AI-Enhanced Cyber Threat Detection

  IJCTT-book-cover
 
         
 
© 2024 by IJCTT Journal
Volume-72 Issue-6
Year of Publication : 2024
Authors : Sai Kiran Arcot Ramesh
DOI :  10.14445/22312803/IJCTT-V72I6P109

How to Cite?

Sai Kiran Arcot Ramesh, "AI-Enhanced Cyber Threat Detection," International Journal of Computer Trends and Technology, vol. 72, no. 6, pp. 64-71, 2024. Crossref, https://doi.org/10.14445/22312803/IJCTT-V72I6P109

Abstract
Cybersecurity paradigms have taken a transformative shift with the advent of AI-Enhanced Cyber Threat Detection, which helps to enhance organizational security through advanced algorithms. This research paper delves into the proactive stance of Artificial Intelligence (AI) driven detection systems that sift through huge volumes of data on their own to recognize patterns indicative of cyber intrusions and attacks. By well-organized threat detection and incident response processes, these systems reduce the workloads for human analysts thus enabling them to concentrate on strategic decision-making and mitigation strategies. In addition, real-time monitoring of network operations is made easier using AI-based detection, which reduces dwell time and improves operational efficiency. Another way in which this can be achieved is by integrating other cybersecurity technologies, such as threat intelligence platforms with AI or Security Orchestration, Automation, and Response (SOAR) systems. Nevertheless, challenges like adversarial attacks, as well as ethical considerations show that further research must be conducted in this field and collaboration enhanced so as to strengthen AI-enabled cyber threat detection. This article, therefore, highlights the significance of proactive cybersecurity measures together with collaborative defense approaches in protecting digital assets against contemporary e-crimes.

Keywords
Artificial Intelligence, Cyber Threat Detection, Cybersecurity, Machine Learning, Threat Intelligence, Incident Response, Security Orchestration, Automation and Response (SOAR), Adversarial Attacks, Ethical Considerations, Collaborative Defense Strategies.

Reference

[1] Lampis Alevizos, and Martijn Dekker, “Towards an AI-Enhanced Cyber Threat Intelligence Processing Pipeline,” Electronics, vol. 13, no. 11, pp. 1-19, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Edward Amoroso, Cyber Attacks: Protecting National Infrastructure, Student Edition, Elsevier, 2012.
[Google Scholar] [Publisher Link]
[3] Haroon Arif et al., “Future Horizons: AI-Enhanced Threat Detection in Cloud Environments: Unveiling Opportunities for Research,” International Journal of Multidisciplinary Sciences and Arts, vol. 2, no. 2, pp. 1-10, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Capcoverage, 10 Ways to Prevent Cyber Attacks, 2019. [Online]. Available: https://capcoverage.com/index.php/10-ways-to-prevent-cyber-attacks/ not found
[5] Andrew Coburn, Eireann Leverett, and Gordon Woo, Solving Cyber Risk: Protecting Your Company and Society, John Wiley & Sons, 2018.
[Google Scholar] [Publisher Link]
[6] Milica D. Djekic, Some Counter Measures of Cyber Attack, 2019. [Online]. Available: https://www.cyberdefensemagazine.com/some-countermeasures-to-cyber-attacks/
[7] Dharmesh Dhabliya et al., “Temporal Intelligence in AI-Enhanced Cyber Forensics using Time-Based Analysis for Proactive Threat Detection,” Journal of Electrical Systems, vol. 19, no. 3, pp. 1-21, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Dalmo Stutz et al., “Enhancing Security in Cloud Computing Using Artificial Intelligence (AI),” Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Will Gragido, and John Pirc, Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats, Elsevier, 2011.
[Google Scholar] [Publisher Link]
[10] Help Net Security, The Emotional Impact of Cybercrime, 2019. [Online]. Available: https://www.helpnetsecurity.com/2010/09/08/the-emotional-impact-of-cybercrime/
[11] Info Security, Cybercrime Victims Left Depressed and Traumatized, 2019. [Online]. Available: https://www.infosecurity-magazine.com/news/isc2congress-cybercrime-victims/
[12] Itproportal, 10 Essential Steps for Preventing Cyber Attacks on Your Company, 2019. [Online]. Available: https://www.itpro.com/security/cyber-security/355132/how-to-protect-your-business-from-cyberattacks
[13] Harry Katzan, “Contemporary Issues in Cybersecurity,” Journal of Cybersecurity Research, vol. 1, no. 1, pp. 1-6, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Justin L.  Kreinbrink, “Analysis of Artificial Intelligence (AI) Enhanced Technologies in Support of Cyber Defense: Advantages, Challenges, and Considerations for Future Deployment,” Utica College ProQuest Dissertations Publishing, 2019.
[Google Scholar] [Publisher Link]
[15] Jerri Ledford, Could a Cyber Attack Knock Out Your Computer?, 2019. [Online]. Available: https://www.lifewire.com/cyber-attacks-4147067
[16] Michal Markevych, and Maurice Dawson, “A Review of Enhancing Intrusion Detection Systems for Cybersecurity Using Artificial Intelligence (AI),” International Conference Knowledge-Based Organization, vol. 29, no. 3, pp. 30-37, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[17] NIBusinessInfo, Cyber Security for Business, 2019. [Online]. Available: https://www.nibusinessinfo.co.uk/content/impact-cyber-attack-your-business
[18] Norton, 11 Ways to Protect Yourself against Cybercrime, 2019. [Online]. Available: https://us.norton.com/internetsecurity-how-to-how-to-recognize-and-protect-yourself-from-cybercrime
[19] Vinod Varma Vegesna, “Comprehensive Analysis of AI-Enhanced Defense Systems in Cyberspace,” International Numeric Journal of Machine Learning and Robots, vol. 7, no. 7, pp. 1-8, 2023.
[Google Scholar] [Publisher Link]
[20] Monica T. Whitty, and Tom Buchanan, “The Online Romance Scam: A Serious Cybercrime,” CyberPsychology, Behavior, and Social Networking, vol. 15, no. 3, pp. 181-183, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Song Xia et al., “AI Enhanced Automatic Response System for Resisting Network Threats,” Smart Computing and Communication, pp. 221-230, 2019.
[CrossRef] [Google Scholar] [Publisher Link]