Accuracy of AI in Cyber Security: Navigating the Dual-Edged Dynamics of an Evolving Security Frontier

Authors

  • Sreekrishna Sanka Student
  • Dr. Sarada Prasad Gochhayat Assistant Teaching Professor at Villanova University
  • Virgil Torremoch Professor at University of Southern Philippines
  • Jyotsna Kethar Gifted Gabber

DOI:

https://doi.org/10.47611/jsrhs.v13i2.6773

Keywords:

Cybersecurity, Artificial Intelligence, Accuracy, LLM

Abstract

In the rapidly evolving domain of cyber security, the advent of AI (AI) and ML (ML) has marked a paradigmatic shift, enhancing the accuracy and efficiency of identifying and mitigating vulnerabilities. This paper delves into the dual-edged dynamics of AI in cyber security, examining the historical trajectory from manual identification methods to AI-driven approaches. While AI and ML have significantly improved the Accuracy and timeliness that accelerated the detection and analysis of cyber threats, offering predictive insights and adaptive defenses, they also introduce new challenges, including ethical considerations, transparency issues, and the potential for adversarial manipulations. The integration of Generative AI and Large Language Models (LLMs) further complicates the security landscape, presenting both novel opportunities and vulnerabilities. This paper emphasizes the critical role of responsible AI and governance in navigating these complexities, advocating for a balanced approach that leverages AI's strengths while addressing its limitations. As cyber security continues to adapt to these technological advancements, fostering innovation while ensuring ethical and transparent practices remains paramount. Significant findings from the study reveal that the integration of AI (AI), Large Language Models (LLMs), and Generative AI has markedly enhanced both accuracy and timeliness in cyber security operations. This advancement facilitates the early detection of threats and vulnerabilities, thereby substantially improving preventative measures. Furthermore, Generative AI and LLMs have pioneered innovative pathways for Threat Modeling techniques, revolutionizing the approach to threat prevention. Both Cyber Security Specialists and Hackers use these advances to improve upon each other continue this evolving trend.

Downloads

Download data is not yet available.

References or Bibliography

Yiming Zhang, et al. "A ML Based Intrusion Detection System for Detecting Zero-Day Attacks." Security and Communication Networks, 2023, doi: 10.1155/2023/1528924

Exploring Generative AI Applications in Cybersecurity https://www.freecodecamp.org/news/large-language-models-and-cybersecurity/

Bolstering Cybersecurity: How Large Language Models and Generative AI are Transforming Digital Security https://developer.nvidia.com/blog/bolstering-cybersecurity-how-large-language-models-and-generative-ai-are-transforming-digital-security/

Minh Duc Nguyen, et al. "Generating Adversarial ML Samples with Generative Adversarial Networks." 2023 International Joint Conference on AI (IJCAI), pp. 3682-3688, 2023, doi: 10.24963/ijcai.2023/546

Chakraborty, S., Rahaman, M. M., & Islam, M. S. (2023). Federated learning for privacy-preserving anomaly detection in industrial control systems. Sensors, 23(4), 1426. [invalid URL removed]

Ilyas, A., Engstrom, L., Xu, A., & Madry, A. (2023). Adversarial training methods for mitigating adversarial attacks. In Proceedings of the 36th International Conference on ML (pp. 5772-5783). PMLR. https://arxiv.org/abs/2301.11131

Jobin, A., Ienca, M., & Vayena, E. (2019). The state of the art in AI ethics research. Nature Machine Intelligence, 1(9), 389-399. [invalid URL removed]

Mittelstadt, B., Wachter, S., & Floridi, L. (2016). Against algorithmic discrimination: Transparency and accountability in algorithmic decision-making. Ethics and Information Technology, 18(2), 309-328. [invalid URL removed]

Xu, X., Wu, X., Chen, L., & Shou, Z. (2023). Interpretable ML for network security: A survey. Journal of Network and Computer Applications, 243, 106944. [invalid URL removed]

Chen, Y., Mao, Z., & Wang, X. (2021). AI for network security: A survey. IEEE Communications Surveys & Tutorials, 23(4), 2202-2232.

Samuelson, P. (2018). The Equifax data breach: A failure of information security and privacy law. Journal of Information Policy, 7(1), 123-142.

IC3. (2020). Florida water treatment plant cyberattack.

https://www.researchgate.net/publication/371871572_Revolutionizing_Cyber_Threat_Detection_with_Large_Language_Models

Ahlford, S., Jha, S., & Ramaswamy, S. (2021). A survey of ML in information security. ACM Computing Surveys (CSUR), 54(2), 1-37. https://www.researchgate.net/publication/327420784_A_Survey_of_Machine_Learning_Algorithms_and_Their_Application_in_Information_Security_An_Artificial_Intelligence_Approach

Carbone, M., Zhou, Y., & Liu, Z. (2021). Vulnerability analysis of cyber-physical systems: A survey of methods and tools. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 51(10), 5352-5363. https://ieeexplore.ieee.org/document/9797508

Gupta, B. B., & Shinde, S. D. (2020). A review of AI in cyber security. Journal of Information Technology and Management 12(1), 1-17. https://www.researchgate.net/publication/357596493_Artificial_Intelligence_in_Cyber_Security_-_A_Review

Huang, L., Xu, C., & Liu, K. J. R. (2022). Adversarial ML for cyber security. IEEE Transactions on Dependable and Secure Computing, 1-1. https://ieeexplore.ieee.org/document/9562706

Li, S., Li, B., Ma, X., Zhang, X., & Li, J. (2020). DL for vulnerability analysis: A survey. IEEE Access, 8, 123457-123483. https://ieeexplore.ieee.org/document/9244140

Sameen, M. A., Pradhan, S., & Malik, M. A. (2020). Explainable AI (XAI) for cyber security: A survey and future directions. Journal of Information Security and Applications, 56, 102530. https://www.sciencedirect.com/science/article/abs/pii/S0045790622005730

Large Language Models? - LLM AI Explained - AWS (amazon.com)

Google Generative AI – Google AIGenerative AI in Azure ML | Microsoft Azure

Gartner Identifies the Top Cybersecurity Trends for 2024

Ramanpreet Kaur * , Duˇ san Gabrijelˇciˇ c, Tomaˇ z Klobuˇ car. AI for cybersecurity: Literature review and future research directions https://doi.org/10.1016/j.inffus.2023.101804

Cybersecurity Framework | NIST

Top Cybersecurity Threats In 2023 | Forrester

Kelly Griswold Demistifying-enterprise-ai - Types of AI

Mohamed Amine Ferrag, Mthandazo Ndhlovu, Norbert Tihanyi, Lucas C. Cordeiro,Merouane Debbah, and Thierry Lestable - 2023 (PDF) Revolutionizing Cyber Threat Detection with Large Language Models (researchgate.net)

Published

05-31-2024

How to Cite

Sanka, S., Gochhayat, D. S. P. ., Torremoch, V. ., & Kethar, J. (2024). Accuracy of AI in Cyber Security: Navigating the Dual-Edged Dynamics of an Evolving Security Frontier. Journal of Student Research, 13(2). https://doi.org/10.47611/jsrhs.v13i2.6773

Issue

Section

HS Research Projects