ADVANCED THREAT INTELLIGENCE UTILIZING AI TO PREDICT AND PREVENT CYBER ATTACKS

Authors

  • Venkata Sai Swaroop Reddy Senior Software Engineer, ViaSat Inc, USA. Author

Keywords:

AI, ML Capabilities, Cybersecurity, Internet Of Things (IoT)

Abstract

The Internet of Things (IoT), fog computing, cyberattacks, and computer security have all experienced exponential growth in the past few years, ushering in what is known as the fourth industrial revolution (Industry 4.0). Strict authentication and security measures are required due to the massive amounts of data produced by the ever-growing networks enabled by the Internet of Things (IoT). One of the most promising ways to guard against cyberattacks is with artificial intelligence (AI). This article follows a systematic literature review (SLR) format to organise and review the existing research on AI approaches for detecting cybersecurity vulnerabilities in an IoT environment. With an emphasis on the rapid prediction and mitigation of cyber-attacks, this research painstakingly investigates the possibilities of AI and ML to strengthen real-time cybersecurity. In response to a rapidly evolving threat landscape, this article spearheads research into cutting-edge cybersecurity solutions. Investigating the effectiveness of AI and ML in strengthening defence systems is urgently needed due to the limitations of existing approaches. An exhaustive examination of AI and ML's function in real-time cybersecurity is the goal of this article. Particularly highlighted is their ability to foresee and quickly foil cyberattacks. This investigation covers a wide range of topics, from the complexities of the models themselves to important issues of ethics, security, and new developments. The exploration covers all bases in terms of study directions, as it is built around a strong foundation. Enhancing explainability, addressing vulnerabilities to adversarial attacks, developing quantum-resistant cryptographic solutions, and fostering collaboration between humans and AI are all imperatives. Using AI and ML for real-time cybersecurity comes with a lot of complex technological, organisational, and ethical considerations, which this paper delves into. The results of this investigation shed light on the potential benefits and drawbacks of using AI and ML in cybersecurity. Crucial topics requiring nuanced attention and investigation include ethical considerations, vulnerabilities to adversarial assaults, and the urgency for quantum-resistant cryptography. This study imagines a future where cybersecurity ecosystems are built to last and adapt to new threats by combining human knowledge with AI and ML capabilities. To properly incorporate AI and ML in defending our digital environment against the ever-evolving cyber threat scenario, we need a clear roadmap for continued innovation, and the research directions laid forth here provide just that.

References

Sarker IH (2022) Smart city data science: towards data-driven smart cities with open research issues. Internet Things 19:100528

Sarker IH, Asif IK, Yoosef BA, Fawaz A (2022) Internet of things (IoT) security intelligence: a comprehensive overview, machine learning solutions and research directions. Mobile Netw Appl 1–17

Sarker IH (2021) Machine learning: algorithms, real-world applications and research directions. SN Comput Sci 2(3):1–21

Sarker IH (2021) Cyberlearning: effectiveness analysis of machine learning security modeling to detect cyber-anomalies and multi-attacks. Internet Things 14:100393

Tien JM (2017) Internet of things, real-time decision making, and artificial intelligence. Ann Data Sci 4(2):149–178

Shi Y (2022) Advances in big data analytics: theory, algorithms and practices. Springer, Berlin

Sarker IH, Kayes ASM, Badsha S, Alqahtani H, Watters P, Ng A (2020) Cybersecurity data science: an overview from machine learning perspective. J Big Data 7(1):1–29

Ślusarczyk B (2018) Industry 4.0: are we ready? Pol J Manag Stud 17:232–248

Sarker IH, Hasan Furhad M, Nowrozy Ra (2021) AI-driven cybersecurity: an overview, security intelligence modeling and research directions. SN Comput Sci 2(3):1–18

Sarker IH (2022) AI-based modeling: techniques, applications and research issues towards automation, intelligent and smart systems. SN Comput Sci 3(2):1–20

KDD cup 99. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. Accessed on 20 Oct 2019

Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD cup 99 data set. In: 2009 IEEE symposium on computational intelligence for security and defense applications, pp 1–6

Lippmann RP, Fried DJ, Graf I, Haines JW, Kendall KR, McClung D, Weber D, Webster SE, Wyschogrod D, Cunningham RK et al (2000) Evaluating intrusion detection systems: the 1998 darpa off-line intrusion detection evaluation. In: Proceedings DARPA information survivability conference and exposition. DISCEX’00, vol 2. IEEE, pp 12–26

Caida ddos attack 2007 dataset. http://www.caida.org/data/passive/ddos-20070804-dataset.xml/. Accessed 20 Oct 2019

Canadian Institute of Cybersecurity, University of New Brunswick, ISCX dataset. http://www.unb.ca/cic/datasets/index.html/. Accessed on 20 Oct 2019

The ctu-13 dataset. https://stratosphereips.org/category/datasets-ctu13. Accessed 20 Oct 2019

Moustafa N, Slay J (2015) UNSW-NB15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set). In: 2015 military communications and information systems conference (MilCIS). IEEE, pp 1–6

Jing X, Yan Z, Jiang X, Pedrycz W (2019) Network traffic fusion and analysis against DDOS flooding attacks with a novel reversible sketch. Inf Fusion 51:100–113

Koroniotis N, Moustafa N, Sitnikova E, Turnbull B (2019) Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-IoT dataset. Futur Gener Comput Syst 100:779–796

Wang Q, Ma Y, Zhao K, Tian Y (2022) A comprehensive survey of loss functions in machine learning. Ann Data Sci 9(2):187–212

Downloads

Published

2023-01-10

How to Cite

ADVANCED THREAT INTELLIGENCE UTILIZING AI TO PREDICT AND PREVENT CYBER ATTACKS. (2023). GLOBAL JOURNAL OF CYBER SECURITY (GJCS), 1(01), 1-12. https://lib-index.com/index.php/GJCS/article/view/GJCS_01_01_001