This is an unedited manuscript accepted for publication and provided as an Article in Press for early access at the author’s request. The article will undergo copyediting, typesetting, and galley proof review before final publication. Please be aware that errors may be identified during production that could affect the content. All legal disclaimers of the journal apply.
Vamsy Priya Anne,
Sampath Talluri,
- Engineer, Department of Computer Information Systems, Grand Valley State University, 1 Campus Dr, Allendale, MI, United States
- AM Lead Engineer, Department of Computer Science, Western Michigan University, 1903 W Michigan Ave, Kalamazoo, MI, United States
Abstract
When it comes to protecting against cyber threats, the use of AI is changing everything. Thanks to AI-powered technologies, organizations can now better foresee and handle potential intrusions. These solutions provide exceptional capabilities in identifying threats, monitoring in real time, and delivering predictive insights. But, with these innovations come significant hazards and difficulties, necessitating thoughtful deliberation and preventative measures. Artificial intelligence’s impact on cybersecurity is explored in this article, looking at both the ways AI is improving defense systems and the dangers of cyberattacks powered by AI. Advanced AI threat detection techniques, including behavioral analysis, anomaly detection, and predictive analytics, are discussed. In addition, the article discusses the limitations and difficulties of using machine learning for malware detection. Threats like adversarial assaults, data difficulties, biases, and prejudice are discussed in the article, along with the hazards of AI-powered cyberattacks. To effectively manage these dangers, it stresses the significance of cybersecurity experts, AI researchers, and lawmakers working together in an interdisciplinary manner to create accountable deployment techniques and transparent governance structures. Ethically and responsibly leveraging AI technology to defend digital assets and privacy in an ever-evolving threat landscape requires stakeholders to collaborate and be transparent. This will aid their understanding of the complexities of AI in cybersecurity.
Keywords: Cybersecurity, Artificial Intelligence, Interface, limitations and Cyberattacks
Vamsy Priya Anne, Sampath Talluri. A Review on the Impact of Artificial Intelligence on Cybersecurity. Journal of Artificial Intelligence Research & Advances. 2024; ():-.
Vamsy Priya Anne, Sampath Talluri. A Review on the Impact of Artificial Intelligence on Cybersecurity. Journal of Artificial Intelligence Research & Advances. 2024; ():-. Available from: https://journals.stmjournals.com/joaira/article=2024/view=191593
References
[1] Nganga A, Scanlan J, Lützhöft M, Mallam S. Enabling cyber resilient shipping through maritime security operation center adoption: A human factors perspective. Applied Ergonomics. 2024 Sep 1;119:104312.
[2] Shukla D, Chakrabarti S, Sharma A. Blockchain-based cyber-security enhancement of cyber–physical power system through symmetric encryption mechanism. International Journal of Electrical Power & Energy Systems. 2024 Jan 1;155:109631.
[3] Durst S, Hinteregger C, Zieba M. The effect of environmental turbulence on cyber security risk management and organizational resilience. Computers & Security. 2024 Feb 1;137:103591.
[4] Patterson CM, Nurse JR, Franqueira VN. “I don’t think we’re there yet”: The practices and challenges of organisational learning from cyber security incidents. Computers & Security. 2024 Apr 1;139:103699.
[5] Sabaliauskaite G, Bryans J, Jadidbonab H, Ahmad F, Shaikh S, Wooderson P. TOMSAC-Methodology for trade-off management between automotive safety and cyber security. Computers & Security. 2024 May 1;140:103798.
[6] Cartwright A, Cartwright E, Edun ES. Cascading information on best practice: Cyber security risk management in UK micro and small businesses and the role of IT companies. Computers & Security. 2023 Aug 1;131:103288.
[7] Tonhauser M, Ristvej J. Cybersecurity Automation in Countering Cyberattacks. Transportation Research Procedia. 2023 Jan 1;74:1360-5.
[8] Bozorgchenani A, Zarakovitis CC, Chien SF, Ting TO, Ni Q, Mallouli W. Novel modeling and optimization for joint Cybersecurity-vs-QoS Intrusion Detection Mechanisms in 5G networks. Computer Networks. 2023 Dec 1;237:110051.
[9] Rizvi M. Enhancing cybersecurity: The power of artificial intelligence in threat detection and prevention. International Journal of Advanced Engineering Research and Science. 2023 May 26;10(05).
[10] Srinivasan R, Kavitha M, Kavitha R, Uma S. Cybersecurity and Artificial Intelligence: A Systematic Literature Review. Recent Trends in Computational Intelligence and Its Application. 2023 Jun 15:339-45.
[11] Jada I, Mayayise TO. The impact of artificial intelligence on organisational cyber security: An outcome of a systematic literature review. Data and Information Management. 2023 Dec 25:100063.
[12] Alotaibi SD, Alabduallah B, Said Y, Hassine SB, Alzubaidi AA, Alamri M, Al Zanin S, Majdoubi J. Bioinspired artificial intelligence based android malware detection and classification for cybersecurity applications. Alexandria Engineering Journal. 2024 Aug 1;100:142-52.
[13] Pawlicki M, Pawlicka A, Kozik R, Choraś M. Advanced insights through systematic analysis: Mapping future research directions and opportunities for xAI in deep learning and artificial intelligence used in cybersecurity. Neurocomputing. 2024 Apr 25:127759.
[14] Saleh AM. Blockchain for secure and decentralized artificial intelligence in cybersecurity: A comprehensive review. Blockchain: Research and Applications. 2024 Feb 29:100193.
[15] Ramos-Cruz B, Andreu-Perez J, Martínez L. The cybersecurity mesh: A comprehensive survey of involved artificial intelligence methods, cryptographic protocols and challenges for future research. Neurocomputing. 2024 Feb 21:127427.
[16] Kelly B, Quinn C, Lawlor A, Killeen R, Burrell J. Cybersecurity in Healthcare. Trends of Artificial Intelligence and Big Data for E-Health. 2023 Jan 2:213-31.
[17] Mishra S. Exploring the impact of AI-based cyber security financial sector management. Applied Sciences. 2023 May 10;13(10):5875.
[18] Ait Temghart A, Marwan M, Baslam M. Stackelberg Security Game for Optimizing Cybersecurity Decisions in Cloud Computing. Security and Communication Networks. 2023;2023(1):2811038.
[19] Rjoub G, Bentahar J, Wahab OA, Mizouni R, Song A, Cohen R, Otrok H, Mourad A. A survey on explainable artificial intelligence for cybersecurity. IEEE Transactions on Network and Service Management. 2023 Jun 5;20(4):5115-40.
[20] Kaur R, Gabrijelčič D, Klobučar T. Artificial intelligence for cybersecurity: Literature review and future research directions. Information Fusion. 2023 Sep 1;97:101804.
[21] Michalec O, Shreeve B, Rashid A. Who will keep the lights on? Expertise and inclusion in cyber security visions of future energy systems. Energy Research & Social Science. 2023 Dec 1;106:103327.
[22] Sharma D, Mittal R, Sekhar R, Shah P, Renz M. A bibliometric analysis of cyber security and cyber forensics research. Results in Control and Optimization. 2023 Mar 1;10:100204.
[23] Rawindaran N, Jayal A, Prakash E, Hewage C. Perspective of small and medium enterprise (SME’s) and their relationship with government in overcoming cybersecurity challenges and barriers in Wales. International Journal of Information Management Data Insights. 2023 Nov 1;3(2):100191.
[24] A. Botta, S. Rotbei, S. Zinno, and G. Ventre, “Cyber security of robots: A comprehensive survey,” Intell. Syst. with Appl., vol. 18, no. August 2022, p. 200237, 2023, doi: 10.1016/j.iswa.2023.200237.
[25] Javaid M, Haleem A, Singh RP, Suman R. Towards insighting cybersecurity for healthcare domains: A comprehensive review of recent practices and trends. Cyber Security and Applications. 2023 Dec 1;1:100016.
[26] J. Agrawal, S. S. Kalra, and H. Gidwani, “AI in cyber security,” Int. J. Commun. Inf. Technol., vol. 4, no. 1, pp. 46–53, 2023, doi: 10.33545/2707661x.2023.v4.i1a.59.
[27] Bıçakcı AS, Evren AG. Thinking multiculturality in the age of hybrid threats: Converging cyber and physical security in Akkuyu nuclear power plant. Nuclear Engineering and Technology. 2022 Jul 1;54(7):2467-74.
[28] Bahassi H, Edddermoug N, Mansour A, Mohamed A. Toward an exhaustive review on Machine Learning for Cybersecurity. Procedia Computer Science. 2022 Jan 1;203:583-7.
[29] Srivastava S, Paul B, Gupta D. Study of word embeddings for enhanced cyber security named entity recognition. Procedia Computer Science. 2023 Jan 1;218:449-60.
[30] Branley-Bell D, Coventry L, Dixon M, Joinson A, Briggs P. Exploring age and gender differences in ICT cybersecurity behaviour. Human Behavior and Emerging Technologies. 2022;2022(1):2693080.
[31] Xue X, Tan W. Matching cybersecurity ontologies on internet of everything through coevolutionary multiobjective evolutionary algorithm. Security and Communication Networks. 2022;2022(1):3572404.
[32] Akram B, Jan N, Nasir A, Alabrah A, Alhilal MS, Al-Aidroos N. Cyber‐Security and Social Media Risks Assessment by Using the Novel Concepts of Complex Cubic T‐Spherical Fuzzy Information. Scientific Programming. 2022;2022(1):4841196.
[33] Mahmood S, Chadhar M, Firmin S. Cybersecurity challenges in blockchain technology: A scoping review. Human Behavior and Emerging Technologies. 2022;2022(1):7384000.
[34] Charmet F, Tanuwidjaja HC, Ayoubi S, Gimenez PF, Han Y, Jmila H, Blanc G, Takahashi T, Zhang Z. Explainable artificial intelligence for cybersecurity: a literature survey. Annals of Telecommunications. 2022 Dec;77(11):789-812.
[35] Jun Y, Craig A, Shafik W, Sharif L. Artificial intelligence application in cybersecurity and cyberdefense. Wireless communications and mobile computing. 2021;2021(1):3329581.
[36] Ramadan RA, Aboshosha BW, Alshudukhi JS, Alzahrani AJ, El-Sayed A, Dessouky MM. Cybersecurity and Countermeasures at the Time of Pandemic. Journal of Advanced Transportation. 2021;2021(1):6627264.
[37] Xie B, Shen G, Guo C, Cui Y. The named entity recognition of Chinese cybersecurity using an active learning strategy. Wireless Communications and Mobile Computing. 2021;2021(1):6629591.
[38] Kotuszewski P, Kukielka K, Kluk P, Ordys A, Bieńkowski K, Kościelny JM, Syfert M, Wnuk P, Możaryn J, Fajdek B. Cyber‐Security Assessment of Industry 4.0 Enabled Mechatronic System. Complexity. 2021;2021(1):6670625.
[39] Das R, Sandhane R. Artificial intelligence in cyber security. InJournal of Physics: Conference Series 2021 Jul 1 (Vol. 1964, No. 4, p. 042072). IOP Publishing.
[40] Sarker IH, Furhad MH, Nowrozy R. Ai-driven cybersecurity: an overview, security intelligence modeling and research directions. SN Computer Science. 2021 May;2(3):173.
Journal of Artificial Intelligence Research & Advances
Volume | |
Received | 24/10/2024 |
Accepted | 10/11/2024 |
Published | 30/12/2024 |