Artificial Intelligence's Effect on Cybersecurity
DOI:
https://doi.org/10.47611/jsrhs.v13i2.6613Keywords:
Artificial Intelligence, Cybersecurity, Data Mining, Monitoring, Malware, Security Solutions, Cybercrime, AI Applications, Centralized Systems, Machine Learning, Security SystemsAbstract
This paper examines how artificial intelligence(AI) affects cyberspace and can influence future malware and cyber threats, it emphasizes AI’s dual role as both an ally and an imminent threat. Illegal data mining in centralized digital networks has become a growing threat in modern cybersecurity. Because of the numerous flaws in today's centralized systems, more robust and beneficial alternatives are required. Traditional anti-cybercrime systems, such as physical equipment and human involvement, have proven ineffective. Newer methods have been created through the developments in machine learning which enhance cybercrime detection and prevention. The major goal of cybersecurity is to reduce digital assaults in cyberspace, with AI technologies playing an important role. Furthermore, concerns have been voiced concerning the possible use of AI-enhanced malware by hackers, underlining the importance of ongoing monitoring and collaboration and addressing the flaws. This research also investigates remedies to a couple of the disadvantages. This study examines existing AI applications in modern cybercrime prevention, highlighting its potential advantages and disadvantages. Learning and discussing the ethical role that AI will play is crucial for the growth and security of our digital infrastructure. With the rise of complex and severe cyber threats, AI-based security systems will help detect and protect cyberspace effectively and efficiently. By being updated on modern AI technologies and applications in cybersecurity, individuals and organizations can better protect themselves from cybercrime and minimize potential damage. Furthermore, ongoing collaboration and research in this area can lead to the development of more advanced and robust security solutions.
Downloads
References or Bibliography
Alhayani, B., Abbas, S. T., Khutar, D. Z., & Mohammed, H. J. (2021). Best ways computation intelligent of face cyber attacks. Elsevier.
Dash, B., & Sharma, P. (2023). Are ChatGPT and Deepfake Algorithms Endangering the Cybersecurity Industry? A Review [Review of Are ChatGPT and Deepfake Algorithms Endangering the Cybersecurity Industry? A Review].
Leszczyna, R. (2021). Review of Cybersecurity Assessment Methods: Applicability Perspective. Computers & Security, 102376. https://doi.org/10.1016/j.cose.2021.102376
Mohammed, I. A. (2020). Artificial Intelligence for Cybersecurity: A Systematic Mapping of Literature. International Journal of Innovations in Engineering Research and Technology, 7(9).
Patil, P. (2016). Artificial Intelligence in Cyber Security. International Journal of Research in Computer Applications and Robotics, 4(5).
Roguski, P. (2020). Russian Cyber Attacks Against Georgia, Public Attributions and Sovereignty in Cyberspace. https://ruj.uj.edu.pl/xmlui/bitstream/handle/item/153044/roguski_russian_cyber_attacks_against_georgia_2020.pdf?sequence=1&isAllowed=y
Sarker, I., Kayes, A. S. M., Badsha, S., Alqahtani, H., Watters, P., & Ng, A. (2020). Cybersecurity data science: An overview from machine learning perspective. Journal of Big Data, 7(41).
Taddeo, M. (2019). Three Ethical Challenges of Applications of Artificial Intelligence in Cybersecurity. Minds and Machines, 29(2), 187–191. https://doi.org/10.1007/s11023-019-09504-8
Taddeo, M., McCutcheon, T., & Floridi, L. (2019). Trusting artificial intelligence in cybersecurity is a double-edged sword. Nature Machine Intelligence, 1(12), 557–560. https://doi.org/10.1038/s42256-019-0109-1
Yamin, M. M., Ullah, M., Ullah, H., & Katt, B. (2021). Weaponized AI for cyber attacks. Journal of Information Security and Applications, 57, 102722. https://doi.org/10.1016/j.jisa.2020.102722
Published
How to Cite
Issue
Section
Copyright (c) 2024 Venkata Sai Anand Yadlapati; Mrs. Jothsna Kethar, Dr. Sarada Prasad Gochhayat
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Copyright holder(s) granted JSR a perpetual, non-exclusive license to distriute & display this article.