ENHANCING CYBERSECURITY WITH ARTIFICIAL INTELLIGENCE: TRENDS AND CHALLENGES
DOI:
https://doi.org/10.29121/shodhkosh.v4.i2.2023.4943Abstract [English]
As technology advances rapidly, cybersecurity has become an essential component of the modern digital world. This paper examines the role of Artificial Intelligence (AI) in strengthening cybersecurity, focusing on its ability to predict, prevent, and respond to cyber threats. We highlight the latest trends, including AI-driven threat detection, anomaly detection, and automated incident management. At the same time, we delve into the challenges that AI faces, such as ethical issues, adversarial attacks, and data privacy concerns. Through case studies and experimental findings, we demonstrate the effectiveness of AI in addressing evolving cyber threats. The paper aims to guide the integration of AI into cybersecurity frameworks, ensuring a secure digital environment.
References
Brown, D., & Smith, J. (2023). "Deep Learning for Cybersecurity: A Survey." Journal of Cybersecurity Research, 15(3), 200-210.
Li, H., et al. (2022). "Behavioral Biometrics in Cybersecurity: Trends and Challenges." IEEE Transactions on Information Forensics and Security, 17(1), 58-72.
Miller, K., & Adams, L. (2023). "The Role of AI in Automated Incident Response." ACM Computing Surveys, 55(4), 1-35.
European Union Agency for Cybersecurity (ENISA). (2022). "AI and Cybersecurity: Ethical and Regulatory Perspectives."
Chhabra, R., & Gupta, N. (2021). "Adversarial Machine Learning in Practice." International Conference on Emerging Technologies in Cybersecurity.
ICTACT Journals (2023). "Index Copernicus Impact Metrics." www.ictactjournals.in
Smith, A., & Zhang, Y. (2021). "AI in Network Security." International Journal of Computer Science, 19(5), 100-120.
Jones, L. (2022). "Ethical Considerations in AI for Cybersecurity." AI & Society, 37(2), 45-60.
Green, P. (2023). "AI in IoT Security." Journal of Internet Technology, 24(3), 300-320.
Roberts, T. (2021). "AI-Driven DDoS Mitigation." Journal of Network Defense, 15(1), 25-40.
Gupta, S. (2020). "Privacy Challenges in AI Systems." IEEE Access, 8, 13456-13472. DOI: https://doi.org/10.1109/ACCESS.2020.2970576
Clarke, R. (2022). "AI for Insider Threat Detection." Security and Privacy Journal, 13(6), 89-110.
Carter, M. (2021). "Predictive Analytics in Cybersecurity." Cyber Defense Magazine, 14(4), 100-115.
Wang, Y. (2023). "AI-Driven Encryption Technologies." Journal of Information Security, 11(2), 45-63.
Kumar, R. (2022). "AI and Cloud Security: Trends and Practices." Cloud Computing Journal, 18(3), 78-94.
White, D. (2021). "Ethics in AI Development for Cybersecurity." AI Ethics Review, 7(2), 33-48.
Chen, Z. (2023). "Machine Learning in Malware Detection." IEEE Transactions on Cybersecurity, 21(4), 56-72.
Lopez, J. (2022). "Machine Learning for Anomaly Detection in Cybersecurity." International Journal of Advanced Computing, 12(3), 78-88.
Santos, E., & Mendes, F. (2021). "AI in Protecting Critical Infrastructures." Security Journal, 9(1), 11-21.
Blake, R. (2022). "Harnessing Artificial Intelligence for Behavioral Analytics." Cybersecurity Innovations Journal, 5(3), 101-117.
Dawson, L., & Peters, T. (2023). "AI in Fraud Detection: A Real-World Perspective." Journal of Financial Technologies, 20(5), 120-138.
Raj, M., & Zhang, H. (2021). "Leveraging AI for Real-time Cyber Threat Analysis." Cybersecurity & Risk Management, 3(1), 92-105.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Dr. Rajshree

This work is licensed under a Creative Commons Attribution 4.0 International License.
With the licence CC-BY, authors retain the copyright, allowing anyone to download, reuse, re-print, modify, distribute, and/or copy their contribution. The work must be properly attributed to its author.
It is not necessary to ask for further permission from the author or journal board.
This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.























