Application of Artificial Intelligence in Detecting and Mitigating Cyber Threats

Abstract

The integration of Artificial Intelligence (AI) into cybersecurity has revolutionized the detection and mitigation of cyber threats, addressing the growing complexity and sophistication of attacks. This study explores AI's effectiveness in identifying threats such as malware, phishing, and zero-day vulnerabilities while automating threat responses and enhancing proactive defense mechanisms. It highlights key challenges, including adversarial attacks, data quality issues, algorithmic biases, and integration complexities with legacy systems. Emerging technologies such as federated learning, blockchain, and edge computing offer promising solutions to overcome these barriers. Ethical and regulatory considerations are also addressed, emphasizing the need for responsible AI adoption in cybersecurity. The findings underscore AI's transformative potential in cybersecurity and provide actionable recommendations for its effective implementation. The study concludes that while AI presents significant advantages, addressing its limitations through interdisciplinary collaboration and continuous innovation is critical to maximizing its impact.

Country : Bangladesh/Australia

1 Mahabubur Rahman2 Imran Uddin3 Rana Das4 Tuhalika Saha5 Engr. S.K. Moududul Haque6 Nahid Reza Shatu7 Shafiqul Islam Shafiq

  1. Department of Statistics and Data Science, Jahangirnagar University, Dhaka, Bangladesh
  2. A2Z Finance Australia (Easy Mortgage Solutions Australia), Australia
  3. Department of Computer Science and Engineering, Daffodil International University, Dhaka, Bangladesh
  4. Department of Computer Science and Engineering, American International University Bangladesh, Dhaka, Bangladesh
  5. Department of ICT, Khulna Government Girls
  6. Department of MI & Operations, HSBC, Dhaka, Bangladesh
  7. ICT Cell, Bangladesh Oceanographic Research Institute, Cox’s Bazar, Bangladesh

IRJIET, Volume 9, Issue 1, January 2025 pp. 17-26

doi.org/10.47001/IRJIET/2025.901003

References

  1. Abdullahi, M., Baashar, Y., Alhussian, H., Alwadain, A., Aziz, N., Capretz, L. F., & Abdulkadir, S. J. (2022). Detecting cybersecurity attacks in internet of things using artificial intelligence methods: A systematic literature review. Electronics, 11(2), 198.
  2. Ali, A., Septyanto, A. W., Chaudhary, I., Al Hamadi, H., Alzoubi, H. M., & Khan, Z. F. (2022). Applied artificial intelligence as event horizon of cyber security. 2022 International Conference on Business Analytics for Technology and Security (ICBATS), 1–7.
  3. AlRaeei, M. (2024). The smart future for sustainable development: Artificial intelligence solutions for sustainable urbanization. Sustainable Development.
  4. Arif, H., Kumar, A., Fahad, M., & Hussain, H. K. (2024). Future Horizons: AI-Enhanced Threat Detection in Cloud Environments: Unveiling Opportunities for Research. International Journal of Multidisciplinary Sciences and Arts, 3(1), 242–251.
  5. Bécue, A., Praça, I., & Gama, J. (2021). Artificial intelligence, cyber-threats and Industry 4.0: Challenges and opportunities. Artificial Intelligence Review, 54(5), 3849–3886.
  6. Bello, O. A., & Olufemi, K. (2024). Artificial intelligence in fraud prevention: Exploring techniques and applications challenges and opportunities. Computer Science & IT Research Journal, 5(6), 1505–1520.
  7. Chirra, D. R. (2023). AI-Based Threat Intelligence for Proactive Mitigation of Cyberattacks in Smart Grids. Revista de Inteligencia Artificial En Medicina, 14(1), 553–575.
  8. Damaraju, A. (2023). Artificial Intelligence in Cyber Defense: Opportunities and Risks. Revista Espanola de Documentacion Cientifica, 17(2), 300–320.
  9. Duary, S., Choudhury, P., Mishra, S., Sharma, V., Rao, D. D., & Aderemi, A. P. (2024). Cybersecurity threats detection in intelligent networks using predictive analytics approaches. 2024 4th International Conference on Innovative Practices in Technology and Management (ICIPTM), 1–5.
  10. Gadze, J. D., Bamfo-Asante, A. A., Agyemang, J. O., Nunoo-Mensah, H., &Opare, K. A.-B. (2021). An investigation into the application of deep learning in the detection and mitigation of DDOS attack on SDN controllers. Technologies, 9(1), 14.
  11. Ganesh, A. D., & Kalpana, P. (2022). Future of artificial intelligence and its influence on supply chain risk management–A systematic review. Computers & Industrial Engineering, 169, 108206.
  12. Ghillani, D. (2022). Deep learning and artificial intelligence framework to improve the cyber security. Authorea Preprints.
  13. Ghosh, P. R., Afnan, M., & Biswas, J. (2023). Neurocybernetic Assistive Technologies to Enhance Robotic Wheelchair Navigation. Journal of Primeasia.
  14. Ghosh, P. R., Mozumder, T., & Rashid, S. (2023). Navigating the AI Frontier: Advancements Redefining the World Wide Web’s Future–A. Journal of Primeasia.
  15. Habila, M. A., Ouladsmane, M., &Alothman, Z. A. (2023). Role of artificial intelligence in environmental sustainability. In Visualization techniques for climate change with machine learning and artificial intelligence (pp. 449–469). Elsevier.
  16. Halimuzzaman, M. , W. H. A. , C. P. K. , & M. S. (2024). Public Relation and Educational Outcomes of Films in Bangladesh: A Study on Hawa. Journal of Primeasia, 5(1), 1–7. https://doi.org/10.25163/primeasia.519834
  17. Halimuzzaman, M., Sharma, D. J., Bhattacharjee, T., Mallik, B., Rahman, R., Rezaul Karim, M., Masrur Ikram, M., & Fokhrul Islam, M. (2024). Blockchain Technology for Integrating Electronic Records of Digital Healthcare System. Journal of Angiotherapy, 8(7).
  18. Halimuzzaman, M., & Sharma, J. (2022). Applications of accounting information system (AIS) under Enterprise resource planning (ERP): A comprehensive review. International Journal of Early Childhood Special Education (INT-JECSE), 14(2), 6801–6806.
  19. Halimuzzaman, M., & Sharma, J. (2024). The Role of Enterprise Resource Planning (ERP) in Improving the Accounting Information System for Organizations. In Revolutionizing the AI-Digital Landscape (pp. 263–274). Productivity Press.
  20. Halimuzzaman, M., Sharma, J., Islam, D., Habib, F., & Ahmed, S. S. (2023). FINANCIAL IMPACT OF ENTERPRISE RESOURCE PLANNING (ERP) ON ACCOUNTING INFORMATION SYSTEMS (AIS): A STUDY ON PETROLEUM COMPANIES IN BANGLADESH. China Petroleum Processing and Petrochemical Technology, 23(2), 219–244.
  21. Halimuzzaman, M., Sharma, J., Karim, M. R., Hossain, M. R., Azad, M. A. K., & Alam, M. M. (2024). Enhancement of Organizational Accounting Information Systems and Financial Control through Enterprise Resource Planning. In Synergy of AI and Fintech in the Digital Gig Economy (pp. 315–331). CRC Press.
  22. Halimuzzaman, M., Sharma, J., & Khang, A. (2024). Enterprise Resource Planning and Accounting Information Systems: Modeling the Relationship in Manufacturing. In Machine Vision and Industrial Robotics in Manufacturing (pp. 418–434). CRC Press.
  23. Hassan, K., Ferdaus, J., & Mosharaf, T. (2022). Spirituality in Hospitality Services: An Assessment of Halal Tourism Practices. Journal of Primeasia.
  24. Hassan, S., Afrin, S., & Islam, M. R. (2022). A Wavelet-Based Approach to Rapidly Identify Drug-Addicted Individuals Using Voice Signal Analysis. Journal of Primeasia.
  25. Honey, S. (2019). Promoting Sustainable Marketing in the RMG Sector: A Step for Transformation. AIUB Journal of Business and Economics, 16(1), 30–42.
  26. Honey, S., & Hossain, M. J. (2024). Consumer Perception of Eco-Friendly Apparel: Insights from Bangladesh’s RMG Sector. INTERNATIONAL JOURNAL OF RESEARCH AND INNOVATION IN SOCIAL SCIENCE (IJRISS), VIII. https://doi.org/10.47772/IJRISS
  27. Hossain, M. M., & Islam, M. S. (2022). Policy Recommendations and Guidelines on Sustainable Tourism Development in Bangladesh–A Systematic Review. Journal of Primeasia, 3(1), 1–9.
  28. Islam, T., Islam, M. N., Zihad, M. A., & Datta, S. (2022). Toxic Leadership and Employee Misconduct of Hotel and Tourism Institution: A Frontline Perspective. Journal of Primeasia.
  29. Javaid, H. A. (2024). How Artificial Intelligence is Revolutionizing Fraud Detection in Financial Services. Innovative Engineering Sciences Journal, 4(1).
  30. Kalla, D., Kuraku, S., & Samaah, F. (2023). Advantages, disadvantages and risks associated with chatgpt and ai on cybersecurity. Journal of Emerging Technologies and Innovative Research, 10(10).
  31. Kaur, R., Gabrijelčič, D., & Klobučar, T. (2023). Artificial intelligence for cybersecurity: Literature review and future research directions. Information Fusion, 97, 101804.
  32. Kodete, C. S., Thuraka, B., Pasupuleti, V., &Malisetty, S. (2024). Determining the efficacy of machine learning strategies in quelling cyber security threats: Evidence from selected literatures. Asian Journal of Research in Computer Science, 17(8), 24–33.
  33. Kunduru, A. R. (2023). Artificial intelligence advantages in cloud Fintech application security. Central Asian Journal of Mathematical Theory and Computer Sciences, 4(8), 48–53.
  34. Maddireddy, B. R., &Maddireddy, B. R. (2021a). Cyber security Threat Landscape: Predictive Modelling Using Advanced AI Algorithms. Revista Espanola de Documentacion Cientifica, 15(4), 126–153.
  35. Maddireddy, B. R., & Maddireddy, B. R. (2021b). Enhancing Endpoint Security through Machine Learning and Artificial Intelligence Applications. Revista Espanola de Documentacion Cientifica, 15(4), 154–164.
  36. Meyer, T. (2022). Cyber Resilience Assessment Frameworks for Autonomous Vehicle Ecosystems: Develops frameworks to assess cyber resilience within the ecosystems of autonomous vehicles. Journal of Artificial Intelligence Research and Applications, 2(2), 1–11.
  37. Mohamed, N., Almazrouei, S. K., Oubelaid, A., Bajaj, M., Jurado, F., & Kamel, S. (2023). Artificial intelligence (AI) and machine learning (ML)-based Information security in electric vehicles: A review. 2023 5th Global Power, Energy and Communication Conference (GPECOM), 108–113.
  38. Nimmagadda, V. S. P. (2021). Artificial Intelligence and Blockchain Integration for Enhanced Security in Insurance: Techniques, Models, and Real-World Applications. African Journal of Artificial Intelligence and Sustainable Development, 1(2), 187–224.
  39. Pattyam, S. P. (2021). Artificial Intelligence in Cybersecurity: Advanced Methods for Threat Detection, Risk Assessment, and Incident Response. Journal of AI in Healthcare and Medicine, 1(2), 83–108.
  40. Perez-Diaz, J. A., Valdovinos, I. A., Choo, K.-K. R., & Zhu, D. (2020). A flexible SDN-based architecture for identifying and mitigating low-rate DDoS attacks using machine learning. IEEE Access, 8, 155859–155872.
  41. Rasheed, S., Nazneen, F., & Huda, M. N. (2022). The Kamranga Mosque: Architectural Synthesis and Heritage Significance in Colonial Dhaka-Review. Journal of Primeasia.
  42. Shah, V. (2021). Machine learning algorithms for cybersecurity: Detecting and preventing threats. Revista Espanola de DocumentacionCientifica, 15(4), 42–66.
  43. Shwedeh, F., Malaka, S., & Rwashdeh, B. (2023). The Moderation Effect of Artificial Intelligent Hackers on the Relationship between Cyber Security Conducts and the Sustainability of Software Protection: A Comprehensive Review. Migration Letters, 20(S9), 1066–1072.
  44. Wazid, M., Das, A. K., Chamola, V., & Park, Y. (2022). Uniting cyber security and machine learning: Advantages, challenges and future research. ICT Express, 8(3), 313–321.
  45. Weng, Y., & Wu, J. (2024). Leveraging artificial intelligence to enhance data security and combat cyberattacks. Journal of Artificial Intelligence General Science (JAIGS) ISSN: 3006-4023, 5(1), 392–399.
  46. Zaman, S., Alhazmi, K., Aseeri, M. A., Ahmed, M. R., Khan, R. T., Kaiser, M. S., & Mahmud, M. (2021). Security threats and artificial intelligence based countermeasures for internet of things networks: a comprehensive survey. IEEE Access, 9, 94668–94690.
  47. Zeadally, S., Adi, E., Baig, Z., & Khan, I. A. (2020). Harnessing artificial intelligence capabilities to improve cybersecurity. IEEE Access, 8, 23817–23837.
  48. Zhang, Z., Al Hamadi, H., Damiani, E., Yeun, C. Y., & Taher, F. (2022). Explainable artificial intelligence applications in cyber security: State-of-the-art in research. IEEE Access, 10, 93104–93139.