AI-POWERED CYBERSECURITY: MACHINE LEARNING APPROACHES AND THEIR EFFECTIVENESS

Abstract View PDF Download PDF

##plugins.themes.academic_pro.article.main##

Sai Teja Boppiniti

Abstract

The increasing complexity and frequency of cyber threats have necessitated the development of advanced cybersecurity solutions. This review examines the role of artificial intelligence (AI) and machine learning (ML) in enhancing cybersecurity measures. By analyzing various ML approaches, including supervised learning, unsupervised learning, and reinforcement learning, the paper highlights their effectiveness in detecting, preventing, and responding to cyberattacks. The review also discusses key techniques such as anomaly detection, intrusion detection systems, and predictive analytics, evaluating their performance in real-world scenarios. Additionally, the challenges and limitations of implementing AI in cybersecurity are addressed, emphasizing the importance of integrating human expertise with automated systems for optimal results. The findings suggest that AI-powered cybersecurity solutions offer significant advantages in improving threat detection and response times, ultimately contributing to more robust defense mechanisms against evolving cyber threats.

##plugins.themes.academic_pro.article.details##

How to Cite
[1]
Sai Teja Boppiniti, “AI-POWERED CYBERSECURITY: MACHINE LEARNING APPROACHES AND THEIR EFFECTIVENESS”, IEJRD - International Multidisciplinary Journal, vol. 7, no. 2, p. 7, Mar. 2022.

References

  1. Alharbi, A., Alzahrani, A., & Bawazir, S. (2019). Threat detection using decision trees. Journal of Information Security and Applications, 48, 102-110. https://doi.org/10.1016/j.jisa.2019.06.001
  2. Ahmed, M., Mahmood, A. N., & Hu, J. (2016). Intrusion detection using machine learning algorithms: A systematic review. Journal of Network and Computer Applications, 60, 1-24. https://do i.org /10.1 016 /j.jnca.2015.11.016
  3. Bader, N., El-Shafie, A., & Alharbi, F. (2020). Predictive analytics in cybersecurity using recurrent neural networks. International Journal of Information Security, 19(1), 1-14. https://doi.org/10.1007/s10207-019-00455-5
  4. Zareapoor, M., Abdar, M., & Ahmadi, M. (2020). Ensemble methods for intrusion detection: A review. Artificial Intelligence Review, 53(7), 1-32. https://doi.org/10.1007/s10462-019-09773-x
  5. Zhou, Y., Wu, L., & Chen, J. (2020). Anomaly detection in cybersecurity using deep autoencoders. Future Generation Computer Systems, 108, 1-11. https://doi.org/10.1016/j.future.2019.12.011
  6. Mohanty, S. P., & Jena, R. (2020). Cybersecurity in the age of artificial intelligence: A comprehensive review. Computers & Security, 101, 1-22. https://doi.org/10.1016/j.cose.2020.102051
  7. Cheng, W., & Liu, D. (2019). Machine learning for network intrusion detection: A review. Journal of Information Security and Applications, 48, 102-112. https://doi.org/10.1016/j.jisa.2019.05.005
  8. Khamis, M., & Al-Debei, M. M. (2019). AI in cybersecurity: A systematic literature review. International Journal of Computer Applications, 181(26), 1-10. https://doi.org/10.5120/ijca2019918874
  9. Malekpour, M. R., & Jamshidi, P. (2021). A survey of machine learning techniques for cybersecurity. Computers & Security, 105, 1-21. https://doi.org/10.1016/j.cose.2020.102236
  10. Shafique, U., & Choudhury, P. (2020). Application of machine learning algorithms in intrusion detection systems: A review. Security and Privacy, 3(1), 1-23. https://doi.org/10.1002/spy2.116

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.