learning, natural language processing, computer vision, and
• Threat Detection automation techniques. An analysis of leading solutions from cybersecurity vendors
• Automation reveals a paradigm shift towards AI-driven security platforms that contextualize
• Human Expertise threats, understand typical behavior, and take precise actions. Challenges remain in
• Cybersecurity explainability, potential biases, and adversarial attacks against AI systems.
Recommendations include developing robust training datasets, employing ensemble
models, strengthening explainability and accountability, and maintaining human
expertise oversight. However, the transformative potential of AI for cybersecurity
makes it imperative for organizations to integrate it into threat detection and response
frameworks. With careful implementation, AI can significantly uplift cyber defenses
Excellence in Peer-Reviewed in the modern threat landscape.
Publishing:
QuestSquare

Creative Commons License Notice:


This work is licensed under the Creative Commons Attribution-ShareAlike 4.0 International License (CC BY-SA 4.0).
You are free to:
Share: Copy and redistribute the material in any medium or format.
Adapt: Remix, transform, and build upon the material for any purpose, even commercially.
Under the following conditions:
Attribution: You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any
reasonable manner, but not in any way that suggests the licensor endorses you or your use.
ShareAlike: If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the
original. Please visit the Creative Commons website at https://creativecommons.org/licenses/by-sa/4.0/.

Introduction
Over the past decade, the frequency, diversity, and impact of cyber threats have
experienced a dramatic surge, posing significant challenges to organizations across
the globe [1]. With cybercriminal activities estimated to cost the global economy over
$6 trillion annually by 2021, it has become abundantly clear that the threat landscape
is evolving at an unprecedented rate. From the proliferation of malware and
ransomware to the sophistication of phishing and supply chain attacks, cyber threats
exploit a multitude of vectors to breach organizational defenses and wreak havoc on
systems and data [2]. Traditional security tools, characterized by static rules and
Journal of Intelligent Connectivity and Emerging Technologies
VOLUME 9 ISSUE 1

[1]
signatures, have proven woefully inadequate in the face of today's polymorphic
attacks, which leverage machine learning and other evasion techniques to evade
detection. As a result, there is an urgent need for intelligent and adaptive cybersecurity
solutions capable of analyzing threats, understanding context, and executing precise
response actions to mitigate the ever-growing risk posed by cyber threats [3].
In response to the escalating threat landscape, organizations are increasingly
recognizing the imperative of adopting intelligent and adaptive cybersecurity
solutions to safeguard their digital assets and infrastructure. These solutions leverage
advanced technologies such as machine learning, artificial intelligence, and
behavioral analytics to proactively identify and mitigate cyber threats in real-time [4].
By moving beyond static rules and signatures, intelligent cybersecurity solutions are
able to dynamically analyze threats, discern patterns, and identify anomalous behavior
indicative of malicious activity. Moreover, these solutions are equipped with the
ability to understand context, taking into account factors such as user behavior,
network traffic, and system configurations to make informed decisions about threat
severity and appropriate response actions [5]. This proactive approach to
cybersecurity enables organizations to stay one step ahead of cyber threats, thwarting
attacks before they can inflict significant damage and disruption.

Figure 1: Changing Cybersecurity's Future with an AI-Driven Approach [6]

Artificial intelligence (AI) has emerged as a pivotal technology for transforming


cybersecurity and enabling next-generation threat detection and response platforms.
AI refers to intelligent systems that learn, reason, and interact with the environment
[7]. By applying algorithms that can learn from data, AI systems can continuously
improve their functionality without explicit programming. Machine learning, as a
branch of AI, allows models to autonomously build capabilities using representative
Journal of Intelligent Connectivity and Emerging Technologies
VOLUME 9 ISSUE 1

[2]
datasets. When implemented for cybersecurity, AI solutions can process enormous
volumes of data to identify anomalies, recognize attack patterns, and take automated
actions. This overcomes the limitations of legacy rules-based tools [8].

This paper reviews the latest techniques and platforms using AI to enhance cyber
threat detection and response. The current landscape of AI-driven cybersecurity
products is analyzed to highlight advanced functionality delivered through AI
techniques like machine learning, natural language processing (NLP), and computer
vision. Key strengths of AI in enabling comprehensive and contextual threat
intelligence are discussed. Design recommendations for implementing robust AI
models are provided, along with best practices for explainability and human-machine
teaming. The analysis underscores why AI is becoming indispensable for
cybersecurity as digital attack surfaces keep expanding.

Background
AI techniques relevant for cybersecurity: Artificial intelligence (AI) techniques
have revolutionized the landscape of cybersecurity, offering innovative solutions to
combat the ever-evolving and increasingly sophisticated threats facing organizations
and individuals. Among these techniques, machine learning stands out as a powerful
tool, leveraging algorithms that enable models to learn from data without the need for
explicit programming. Within the realm of cybersecurity, machine learning finds
widespread application in tasks such as anomaly detection, where it can identify
deviations from normal behavior patterns indicative of potential security breaches [9].
Additionally, machine learning algorithms excel in malware classification, allowing
for the rapid identification and mitigation of malicious software before it can inflict
harm. User behavior analysis is another area where machine learning shines, as it can
detect aberrant actions that may signify unauthorized access or insider threats within
a system. Moreover, predictive maintenance, facilitated by machine learning models,
enables organizations to preemptively address vulnerabilities and weaknesses in their
cybersecurity infrastructure, thus enhancing overall resilience and threat readiness.

Deep learning, a subset of machine learning, further amplifies the capabilities of


cybersecurity systems by employing multiple processing layers to learn intricate
representations of data with multiple levels of abstraction. This advanced technique is
particularly valuable in threat detection across various mediums such as documents,
images, networks, and system calls. By leveraging deep learning models,
cybersecurity professionals can uncover hidden patterns and anomalies that may elude
traditional detection methods, thereby fortifying defenses against sophisticated
cyberattacks [10]. Natural language processing (NLP) is yet another critical AI
technique that plays a pivotal role in cybersecurity. By enabling machines to analyze,
process, and generate human language, NLP facilitates tasks such as parsing security
logs, extracting indicators of compromise from reports, and enhancing
communication through conversational agents. Furthermore, computer vision,
Journal of Intelligent Connectivity and Emerging Technologies
VOLUME 9 ISSUE 1

[3]
powered by machine learning algorithms, enables automated analysis and
comprehension of visual data, contributing to tasks such as facial recognition and
behavior analysis in surveillance footage. Reinforcement learning adds another
dimension to AI-driven cybersecurity by empowering agents to dynamically
determine actions to maximize rewards through trial-and-error interactions with the
environment. This adaptive approach facilitates the development of resilient network
security strategies and automated red teaming, allowing organizations to proactively
defend against emerging threats and maintain a robust cybersecurity posture in an
ever-changing threat landscape [11].

Evolution of AI-driven cybersecurity: The evolution of cybersecurity over the past


several decades has been marked by significant advancements in technology and
methodologies aimed at combating increasingly sophisticated threats. It all began with
the early adoption of statistical methods and expert systems in the field, which laid
the foundation for rules-based detection systems. These early systems were
instrumental in identifying and mitigating known threats, but they were limited in their
ability to adapt to new and evolving attack vectors [12].The 1990s saw the rise of
commercial anti-virus software and intrusion detection/prevention solutions, which
provided organizations with more robust defenses against malware and unauthorized
access attempts [13]. These solutions utilized signature-based detection techniques to
identify known malicious patterns, but they struggled to keep pace with the rapid
proliferation of new malware variants. In response to the growing challenge of
malware diversity, the 2000s witnessed an increasing reliance on supervised learning
algorithms for malware classification. By analyzing large datasets of known malware
samples, these algorithms were able to identify common characteristics and behaviors,
enabling more accurate detection of previously unseen threats [14].

Table 1: Common ML algorithms applied in cybersecurity

Algorithm Type Algorithms Cybersecurity


Applications
Supervised Decision trees, logistic Malware classification,
Learning regression, support vector network intrusion detection
machines
Unsupervised K-means clustering, isolation Anomaly detection, user
Learning forests, autoencoders behavior profiling
Reinforcement Q-learning, deep Q networks Adaptive network security,
Learning automated red teaming
In recent years, the cybersecurity landscape has been transformed by the emergence
of deep learning and natural language processing (NLP) technologies. These advanced
machine learning techniques have enabled the development of highly automated
systems capable of analyzing vast amounts of data and identifying complex patterns
indicative of malicious activity. This has driven the evolution of contextual threat
Journal of Intelligent Connectivity and Emerging Technologies
VOLUME 9 ISSUE 1

[4]
intelligence, allowing organizations to better understand the nature and scope of cyber
threats and respond more effectively. Moreover, there has been a significant shift from
reactive, signature-based tools to proactive cybersecurity measures augmented by
artificial intelligence (AI) [14]. By leveraging AI-driven analytics and automation,
security operations teams can detect and respond to threats in real-time, minimizing
the impact of cyber attacks and reducing the likelihood of future breaches. This
proactive approach to cybersecurity is essential in an increasingly interconnected and
digitized world, where the potential consequences of a successful cyber attack can be
devastating [15].

Review of AI Techniques for Core Cybersecurity


Capabilities
This section provides an overview of how key AI techniques are enhancing core
cybersecurity capabilities:

Threat and Anomaly Detection: In the realm of threat and anomaly detection, AI
techniques have revolutionized cybersecurity capabilities, enabling real-time
identification of potential risks and deviations from normal behavior. Unsupervised
machine learning (ML) algorithms such as isolation forests and autoencoders have
emerged as powerful tools for detecting anomalies in system logs and network traffic,
allowing organizations to swiftly identify and respond to potential threats.
Furthermore, the application of deep learning to malware classification has proven to
be highly effective, with models continuously updated with new data to stay ahead of
evolving threats. By analyzing the relationships between events using graph analytics
and random walks, cybersecurity professionals can uncover previously unseen threat
patterns, providing invaluable insights into potential vulnerabilities [16]. Additionally,
user and entity behavioral analytics (UEBA) solutions leverage machine learning to
detect changes from normal behavior, enabling organizations to identify and mitigate
insider threats more effectively.

Security Monitoring and Incident Response: AI-driven solutions have significantly


enhanced security monitoring and incident response capabilities, empowering
organizations to detect and respond to threats with greater speed and accuracy. Self-
supervised classification models trained to categorize security events and incidents
enable efficient triage, allowing security teams to prioritize their response efforts
based on the severity and urgency of each threat. Natural language processing (NLP)
techniques extract indicators of compromise from threat reports and other sources,
providing analysts with actionable intelligence to inform their decision-making
process. Automated playbooks leverage AI planning methods to execute response
workflows without human involvement, enabling organizations to respond to threats
in real-time and minimize the impact of cyber-attacks [17]. Additionally, chatbots
serve as virtual assistants for security analysts, providing them with access to relevant
information and enabling them to execute actions more efficiently [18].
Journal of Intelligent Connectivity and Emerging Technologies
VOLUME 9 ISSUE 1

[5]
Attack Surface Management: AI-driven solutions have revolutionized the way
organizations identify and mitigate potential vulnerabilities. AI-enabled network
mapping and asset discovery provide organizations with continuous visibility into
their digital infrastructure, reducing blind spots and enabling more effective risk
management. Web application scanners leverage deep learning and dynamic crawling
techniques to identify vulnerabilities in web applications without access to the source
code, enabling organizations to proactively address potential security issues before
they can be exploited by malicious actors. Furthermore, cloud security posture
management solutions employ machine learning to analyze misconfigurations across
cloud assets, helping organizations maintain a secure and compliant cloud
environment.

Table 2: Capability analysis of leading cyber-AI platforms


Platform Anomaly Behavior Automated Explainability
Detection Analytics Response
CrowdStrike ✓ Limited
Falcon
Darktrace ✓ ✓ ✓ Limited
Immune System
SentinelOne ✓ ✓ ✓
Singularity
Identity and Access Management: AI techniques are also transforming identity and
access management practices, enabling organizations to more effectively detect and
mitigate insider threats and compromised accounts. Unsupervised algorithms profile
user behavior to identify deviations from normal patterns, enabling organizations to
detect and respond to insider threats more effectively. Graph-based approaches
analyze identity relationships and lateral movement pathways, providing
organizations with invaluable insights into potential security risks [19]. Additionally,
biometric authentication techniques such as fingerprint, face, and iris recognition
leverage computer vision technologies to enhance security and improve user
experience.

Securing AI Systems: As AI becomes increasingly integrated into cybersecurity


practices, securing AI systems themselves has become a critical priority. Adversarial
machine learning techniques are employed to develop robust models that are resilient
to evasion, poisoning, and inference attacks, ensuring the integrity and reliability of
AI-driven cybersecurity solutions. Additionally, techniques such as differential
privacy, federated learning, and trusted execution environments are used to secure AI
model training processes, protecting sensitive data and ensuring compliance with
privacy regulations. Explainability and interpretability methods are also employed to
combat the risks of bias and improve fairness and accountability in AI-driven
cybersecurity systems, ensuring that decisions made by these systems are transparent
and understandable [20].

Journal of Intelligent Connectivity and Emerging Technologies


VOLUME 9 ISSUE 1

[6]
Critical capabilities delivered by AI include:
AI has ushered in a new era of cybersecurity capabilities, providing organizations with
critical functionalities that are indispensable for implementing proactive threat
defense strategies. One of the key capabilities delivered by AI is adaptive threat
detection, enabled by unsupervised learning algorithms that automatically surface
anomalies in system logs and network traffic. By continuously analyzing data and
identifying deviations from normal behavior, these algorithms empower organizations
to swiftly detect and respond to emerging threats before they can cause significant
harm [21]. Additionally, AI-powered malware classification systems leverage deep
learning networks that are continuously retrained on new samples, enabling
organizations to stay ahead of evolving threats and effectively mitigate the risks posed
by malicious software.

Moreover, AI plays a crucial role in understanding the context of cyber attacks and
insider risks through advanced behavior analytics and graph mappings. By analyzing
the relationships between events and entities, AI-powered systems can provide
valuable insights into the motives and methods of attackers, enabling organizations to
better defend against targeted attacks and insider threats. Furthermore, AI-driven
solutions automate security operations workflows such as triage, investigation, and
response, enabling security teams to more efficiently manage and mitigate threats. By
leveraging AI to automate repetitive tasks and streamline processes, organizations can
improve their overall security posture and reduce the risk of successful cyber attacks.

Another critical capability delivered by AI is natural language processing (NLP),


which enables organizations to parse alarms, extract threat intelligence, and interact
with analysts more effectively. By automatically analyzing and categorizing security
alerts, NLP-powered systems can help security teams prioritize their response efforts
and focus on the most critical threats. Additionally, AI-driven chatbots can serve as
virtual assistants for security analysts, providing them with access to relevant
information and enabling them to execute actions more efficiently.

Benefits and Limitations of Cybersecurity AI


AI technology in cybersecurity offers a plethora of advantages, revolutionizing the
way organizations detect and respond to modern threats. One of its key benefits lies
in its unparalleled ability to process vast volumes of data from diverse sources,
utilizing unsupervised learning and pattern recognition to uncover stealthy threats that
may evade traditional detection methods [22]. This perpetual vigilance, coupled with
the automatic adaptation of models to detect novel attacks, enables organizations to
stay ahead of the ever-evolving threat landscape. Moreover, AI has the capability to
uncover complex relationships between events and entities, shedding light on multi-
stage attack campaigns that span across different systems or environments. Beyond
threat detection, AI automation streamlines security operations by automating
mundane tasks, allowing analysts to focus their expertise on higher-priority issues and
Journal of Intelligent Connectivity and Emerging Technologies
VOLUME 9 ISSUE 1

[7]
specialized judgment. Additionally, integrated workflows orchestrated by AI span IT,
security, and business functions, leading to improved operational efficiency and
overall security posture [23].

Table 3: Guidelines for implementing cybersecurity AI


Goal Practices
Robust - Prioritize model accuracy over efficiency - Favor ensemble
Models models over single algorithms - Continuously update training
data - Perform adversarial testing
Explainability - Implement model interpretation methods- Quantify
uncertainties - Maintain human oversight for high-impact
actions
Fairness - Check for biased data and harms - Monitor for unwanted
feedback loops - Follow ethical AI principles and processes
However, alongside its myriad benefits, AI in cybersecurity also presents inherent
limitations that warrant careful consideration. One such limitation stems from the
dependence on training data, which renders AI models vulnerable to biases, gaps, and
poisoning attacks. Furthermore, the lack of explainability in deep learning models
poses challenges to auditability, particularly in black box scenarios where the
decision-making process remains opaque. Adversarial evasion techniques can further
exploit vulnerabilities in AI systems, manipulating inputs to cause misclassifications
and evade detection. Moreover, over-reliance on automation increases the risks of
spoofing, software bugs, and supply chain compromises, underscoring the importance
of maintaining human oversight and intervention in critical security decisions.

Recommendations for Effective Implementation of Cybersecurity AI: To harness


the full potential of AI while mitigating its limitations, organizations should adhere to
several key recommendations for effective implementation. Firstly, the development
of robust training datasets that capture diverse scenarios is essential, leveraging cyber
ranges and machine-in-the-loop approaches where possible to ensure the AI models
are trained on representative data [24]. Employing ensemble models that combine
multiple algorithms enhances resilience against blind spots and adversarial attacks,
bolstering the overall robustness of the AI system. Strengthening explainability using
techniques like LIME (Local Interpretable Model-agnostic Explanations) facilitates
better auditability and understanding of AI decisions, ensuring transparency in
security operations. Quantifying uncertainties and calibrating confidence thresholds
minimizes false positives/negatives, enhancing the accuracy and reliability of AI-
driven security alerts and recommendations.

Furthermore, validating AI recommendations and maintaining human oversight for


high-impact actions is crucial, ensuring that critical security decisions are not solely
reliant on automated processes. Continuous monitoring of datasets and models for
drift ensures their continued relevance to the evolving threat landscape, enabling

Journal of Intelligent Connectivity and Emerging Technologies


VOLUME 9 ISSUE 1

[8]
organizations to adapt and respond effectively to new threats and challenges.
Following industry standards for trustworthy AI safety, security, privacy, and
algorithmic fairness is essential, adhering to best practices and guidelines to ensure
ethical and responsible use of AI in cybersecurity. Retaining in-house expert
knowledge to define problems, ask the right questions, and critically evaluate AI
solutions complements and enhances the capabilities of AI-driven security systems,
ensuring that human expertise remains at the forefront of cybersecurity operations.

Conclusion
In the ever-changing landscape of cybersecurity, the demand for cutting-edge
technologies such as artificial intelligence (AI) and machine learning has become
increasingly apparent. These advanced solutions play a pivotal role in bolstering threat
detection and response capabilities, offering a multitude of benefits to organizations
grappling with the evolving nature of cyber threats [25]. Among the myriad
advantages of AI solutions is their ability to automate the detection of novel attacks,
providing organizations with real-time insights into emerging threats that traditional
methods may overlook. Furthermore, AI-powered systems excel at uncovering
complex threat patterns and accelerating security workflows, enabling organizations
to respond swiftly and effectively to potential breaches [26]. By leveraging AI,
cybersecurity platforms can enrich investigations by uncovering insights and
correlations that might otherwise remain hidden, empowering organizations to better
understand and mitigate security risks. Recognizing the transformative potential of
AI, leading cybersecurity platforms are increasingly integrating these technologies as
core capabilities across endpoints, networks, cloud environments, and applications.
By harnessing the power of AI, organizations can enhance their overall security
posture and better defend against the myriad cyber threats that continue to proliferate
in today's digital landscape.

The integration of AI into cybersecurity platforms represents a paradigm shift in how


organizations approach threat detection and response. With its ability to automate and
augment traditional security measures, AI offers a level of sophistication and
effectiveness that is unmatched by conventional methods. By automating the detection
of novel attacks, AI solutions enable organizations to stay ahead of the rapidly
evolving threat landscape, minimizing the risk of data breaches and other security
incidents. Moreover, AI-powered systems excel at uncovering complex threat
patterns, providing security teams with valuable insights into the tactics and
techniques employed by malicious actors. This not only accelerates security
workflows but also enables organizations to respond more effectively to cyber threats
in real-time. By integrating AI as a core capability across endpoints, networks, cloud
environments, and applications, leading cybersecurity platforms are able to provide
comprehensive protection against a wide range of threats. In doing so, organizations
can enhance their overall security posture and better safeguard their digital assets
against the ever-present and ever-evolving threat of cyber-attacks [27], [28].
Journal of Intelligent Connectivity and Emerging Technologies
VOLUME 9 ISSUE 1

[9]
However, it is crucial to approach the adoption of AI in cybersecurity with caution
and diligence. While AI holds immense promise, there are inherent challenges that
must be addressed to ensure its effectiveness and reliability. One such challenge lies
in the need to train robust models that are resilient to biases, gaps, and poisoning
attacks. Additionally, the lack of explainability in some AI algorithms can hinder
auditability and trust, making it difficult to understand the reasoning behind AI-driven
decisions. Therefore, efforts to strengthen explainability through techniques like
LIME are essential to enhance transparency and accountability in security operations.

Furthermore, the validation of AI recommendations and the retention of human


oversight are paramount to ensuring that critical security decisions are not solely
reliant on automated processes. While AI can streamline security operations and
accelerate response times, human expertise remains indispensable in interpreting
results, making informed judgments, and responding effectively to emerging threats.
By striking the right balance between AI-driven automation and human intervention,
organizations can maximize the value of AI for security while mitigating the risks
associated with over-reliance on technology.

Looking ahead, the cybersecurity landscape is poised to face new challenges posed by
adversarial attacks on AI systems. As AI becomes increasingly integrated into security
infrastructures, malicious actors are likely to target these systems in an escalating arms
race for cybersecurity dominance [29]. However, AI itself holds the promise to detect
patterns, automate protection, and empower defenders against emerging threats. By
leveraging AI-driven technologies, organizations can stay one step ahead of
adversaries and proactively defend against evolving cyber threats [30].

References
[1] S. Alam, “Deep Learning Applications for Residential Energy Demand
Forecasting,” AI, IoT and the Fourth Industrial Revolution Review, vol. 14, no.
2, pp. 27–38, 2024.
[2] I. Doghudje and O. Akande, “Securing the Internet of Things: Cybersecurity
Challenges for Smart Materials and Big Data,” IJIC, vol. 6, no. 1, pp. 82–108,
Mar. 2022.
[3] A. Yaseen, “SUCCESSFUL DEPLOYMENT OF SECURE INTELLIGENT
CONNECTIVITY FOR LAN AND WLAN,” Journal of Intelligent
Connectivity and Emerging Technologies, vol. 7, no. 4, pp. 1–22, 2022.
[4] E. Crothers, N. Japkowicz, and H. Viktor, “Machine generated text: A
comprehensive survey of threat models and detection methods,” arXiv [cs.CL],
13-Oct-2022.
[5] G. E. M. Abro, S. A. B. M. Zulkifli, R. J. Masood, V. S. Asirvadam, and A.
Laouti, “Comprehensive review of UAV detection, security, and
communication advancements to prevent threats,” Drones, vol. 6, no. 10, p.
284, Oct. 2022.

Journal of Intelligent Connectivity and Emerging Technologies


VOLUME 9 ISSUE 1

[10]
[6] O. Abdullayeva and M. Engalichev, “Artificial intelligence systems,” Значение
цифровых технологий в изучении истории Узбекистана, vol. 1, no. 01, pp.
382–385, Oct. 2022.
[7] N. Ahmed et al., “Network threat detection using machine/deep learning in
SDN-based platforms: A comprehensive analysis of state-of-the-art solutions,
discussion, challenges, and future research direction,” Sensors (Basel), vol. 22,
no. 20, p. 7896, Oct. 2022.
[8] A. Yaseen, “ACCELERATING THE SOC: ACHIEVE GREATER
EFFICIENCY WITH AI-DRIVEN AUTOMATION,” IJRAI, vol. 12, no. 1, pp.
1–19, Jan. 2022.
[9] L. Patino, T. Cane, and J. Ferryman, “A comprehensive maritime benchmark
dataset for detection, tracking and threat recognition,” in 2021 17th IEEE
International Conference on Advanced Video and Signal Based Surveillance
(AVSS), Washington, DC, USA, 2021.
[10] M. Fendt et al., “Context and trade-offs characterize real-world threat detection
systems: A review and comprehensive framework to improve research practice
and resolve the translational crisis,” Neurosci. Biobehav. Rev., vol. 115, pp. 25–
33, Aug. 2020.
[11] K. Priyansh et al., “DuRBIN: A comprehensive approach to analysis and
detection of emerging threats due to network intrusion,” in 2022 IEEE Intl Conf
on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive
Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl
Conf on Cyber Science and Technology Congress
(DASC/PiCom/CBDCom/CyberSciTech), Falerna, Italy, 2022.
[12] A. Yaseen, “UNCOVERING EVIDENCE OF ATTACKER BEHAVIOR ON
THE NETWORK,” ResearchBerg Review of Science and Technology, vol. 3,
no. 1, pp. 131–154, Dec. 2020.
[13] S. Acharya, U. Rawat, and R. Bhatnagar, “A comprehensive review of Android
security: Threats, vulnerabilities, malware detection, and analysis,” Secur.
Commun. Netw., vol. 2022, pp. 1–34, Jun. 2022.
[14] S.-M. Senouci, H. Sedjelmaci, J. Liu, M. H. Rehmani, and E. Bou-Harb, “AI-
driven cybersecurity threats to future networks [from the guest editors],” IEEE
Veh. Technol. Mag., vol. 15, no. 3, pp. 5–6, Sep. 2020.
[15] A. Yaseen, “REDUCING INDUSTRIAL RISK WITH AI AND
AUTOMATION,” International Journal of Intelligent Automation and
Computing, vol. 4, no. 1, pp. 60–80, 2021.
[16] I. H. Sarker, M. H. Furhad, and R. Nowrozy, “AI-driven cybersecurity: An
overview, security intelligence modeling and research directions,” SN Comput.
Sci., vol. 2, no. 3, May 2021.
[17] M. Mylrea, M. Nielsen, J. John, and M. Abbaszadeh, “Digital twin industrial
immune system: AI-driven cybersecurity for critical infrastructures,” in Systems
Engineering and Artificial Intelligence, Cham: Springer International
Publishing, 2021, pp. 197–212.
[18] A. Yaseen, “THE UNFORESEEN DUET: WHEN SUPERCOMPUTING AND
AI IMPROVISE THE FUTURE,” Eigenpub Review of Science and
Technology, vol. 7, no. 1, pp. 306–335, 2023.
[19] I. H. Sarker, “AI-driven cybersecurity: An overview, security intelligence
modeling and research directions,” Preprints, 25-Jan-2021.
Journal of Intelligent Connectivity and Emerging Technologies
VOLUME 9 ISSUE 1

[11]
[20] A. Sultan, M. Hassan, K. Mansoor, and S. S. Ahmed, “Securing IoT enabled
RFID based object tracking systems: A symmetric cryptography based
authentication protocol for efficient smart object tracking,” in 2021
International Conference on Communication Technologies (ComTech),
Rawalpindi, Pakistan, 2021.
[21] S. Hooda, V. Lamba, and A. Kaur, “AI and soft computing techniques for
securing cloud and edge computing: A systematic review,” in 2021 5th
International Conference on Information Systems and Computer Networks
(ISCON), Mathura, India, 2021.
[22] M. Choi, Y. Levy, and H. Anat, “The Role of User Computer Self-Efficacy,
Cybersecurity Countermeasures Awareness, and Cybersecurity Skills Influence
on Computer Misuse,” 2013.
[23] A. Yaseen, “Enhancing Cybersecurity through Automated Infrastructure
Management: A Comprehensive Study on Optimizing Security Measures,”
Quarterly Journal of Emerging Technologies and Innovations, vol. 9, no. 1, pp.
38–60, 2024.
[24] M. Adams and M. Makramalla, “Cybersecurity Skills Training: An Attacker-
Centric Gamified Approach,” Technol. Innov. Manag. Rev., vol. 5, no. 1, pp. 5–
14, Jan. 2015.
[25] A. Yaseen, “AI-DRIVEN THREAT DETECTION AND RESPONSE: A
PARADIGM SHIFT IN CYBERSECURITY,” International Journal of
Information and Cybersecurity, vol. 7, no. 12, pp. 25–43, 2023.
[26] E. Biasin and E. Kamenjašević, “Cybersecurity of medical devices: new
challenges arising from the AI Act and NIS 2 Directive proposals,” Int.
Cybersecur. Law Rev., vol. 3, no. 1, pp. 163–180, May 2022.
[27] S. M. Istiaque, M. T. Tahmid, A. I. Khan, Z. A. Hassan, and S. Waheed,
“Artificial intelligence based cybersecurity: Two-step suitability test,” in 2021
IEEE International Conference on Service Operations and Logistics, and
Informatics (SOLI), Singapore, 2021.
[28] A. Yaseen, “The Role of Machine Learning in Network Anomaly Detection for
Cybersecurity,” Sage Science Review of Applied Machine Learning, vol. 6, no.
8, pp. 16–34, 2023.
[29] A. I. G. Ibrahim, “CYBERSECURITY: PANORAMA AND
IMPLEMENTATION IN 2021,” in WIT Transactions on The Built
Environment, Rome, Italy, 2021.
[30] S. Bokhari, S. Hamrioui, and M. Aider, “Cybersecurity strategy under
uncertainties for an IoE environment,” J. Netw. Comput. Appl., vol. 205, no.
103426, p. 103426, Sep. 2022.

Journal of Intelligent Connectivity and Emerging Technologies


VOLUME 9 ISSUE 1

[12]

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy