A Review on the Effectiveness of Artificial Intelligence and Machine Learning on Cybersecurity

Authors

DOI:

https://doi.org/10.60087/jklst.v4.n1.011

Abstract

The rapid growth of cyber threats and the increasing complexity of attack techniques demand advanced solutions for protecting systems, networks, and sensitive data. Artificial Intelligence (AI) and Machine Learning (ML) have proven highly effective in a wide range of cybersecurity applications, from detecting malicious activities to automating defense mechanisms. These technologies are transforming the way security systems are designed and operated. This has become essential in addressing the evolving landscape of digital threats. With the exponential rise in cyberattacks and the sophistication of adversaries, traditional methods of cybersecurity are proving inadequate. AI and ML offer innovative solutions by enhancing threat detection, improving response times, and automating tasks that previously required significant human intervention. These technologies are widely employed in applications such as anomaly detection, intrusion detection systems (IDS), malware analysis, and fraud detection. The primary benefits of AI and ML in cybersecurity include real-time threat analysis, predictive capabilities, and the ability to process large volumes of data. However, they also present challenges, such as high implementation costs, the need for skilled professionals, and the potential for adversarial attacks that can exploit machine learning models. This review aims to provide a comprehensive understanding of the integration of AI and ML into cybersecurity, highlighting their current applications, benefits, limitations, and future prospects. Key findings indicate that while these technologies significantly enhance cybersecurity capabilities, their success depends on overcoming challenges related to data quality, model robustness, and the dynamic nature of cyber threats.

Downloads

Download data is not yet available.

References

References

Ahamed, F., Farid, F., Suleiman, B., Jan, Z., Wahsheh, L.A., & Shahrestani, S. (2022). An intelligent Multimodal Biometric Authentication model for Personalised healthcare services. Future Internet, 14(8). https://doi.org/10.3390/fi14080222

Cam, H. (2019). Model-guided infection prediction and active defense using context-specific cybersecurity observations, in: MILCOM 2019-2019 IEEE Military Communications Conference (MILCOM). pp. 1-6.

Chen, Y., Elenee A.J.D., & Weber, G. (2016). IBM Watson: How Cognitive Computing Can Be Applied to Big Data Challenges in Life Sciences Research. Clin Ther., 38(4), 688-701. https://doi.org/10.1016/j.clinthera.2015.12.001

Fritsch, L., Jaber, A., & Yazidi, A. (2022). An overview of artificial intelligence used in malware. In Communications in computer and information science, 1650 CCIS. https://doi.org/10.1007/978-3-031-17030-0_4

Gawand, M.K. (2013). A comparative study of cyber-attack detection & prediction using machine learning algorithms. https://doi.org/10.21203/rs.3.rs- 32385 52/v1

General Data Protection Regulation (GDPR), (2016). "General Data Protection Regulation," European Union, Brussels, Belgium, Regulation 2016/679.

Ghandour, A. (2021). Opportunities and challenges of artificial intelligence in banking: Systematic literature review. TEM Journal, 10(4), 1581-1587. https://doi.org/10.18421/TEM104-12

Haider, A., Khan, M.A., Rehman, A., Ur-Rahman, M., & Kim, H.S. (2020). A real-time sequential deep extreme learning machine cybersecurity intrusion detection system. Computers, Materials & Continua, 66(2), 1785-1798. https://doi.org/10.32604/cmc.2020.013910

Hansen, E.B., & Bøgh, S. (2021). Artificial intelligence and internet of things in small and medium-sized enterprises: A survey. Journal of Manufacturing Systems, 58, 362-372.

Hasan, M., Islam, M.M., Zarif, M.I.I., & Hashem, M.M.A. (2019). Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet Things, 7, 100059. https://doi.org/10.1016/j.iot. 2019.100059

Indrasiri, P.L., Halgamuge, M.N., & Mohammad, A. (2021). Robust ensemble machine learning model for filtering phishing URLs: expandable random gradient stacked voting classifier (ERG-SVC), IEEE Access, 9, 150142–150161.

Jada, I., & Mayayise, T.O. (2024). The impact of artificial intelligence on organisational cyber security: An outcome of a systematic literature review. Data and Information Management, 8, 100063. https://doi.org/10.1016/j.dim.2023.100063

Jadav, D., Jadav, N. K., Gupta, R., Tanwar, S., Alfarraj, O., Tolba, A., et al. (2023). A trustworthy healthcare management framework using amalgamation of AI and blockchain network. Mathematics, 11(3). https://doi.org/10.3390/math11030637

Kant, D., & Johannsen, A. (2022). Evaluation of AI-based use cases for enhancing the cyber security defense of small and medium-sized companies (SMEs). IS and T International Symposium on Electronic Imaging Science and Technology, 34(3). https://doi.org/10.2352/EI.2022.34.3.MOBMU-387

Kaur, R., Gabrijelcic, D., & Klobucar, T. (2023). Artificial intelligence for cybersecurity: Literature review and future directions. Information Fusion, 97, 101804. https://doi.org/10.1016/j.inffus.2023.101804

Li, H., Wu, J., Xu, H., Li, G., & Guizani, M. (2022). Explainable intelligence-driven defense mechanism against advanced persistent threats: a joint edge game and AI approach. IEEE Trans. Dependable Secure Comput. 19(2), 757-775.

Ma, K.W.F., Dhot, T., & Raza, M. (2023). Considerations for using artificial intelligence to manage authorized push payment (APP) scams. In IEEE engineering management review. https://doi.org/10.1109/EMR.2023.3288432

Mohamed, N. (2023). Current trends in AI and ML for cybersecurity: a state-of-the-art survey. Cogent Eng., https://doi.org/10.1080/23311916.2023.2272358

Mohammed, I.A. (2020). Artificial intelligence for cybersecurity: a systematic mapping of literature”, International Journal of Innovations in Engineering Research and Technology, 7(9), 2394-3696.

Musa, N.S., Mirza, N.M., Rafique, S.H., Abdallah, A.M., & Murugan, T. (2024). Machine learning and deep learning techniques for distributed denial of service anomaly detection in software defined networks-current research solutions. IEEE Access, 12. https://doi.org/10.1109/ACCESS.2024.3360868

Musbahi, O., Syed, L., Le Feuvre, P., Cobb, J., & Jones, G. (2021). Public patient views of artificial intelligence in healthcare: A nominal group technique study. Digital Health, 7. https://doi.org/10.1177/20552076211063682

Okdem, S., & Okdem, S. (2024). Artificial Intelligence in Cybersecurity: A Review and a Case Study. Appl. Sci., 14, 10487. https://doi.org/10.3390/app142210487

Raimundo, R., & Rosario, A. (2021). The impact of artificial intelligence on data system security: A literature review. Sensors, 21(21), 7029.

Rauf, U., Mohsen, F., & Wei, Z. (2023). A taxonomic classification of insider threats: existing techniques, future directions and recommendations. J. Cyber Secur Mobil., 12(2), 221–252. https://doi.org/10.13052/jcsm2245-1439.1225

Redino, C., Nandakumar, D., Schiller, R., Choi, K., Rahman, A., Bowen, E., et al. (2022). Zero day threat detection using graph and flow based security telemetry. 3rd IEEE 2022 International Conference on Computing, Communication, and Intelligent Systems, ICCCIS, 655–662. https://doi.org/10.1109/ICCCIS56430.2022.10037596

Reilly, C., O’Shaughnessy, S., & Thorpe, C. (2023). Robustness of image-based malware classification models trained with generative adversarial networks. ACM International Conference Proceeding Series, 92–99. https://doi.org/10.1145/3590777.3590792

Romsom, E. (2022). Countering global oil theft: Responses and solutions: WIDER Working Paper.

Salem, A.H., Azzam, S.M., Emam, O.E., & Abohany, A.A. (2024). Advancinmg cybersecurity: a comprehensive review of AI-driven techniques. Journal of Big Data, 11(105). https://doi.org/10.1186/s40537-024-00957-y

Shafin, S.S., Karmakar, G., & Mareels, I. (2023). Obfuscated memory malware detection in resource-constrained IoT devices for smart city applications. Sensors. https://doi.org/10.3390/s23115348

Shaukat, K., Luo, S., Chen, S., & Liu, D. (2020). Cyber threat detection using machine learning techniques: a performance evaluation perspective. 1st Annual international conference on cyber warfare and security. ICCWS 2020 Proceedings. https://doi.org/10.1109/ICCWS48432.2020.9292388

Shroff, J., Walambe, R., Singh, S.K., & Kotecha, K. (2022). Enhanced security against volumetric DDoS attacks using adversarial machine learning. Wireless Communications and Mobile Computing. https://doi.org/10.1155/2022/5757164

Srivani, M., Abirami, M., & Mala, T. (2023) Cognitive computing technological trends and future research directions in healthcare - A systematic literature review. Artificial Intelligence in Medicine, 138, 102513. https://doi.org/10.1016/j.artmed.2023.102513.

Tan, Z., Beuran, R., Hasegawa, S., Jiang, W., Zhao, M., & Tan, Y. (2020). Adaptive security awareness training using linked open data datasets. Educ. Inf. Technol., 25(6), 5235–5259.

Torres, J.M., Comesana, C.I., & García-Nieto, P.J. (2019). Machine learning techniques applied to cybersecurity. Int. J. Mach. Learn. Cybern, 10(10), 2823–2836.

Truong, T.C., Zelinka, I., Plucar, J., Candík, M., & Sulc, V. (2020). Artificial intelligence and cybersecurity: past, presence, and future, in: Artificial intelligence and evolutionary computations in engineering systems. pp. 351-363.

Vanjire, S., & Lakshmi, M. (2021). Behavior-based malware detection system approach for mobile security using machine learning. In Proceedings of the 2021 International Conference on Artificial Intelligence and Machine Vision (AIMV), Gandhinagar, India. September 24-26, 2021. pp. 1-4.

Wazid, M., Das, A.K., Chamola, V., & Park, Y. (2022). Uniting cyber security and machine learning: Advantages, challenges and future research. In ICT express (pp. 313–321). Korean Institute of Communication Sciences. https://doi.org/10.1016/j. icte.2022.04.007.

Welukar, J.N., & Bajoria, G.P. (2021). Artificial Intelligence in Cybersecurity - A Review. International Journal of Scientific Research in Science and Technology, 8(6), 488-491. https://doi.org/10.32628/IJSRST218675

Wilkins, J. (2018). Is artificial intelligence a help or hindrance? Network Security, (5), 18-19.

Zhang, Z., Ning, H., Shi, F., Farha, F., Xu, Y., Xu, J., Zhang, F., & Choo, K.K.R. (2022). Artificial intelligence in cyber security: research advances, challenges, and opportunities. Artif. Intell. Rev., 55, 1029-1053.

Downloads

Published

25-01-2025

How to Cite

Ojo, A. O. (2025). A Review on the Effectiveness of Artificial Intelligence and Machine Learning on Cybersecurity. Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online), 4(1), 104-111. https://doi.org/10.60087/jklst.v4.n1.011

Most read articles by the same author(s)

1 2 3 4 5 6 7 8 9 10 > >>