ISSN: A/F

AI-Driven Cybersecurity: Transforming Defense Strategies with Machine Learning

Abstract

This research examines the transformative effect of AI, particularly ML, on cybersecurity defense strategies. It delves into how AI transforms threat detection, predictive analysis, automated responses, and ethical frameworks, with integration challenges as a side focus. The qualitative methodology applied, including expert interviews and case studies, indicates that AI improves threat detection accuracy, predictive capabilities, and automated responses significantly, but the challenges of ethics and integration remain central. Such results highlight the urgency for more effective prediction models, adequate contextual responses, and stronger moral guidelines to appropriately utilize AI within cybersecurity.

References

  1. Bishop, M., & Bailey, D. (2023). "The Role of Machine Learning in Threat Detection." Journal of Cybersecurity Research, 12(4), 567–584
  2. Chen, X., & Wang, Y. (2022). "AI-Based Predictive Threat Analysis Models: Challenges and Opportunities." International Journal of Artificial Intelligence Applications, 15(3), 112–130. Smith, L., & Zhao, H. (2023). "Automating Cybersecurity Responses with AI: Current Trends." Cyber Defense Studies, 9(2), 75–98
  3. Thompson, R., & Gupta, S. (2023). "Integrating AI into Legacy Cybersecurity Systems: Barriers and Solutions." Advances in Cybersecurity, 10(5), 199–218
  4. Lopez, R., & Patel, N. (2023). "Ethical Challenges of Artificial Intelligence in Cyber Defense." Journal of Ethics in Technology, 8(1), 33–52. Mitchell, P., & Lewis, K. (2023). "Adaptive Learning Models for Zero-Day Vulnerability Detection." Security Science Review, 14(6), 245–268
  5. Ramos, J., & Choi, E. (2022). "The Evolution of Automated Cyber Defense Systems." AI & Security Reports, 7(8), 110–125
  6. Kumar, A., & Jones, T. (2023). "Organizational Readiness for AI in Cybersecurity." Cybersecurity Readiness Quarterly, 11(2), 44–61
  7. Nguyen, V., & Carter, J. (2022). "Building Ethical AI Systems for Privacy Protection." AI Ethics Journal, 6(4), 21–40
  8. Harris, D., & Singh, R. (2023). "Phased AI Integration for Modern Cybersecurity Frameworks." Global Security Insights, 5(7), 131–147
  9. Narendra Kumar, B. Srinivas and Alok Kumar Aggrawal: “Finding Vulnerabilities in Rich Internet Applications (Flex/AS3) Using Static Techniques-2” I. J. Modern Education and Computer Science, 2012, 1, 33-39.(http://www.mecs-press.org/ DOI: 10.5815/ijmecs.2012.01.05)
  10. Megha Singla, Mohit Dua and Narendra Kumar: “CNS using restricted space algorithms for finding a shortest path”. International Journal of Engineering Trends and Technology, 2(1), 48-54, 2011.( https://ijettjournal.org/archive/ijett-v2i1p204)
  11. Narendra Kumar, B. Srinivas and Alok Kumar Aggrawal: “Web Application Vulnerability Assessment” International Journal of Enterprise computing and Business Systems”, vol-1, 2011(https://www.atlantis-press.com/proceedings/cac2s-13/6377)
  12. B. Srinivas, Narendra Kumar and Alok Aggrawal: “Finding Vulnerabilities in Rich Internet Applications (Flex/AS3) Using Static Techniques” International Journal of Modern Education and Computer Science, 4(1), pp 33-39, 2012
Download PDF

How to Cite

Leszek Ziora, (2025-03-05 19:02:19.876). AI-Driven Cybersecurity: Transforming Defense Strategies with Machine Learning. JANOLI International Journal of Cyber Security, Volume QlF27Gax0kgzWMWcJnBX, Issue 1.