OVERVIEW OF CYBERSECURITY METHODS AND STRATEGIES USING ARTIFICIAL INTELLIGENCE

Authors

DOI:

https://doi.org/10.28925/2663-4023.2024.25.379389

Keywords:

Artificial Intelligence, cyber security, threats, information space

Abstract

In today’s world, information technology is rapidly evolving, leading to an increase in both the number and complexity of cyber threats, including phishing, malware, and social engineering attacks. The growth in the quantity and sophistication of cyber threats creates an urgent need to improve methods for protecting information systems. Artificial Intelligence (AI), particularly machine learning and deep learning technologies, shows significant potential in enhancing cybersecurity. This article is dedicated to reviewing contemporary AI-based cybersecurity methods and strategies, as well as evaluating their effectiveness in detecting and countering cyber threats. The paper analyzes recent research by both domestic and international scientists, emphasizing AI’s ability to analyze large volumes of data, uncover hidden patterns, predict potential threats, and automate incident response processes. It highlights key research directions, including anomaly detection, threat modeling, incident response automation, and ensuring the interpretability of decisions made by AI systems. Special attention is given to the integration of AI into existing cybersecurity systems and its capacity to adapt to new threats. The article also discusses the main challenges and prospects of applying AI in cybersecurity, including ethical and legal aspects such as privacy issues, decision transparency, and accountability for actions taken based on AI system decisions. Recent statistical data indicate a rapid growth in the market for AI-based cybersecurity tools, underscoring the importance and relevance of this topic in contemporary conditions. The analysis results confirm that using AI allows for automating monitoring, threat detection, and response processes, reducing incident response time and enhancing the overall protection level of information systems. At the same time, implementing AI in cybersecurity faces several challenges, such as ensuring the transparency of AI decisions and protecting against potential threats created using the same technologies. Research in this field promotes strategic development and innovation in cybersecurity, providing researchers and professionals with new tools and methods for ensuring information system security. Thus, given the rapid growth and evolution of cyber threats, studying the role of AI in cybersecurity is extremely relevant and important. It not only enhances protection efficiency but also fosters the development of new strategies and technologies to counter threats in the digital age.

Downloads

Download data is not yet available.

References

Magdenko, A. R., Buchatskyi, I. O., & Bondarenko, I. O. (2024). Artificial intelligence: a new weapon in the hands of cybercriminals and fraudsters. https://ir.lib.vntu.edu.ua//handle/123456789/42455.

Tovstukha, N. A. (2023). Using artificial intelligence to improve cybersecurity: pros and cons. Computer systems and network technologies: XIII International Scientific and Practical Conference, 153–154.

Ustymenko, V. O., & Olishevskyi, I. G. (2022). Prospects for the application of artificial intelligence technologies in the field of cybersecurity. Youth: science and innovations: mat. X Internat. scientific and technical conf. of students, graduate students and young scientists, 375–377.

Kaun, Y., & Sobchuk, O. (2024). Artificial intelligence as a tool for cyberattacks and cybersecurity. International scientific and practical conference “Problems of computer science, software modeling and security of digital systems”, 40–41.

Gurzhiy, S. V. (2024). The potential of artificial intelligence in the field of cybersecurity. Proceedings of the XLIIth International Scientific and Practical Conference “Modern Aspects of Modernization of Science: State, Problems, Development Trends”, 260–261.

Kotenko, D., & Khlaponin, Y. (2024). Artificial Intelligence in Cyber Attack Detection and Prevention Systems: Prospects and Challenges. Underwater technologies: industrial and civil engineering, 1(14), 48–55. https://doi.org/10.32347/uwt.2024.14.1203

Subach, I. Y., & Vlasenko, O. V. (2023). Architecture of an intelligent SIEM system for detecting cyber incidents in databases of information and communication systems for military purposes. Systems and technologies of communication, informatization and cybersecurity, 4, 82–92.

Savytska, L., Korobeynikova, T., Volos, O., & Tarnovskyi, M. (2023). Method and means of monitoring security in a computer network by means of SIEM. Information technology and computer engineering, 58(3), 22–32.

Korobeynikova, T., & Tsar, O. (2023). Analysis of modern open systems for intrusion detection and prevention. Grail of Science, 27, 317–325.

Bondarenko, A., & Statsenko, V. (2024). Using artificial intelligence methods and models to improve expert intrusion detection systems. Technical sciences, 333(2), 99–106.

Tseba, K. Y. (2024). An overview of modern tools and technologies for detecting cyber threats. Proceedings of the XVth International Scientific and Practical Conference “Free and Open Source Software”.

Babkin, A. A., & Kudin, O. V. (2020). An overview of neural network models of intrusion detection systems. Scientific Notes of the V.I. Vernadsky Taurida National University. Series: Technical Sciences, 31(70), 77–82.

Sarker, I. H., Furhad, M. H., Nowrozy, R. (2021). AI-driven cybersecurity: an overview, security intelligence modeling and research directions. SN Computer Science, 2(3).

Camacho, N. G. (2024). The Role of AI in Cybersecurity: Addressing Threats in the Digital Age. Journal of Artificial Intelligence General science (JAIGS), 3(1), 143–154.

Kuzlu, M., Fair, C., Guler, O. (2021). Role of artificial intelligence in the Internet of Things (IoT) cybersecurity. Discover Internet of things, 1(1), 7–17.

Gupta, M., Akiri, C., Aryal, K., Parker, E., Praharaj, L. (2023). From chatgpt to threatgpt: Impact of generative ai in cybersecurity and privacy. IEEE Access, 11, 80218–80245. https://doi.org/10.1109/ACCESS.2023.3300381

Yaseen, A. (2023). AI-driven threat detection and response: A paradigm shift in cybersecurity. International Journal of Information and Cybersecurity, 7(12), 25–43.

Mohamed, N. (2023). Current trends in AI and ML for cybersecurity: A state-of-the-art survey. Cogent Engineering, 10(2). https://doi.org/10.1080/23311916.2023.2272358

Capuano, N., Fenza, G., Loia, V., Stanzione, C. (2022). Explainable artificial intelligence in cybersecurity: A survey. IEEE Access, 10, 93575–93600.

Adewusi, A. O., Okoli, U. I., Olorunsogo, T., Adaga. E., Daraojimba, D. O., & Obi, O. C. (2024). Artificial intelligence in cybersecurity: Protecting national infrastructure: A USA. World Journal of Advanced Research and Reviews, 21(1), 2263–2275.

MarketsandMarkets. (n. d.). https://www.marketsandmarkets.com

IBM X-Force Threat Intelligence Index. (n. d.). https://www.ibm.com/reports/threat-intelligence

Gartner. (n. d.). https://www.gartner.com/en

Statista. (n. d.). https://www.statista.com

National Institute of Standards and Technology (NIST). (n. d.). https://www.nist.gov

Downloads


Abstract views: 180

Published

2024-09-25

How to Cite

Lunhol, O. (2024). OVERVIEW OF CYBERSECURITY METHODS AND STRATEGIES USING ARTIFICIAL INTELLIGENCE. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 1(25), 379–389. https://doi.org/10.28925/2663-4023.2024.25.379389