SECURING DATA TRANSMISSION: PREDICTIVE AI MODEL FOR CYBERSECURITY APPLICATIONS
Keywords:
Artificial Intelligence (AI), Cybersecurity, Artificial Neural Networks (ANNS)Abstract
Artificial intelligence (AI) is a game-changer in the field of cybersecurity. It gives enterprises a powerful toolkit to strengthen their digital defenses against a constantly changing range of threats. AI enables cybersecurity teams to quickly detect and respond to attacks, automate repetitive activities, and protect the integrity of data transactions. It does this by utilizing machine learning algorithms and advanced analytics. Cybersecurity teams may proactively mitigate risks when cyberattacks become more complicated and persistent by utilizing AI-driven solutions to spot aberrant patterns and possible breaches in real time. AI also has the potential to automate increasingly repetitive activities, freeing up human analysts to work on more strategic projects. The hybrid encryption in combining asymmetric and symmetric encryption for secure data transmission and storage. The benefits of symmetric encryption for secure key exchange and asymmetric encryption for effective data encryption are combined in this method. Artificial neural networks (ANNs) combined with hybrid encryption can offer a safe and effective method for protecting privacy while analyzing sensitive data and predict the threats. Applications like private-preserving machine learning, safe multiparty computations, and secure data analysis can all benefit from this integration. The outcome of this research is to identify threats more quickly and accurately than by humans and to Block suspicious activity automatically to avoid attacks.
References
Shakor, M. Y., Khaleel, M. I., Safran, M., Alfarhood, S., & Zhu, M. (2024). Dynamic AES Encryption and Blockchain Key Management: a novel solution for cloud data security. IEEE Access, 1. https://doi.org/10.1109/access.2024.3351119
Choithani, T., Chowdhury, A., Patel, S., Patel, P., Patel, D., & Shah, M. (2024). “A Comprehensive Study of Artificial Intelligence and Cybersecurity on Bitcoin, Crypto Currency and Banking System.”
Tariq, E., Akour, I., Al-Shanableh, N., Alquqa, E. K., Alzboun, N., Al-Hawary, S. I. S., & Alshurideh, M. T. (2024). “How cybersecurity influences fraud prevention: An empirical study on Jordanian commercial”
Sharma, H., Sharma, G., & Kumar, N. (2024). AI-assisted secure data transmission techniques for next-generation HetNets: A review. In Elsevier B.V., ScienceDirect, Galgotias University, Bennett University, & Thapar Institute of Engineering and Technology, Computer Communications (Vol. 21)
Almalawi, A., Hassan, S., Fahad, A., & Khan, A. I. (2024). A hybrid cryptographic mechanism for secure data transmission in edge AI networks. ˜the œInternational Journal of Computational Intelligence Systems/International Journal of Computational Intelligence Systems, 17(1). https://doi.org/10.1007/s44196-024-00417-8
Dhiyanesh, B., Shakkeera, L., Azath, H., Viswanathan, S. K., & Poonuramu, V. (2023). Improved Privacy of Data Transaction in IoT-Enabled Blockchain Technology Using Privacy-Based Machine Learning Algorithms. In Revolutionizing Digital Healthcare Through Blockchain Technology Applications (pp. 187-206). IGI Global.
Chakraborty, C., Nagarajan, S. M., Devarajan, G. G., Ramana, T. V., & Mohanty, R. (2023). Intelligent AI-based Healthcare Cyber Security System using Multi-Source Transfer Learning Method. ACM Transactions on Sensor Networks. https://doi.org/10.1145/3597210
Alshehri, M. (2023). Blockchain-assisted cyber security in medical things using artificial intelligence. Electronic Research Archive, 31(2), 708–728. https://doi.org/10.3934/era.2023035
Farivar, F., Haghighi, M. S., Jolfaei, A., & Alazab, M. (2020). Artificial intelligence for detection, estimation, and compensation of malicious attacks in nonlinear Cyber-Physical systems and industrial IoT. IEEE Transactions on Industrial
Informatics, 16(4), 2716–2725. https://doi.org/10.1109/tii.2019.2956474
Kim, S., Hwang, C., Lee, T., & Department of Information Security, Hoseo University. (2020). Anomaly based unknown intrusion detection in endpoint environments. Electronics, 9, 1022. https://doi.org/10.3390/electronics9061022
P. Hakonen, “Detecting Insider Threats Using User and Entity Behavior Analytics,” 2022, Accessed: Feb. 20, 2024.
[Online]. Available: http://www.theseus.fi/handle/10024/786079.
L. Universitet and +++ S.------L., “Anomaly detection for automated security log analysis : Comparison of existing techniques and tools,” 2021, Accessed: Feb. 20, 2024. [Online]. Available: https://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177728.
Kern, M., Skopik, F., Landauer, M., & Weippl, E. (2022). Strategic selection of data sources for cyber attack detection in enterprise networks. Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing. https://doi.org/10.1145/3477314.3507022
“What is Incident Response? Definition and Example” https://darktrace.com/cyber-ai-glossary/incident-response (Accessed May 02 2024)
“Incident Response Policy: A Quick Guide” https://www.cynet.com/incidentresponse/incident-response-policy-a-quick-guide/ (Accessed May 02 2024)
“Cortex XSOAR: Security Orchestration and Automation –Palo Alto Networks”. https://www.paloaltonetworks.com/cortex/cortex-xsoar(Accessed May 02 2024)
Kshirsagar, Aniruddha Prakash, and L. Shakkeera. "Deep Learning Based Hybrid Approach for Crowd Anomalous Behavior Detection." International Virtual Conference on Industry. Singapore: Springer Nature Singapore, 2021.
Shakkeera, L., et al. "An information and predictive credibility control system using blockchain technique." Journal of Physics: Conference Series. Vol. 1964. No. 4. IOP Publishing, 2021.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Harshitha K, Shakkeera L (Author)

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.