Artificial Intelligence in Cybersecurity Threat Detection
DOI:
https://doi.org/10.62051/ijcsit.v4n1.24Keywords:
Artificial Intelligence, Cyber Security, Threat Detection, Machine Learning, Deep Learning, Integrated LearningAbstract
With the increasing frequency and complexity of cyberattacks, traditional cybersecurity threat detection methods have been difficult to cope with new types of threats. Artificial Intelligence (AI) technology, with its powerful data processing and pattern recognition capabilities, has gradually become an important tool for enhancing cyber security. This paper aims to explore the application of AI in cybersecurity threat detection, firstly outlining the current status of the development of AI technology in cybersecurity, and then focusing on analyzing the application of core methods such as machine learning and deep learning in threat detection, and discussing the advantages of integrated learning and multimodal methods. Finally, this paper summarizes the current challenges faced by AI technology in the field of cyber security and looks forward to the future development direction. Through the research in this paper, it is expected to provide reference for improving the accuracy and efficiency of cybersecurity threat detection.
Downloads
References
[1] Khan N F, Ikram N, Murtaza H, et al. Social media users and cybersecurity awareness: predicting self-disclosure using a hybrid artificial intelligence approach [J]. Kybernetes, 2023, 52(1):401-421. DOI:10.1108/K-05-2021-0377.
[2] Cheng K S, Pan R, Pan H, et al. ALICE: a hybrid AI paradigm with enhanced connectivity and cybersecurity for a serendipitous encounter with circulating hybrid cells [J]. Theranostics, 2020, 10(24):11026. DOI:10.7150/thno.44053.
[3] Iwendi C, Rehman S U, Javed A R, et al. Sustainable Security for the Internet of Things Using Artificial Intelligence Architectures [J]. ACM Transactions on Internet Technology, 2021, 21(3):1-22. DOI:10.1145/3448614.
[4] Zhao L, Zhu D, Shafik W, et al. Artificial intelligence analysis in cyber domain: A review: [J]. International Journal of Distributed Sensor Networks, 2022, 18(4):121-131. DOI:10.1177/15501329221084882.
[5] Perdisci R, Giacinto G, Roli F. Alarm clustering for intrusion detection systems in computer networks [J]. Engineering Applications of Artificial Intelligence, 2006, 19(4):429-438. DOI:10.1016/j.engappai.2006.01.003.
[6] DeBenedictis, Erik P. Plotting a Socially Responsible Course for Computers Using Cybersecurity as an Example [J]. Computer, 2017, 50(12):86-90. DOI:10.1109/MC.2017.4451217.
[7] Sedjelmaci H, Guenab F, Senouci S M, et al.Cyber Security Based on Artificial Intelligence for Cyber-Physical Systems [J]. IEEE Network, 2020, 34(3):6-7. DOI:10.1109/MNET.2020.9105926.
[8] Silvestri S, Islam S, Amelin S C M. Cyber threat assessment and management for securing healthcare ecosystems using natural language processing [J]. International Journal of Information Security, 2024, 23(1):31-50.
[9] Alohali M A, Al-Wesabi F N, Hilal A M, et al.Artificial intelligence enabled intrusion detection systems for cognitive cyber-physical systems in industry 40 environment [J]. Cognitive neurodynamics, 2022, 16(5):1045-1057. DOI:10.1007/s11571-022-09780-8.
[10] Xu S, Qian Y, Hu R Q. Data-Driven Network Intelligence for Anomaly Detection [J]. IEEE Network, 2019, 33(3):88-95. DOI:10.1109/MNET.2019.1800358.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.







