Perspectives On Solving Cybersecurity Using AI Techniques

  IJCTT-book-cover
 
         
 
© 2024 by IJCTT Journal
Volume-72 Issue-9
Year of Publication : 2024
Authors : Radhika Kanubaddhi, Ramakanth Damodaram, Prasad Gandham, Ramu Pedada
DOI :  10.14445/22312803/IJCTT-V72I9P120

How to Cite?

Radhika Kanubaddhi, Ramakanth Damodaram, Prasad Gandham, Ramu Pedada, "Perspectives On Solving Cybersecurity Using AI Techniques," International Journal of Computer Trends and Technology, vol. 72, no. 9, pp. 131-136, 2024. Crossref, https://doi.org/10.14445/22312803/IJCTT-V72I9P120

Abstract
The increasing sophistication and frequency of cyberattacks, including incidents like those experienced by CrowdStrike, have propelled the need for innovative defenses in cybersecurity. These breaches, often resulting in substantial data loss and financial damage, pose significant risks to organizations globally, highlighting the urgent demand for advanced technological solutions. Artificial Intelligence (AI) and Large Language Models (LLMs) can play a critical role in transforming cybersecurity protocols by automating threat detection, improving incident response times, and analyzing vast datasets for anomaly identification. As traditional security measures often fail to keep pace with evolving threats, these technologies provide a means to stay ahead of cybercriminals who increasingly leverage AI for malicious purposes. Despite their potential, the integration of AI and LLMs into cybersecurity frameworks raises several challenges, including the need for continuous adaptation to new threats and the ethical implications associated with data handling and privacy concerns. This study provides an in-depth review of the different use cases using AI techniques and a way to modify those techniques to fit the purposes of different organizations.

Keywords
AI, LLM, Cybersecurity, CrowdStrike, Risk, Trust.

Reference

[1] Aya H. Salem et al., “Advancing Cybersecurity: A Comprehensive Review of AI-Driven Detection Techniques,” Journal of Big Data, vol. 11, pp. 1-38, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Understanding Cybersecurity Breaches: Types, Common Causes and Potential Risks, Infosec, 2023. [Online]. Available: https://www.infosecinstitute.com/resources/general-security/understanding-cybersecurity-breaches-types-common-causes-and-potential-risks/
[3] Insights, Why Understanding AI’s Role in Data Breach Prevention is Key to Cyber Resilience, UST. [Online]. Available: https://www.ust.com/en/insights/why-understanding-ai-role-in-data-breach-prevention-is-key-to-cyber-resilience#:~:text=In%20cybersecurity%2C%20AI%2Dpowered%20tools,or%20blocking%20malicious%20IP%20addresses.
[4] What is a Data Breach?, IBM, 2024. [Online]. Available: https://www.ibm.com/topics/data-breach#:~:text=A%20data%20breach%20is%20any,intellectual%20property%2C%20financial%20information).
[5] Alessandro Mazzoccoli, and Maurizio Naldi, “An Overview of Security Breach Probability Models,” Risks, vol. 10, no. 11, pp. 1-29, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Karin Kelley, AI in Cybersecurity: A Comprehensive Guide, Caltech, 2024. [Online]. Available: https://pg-p.ctme.caltech.edu/blog/cybersecurity/ai-in-cybersecurity
[7] What is AI in Cybersecurity?, SOPHOS. [Online]. Available: https://www.sophos.com/en-us/cybersecurity-explained/ai-in-cybersecurity#:~:text=AI%20powered%20cybersecurity%20can%20monitor,common%20kinds%20of%20cyber%20attacks.
[8] How Can Generative AI Be Used in Cybersecurity? 10 Real-World Examples, Secureframe, 2024. [Online]. Available: https://secureframe.com/blog/generative-ai-cybersecurity
[9] AI in Cybersecurity: How It’s Used + 8 Latest Developments, Secureframe, 2024. [Online]. Available: https://secureframe.com/blog/ai-in-cybersecurity
[10] Enhancing Cybersecurity through AI: A Look Into the Future, ISC2, 2023. [Online]. Available: https://www.isc2.org/Insights/2023/09/Enhancing-Cybersecurity-through-AI-A-Look-into-the-Future
[11] Examples of Artificial Intelligence (AI) Use Cases In Cyber Security, zcybersecurity.com. [Online]. Available: https://zcybersecurity.com/using-artificial-intelligence-in-cyber-security/
[12] Artificial Intelligence (AI) Cybersecurity, IBM, 2024. [Online]. Available: https://www.ibm.com/ai-cybersecurity
[13] AI Security Threats: Challenges & Solutions for LLMs, Zero Point Labs, 2024. [Online]. Available: https://zeropointlabs.ai/ai-security-threats-challenges-solutions-for-llms/
[14] Arjun, LLM Risks: Insights & Real-World Case Studies, Akto.io. [Online]. Available: https://www.akto.io/blog/llm-risks-insights-real-world-case-studies
[15] Dinil Mon Divakaran, and Sai Teja Peddinti, “LLMs for Cyber Security: New Opportunities,” arXiv, pp. 1-10, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Aleena Noor, Large Language Models in Cybersecurity: Pioneering Trends in AI, Cirrus Labs. [Online]. Available: https://www.cirruslabs.io/additionalresources/large-language-models-in-cybersecurity-pioneering-trends-in-ai#:~:text=LLMs%20are%20typically%20trained%20on,relationships%20and%20context%20behind%20them.
[17] Hanxiang Xu et al., “Large Language Models for Cyber Security: A Systematic Literature Review,” arXiv, pp. 1-47, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Jie Zhang et al., “When LLMs Meet Cybersecurity: A Systematic Literature Review,” arXiv, pp. 1-36, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Tejdeep Desai, Top 4 AI Security Tools for 2023, ITSecurityWire, 2023. [Online]. Available: https://itsecuritywire.com/featured/top-4- ai-security-tools-for-2023/
[20] Akash Takyar, AI in Cybersecurity: Use Cases, Implementation, Solution and Development, Leeway Hertz. [Online]. Available: https://www.leewayhertz.com/ai-in-cybersecurity/
[21] AI in Cybersecurity, Sekoia.io. [Online]. Available: https://www.sekoia.io/en/glossary/ai-in-cybersecurity/#:~:text=AI%20can%20handle%20routine%20data,resilient%20response%20to%20evolving%20threats.
[22] AI-Powered Cyber Attacks: Understanding and Mitigating the Risks, BDO USA, 2023. [Online]. Available: https://www.bdo.com/insights/digital/ai-powered-cyber-attacks-understanding-and-mitigating-the-risks
[23] Chris Hughes, Keeping up with AI: OWASP LLM AI Cybersecurity and Governance Checklist, CSO, 2024. [Online]. Available: https://www.csoonline.com/article/1313475/keeping-up-with-ai-the-owasp-llm-ai-cybersecurity-and-governance-checklist.html
[24] What is AI Security?, IBM, 2024. [Online]. Available: https://www.ibm.com/think/topics/ai-security#:~:text=Short%20for%20artificial%20intelligence%20(AI,enhance%20an%20organization’s%20security%20posture.
[25] Data Science Dojo Staff, AI in Cybersecurity: Revolutionizing Threat Detection and Defense, Data Science Dojo, 2023. [Online]. Available: https://datasciencedojo.com/blog/ai-in-cybersecurity/
[26] Altay Ataman, AI Cybersecurity: Real-Life Examples & Limitations, AIMultiple, 2024. [Online]. Available: https://research.aimultiple.com/ai-cybersecurity/
[27] What are the Risks and Benefits of Artificial Intelligence (AI) in Cybersecurity?, Paloalto Networks. [Online]. Available: https://www.paloaltonetworks.com/cyberpedia/ai-risks-and-benefits-in-cybersecurity
[28] Tiedrich, Celine Caira, and Yaniv Benhamou, The AI Data Challenge: How do we Protect Privacy and Other Fundamental Rights in an AI-Driven World?, OECD.AI, 2023. [Online]. Available: https://oecd.ai/en/wonk/the-ai-data-challenge-how-do-we-protect-privacy-and-other-fundamental-rights-in-an-ai-driven-world
[29] AI Case Studies and Success Stories, Accubits. [Online]. Available: https://accubits.com/ai-case-studies-and-success-stories/
[30] Rachelle Blair-Frasier, Top Cybersecurity Trends of 2023, Security Magazine, 2023. [Online]. Available: https://www.securitymagazine.com/articles/100156-top-cybersecurity-trends-of-2023
[31] OWASP Top 10: LLM & Generative AI Security Risks, Owasp. [Online]. Available: https://genai.owasp.org/
[32] Cybersecurity in the AI Era: How the Threat Landscape Evolved in 2023, Kaspersky, 2023. [Online]. Available: https://www.kaspersky.com/about/press-releases/cybersecurity-in-the-ai-era-how-the-threat-landscape-evolved-in-2023
[33] What Is the Role of AI in Threat Detection?, Paloalto Networks. [Online]. Available: https://www.paloaltonetworks.in/cyberpedia/ai-in-threat-detection#:~:text=In%20network%20security%2C%20AI%20threat,and%20provide%20real%2Dtime%20alerts.
[34] Dewayne Hart, How AI-Driven Cyberattacks Will Reshape Cyber Protection, Forbes, 2024. [Online]. Available: https://www.forbes.com/councils/forbestechcouncil/2024/03/19/how-ai-driven-cyber-attacks-will-reshape-cyber-protection/#:~:text=Invoking%20AI%20into%20the%20risk,on%20patterns%20and%20computational%20errors