Artificial Intelligence in Cybersecurity: Opportunities and Challenges

International Journal of Business Society, Vol. 7, Issue 4
Almahdi Mosbah Almahdi EjreawNajiya B Annowari
Artificial Intelligence in CybersecurityMachine Learning and Deep LearningAdversarial AttacksPrivacy and Ethics in AIFuture of AI in Cybersecurity
PDFRegular IssueDOI: 10.30566/ijo-bs/2023.06.111
7Volume
4Issue

Abstract

This paper explores the intricate relationship between Artificial Intelligence (AI) and cybersecurity, shedding light on the opportunities it presents and its challenges. AI techniques such as Machine Learning (ML) and Deep Learning (DL) have shown significant potential in various cybersecurity areas, including intrusion detection, phishing detection, and malware classification. These advancements offer opportunities for more effective and proactive cyber defence mechanisms. However, integrating AI into cybersecurity also comes with significant challenges, including data quality and availability, adversarial attacks, privacy and ethical concerns, over-reliance on AI, and the interpretability of AI models. This paper discusses these aspects, providing a comprehensive overview of the current state of AI in cybersecurity. Furthermore, it outlines the future perspectives in the field, highlighting the need for robust, explainable, and privacy-preserving AI models, collaborative AI systems, and exploring the intersection of AI and quantum computing. The aim is to foster a broader understanding of the potential of AI in cybersecurity while acknowledging and addressing the challenges that come with it.

References

[1]

Adadi, A., & Berrada, M. (2018). Peeking Inside the Black-Box: A Survey on Explainable Artificial Intelligence (XAI). IEEE Access, 6, 52138-52160.

[2]

Akter, S., & Wamba, S. F. (2019). Big data and disaster management: a systematic review and agenda for future research. Annals of Operations Research, 283(1-2), 939-959.

[3]

Bhuyan, M. H., Bhattacharyya, D. K., & Kalita, J. K. (2020). Network anomaly detection: methods, systems, and tools. IEEE Communications Surveys & Tutorials, 21(1), 640-665.

[4]

Biamonte, J., Wittek, P., Pancotti, N., Rebentrost, P., Wiebe, N., & Lloyd, S. (2017). Quantum machine learning. Nature, 549(7671), 195-202.

[5]

Biggio, B., & Roli, F. (2018). Wild patterns: Ten years after the rise of adversarial machine learning. Pattern Recognition, 84, 317-331.

[6]

Borgaonkar, R., Park, J., Shaik, A., & Seifert, J. P. (2018). White-Stingray: Evaluating IMSI Catchers Detection Applications. In Black Hat USA.

[7]

Brundage, M., Avin, S., Clark, J., Toner, H., Eckersley, P., Garfinkel, B., ... & Anderson, H. (2018). The malicious use of artificial intelligence: Forecasting, prevention, and mitigation. arXiv preprint arXiv:1802.07228.

[8]

Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153-1176.

[9]

Carlini, N., Liu, C., Erlingsson, Ú., Kos, J., & Song, D. (2019). The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks. In 28th USENIX Security Symposium (USENIX Security 19).

[10]

Chen, H., Chiang, R. H., & Storey, V. C. (2018). Business Intelligence and Analytics: From Big Data to Big Impact. MIS Quarterly, 36(4).

[11]

Chen, M., Mao, S., & Liu, Y. (2014). Big data: A survey. Mobile Networks and Applications, 19(2), 171-209.

[12]

Dwork, C., & Roth, A. (2014). The Algorithmic Foundations of Differential Privacy. Foundations and Trends in Theoretical Computer Science, 9(3-4), 211-407.

[13]

Goodfellow, I., Bengio, Y., & Courville, A. (2016). Deep learning. MIT Press.

[14]

Kim, J., Kim, J., Thu, H. L. T., & Kim, H. (2016). Long short term memory recurrent neural network classifier for intrusion detection. In 2016 International Conference on Platform Technology and Service (PlatCon) (pp. 1-5). IEEE.

[15]

Kolias, C., Kambourakis, G., Stavrou, A., & Voas, J. (2017). DDoS in the IoT: Mirai and other botnets. Computer, 50(7), 80-84.

[16]

Kolosnjaji, B., Zarras, A., Webster, G., & Eckert, C. (2018). Deep learning for classification of malware system call sequences. In Australasian Joint Conference on Artificial Intelligence (pp. 137-149). Springer, Cham.

[17]

Ribeiro, M. T., Singh, S., & Guestrin, C. (2016). \"Why should I trust you?\" Explaining the predictions of any classifier. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp. 1135-1144).

[18]

Russell, S., & Norvig, P. (2016). Artificial intelligence: a modern approach. Malaysia; Pearson Education Limited.

[19]

Sahoo, D., Liu, C., & Hoi, S. C. H. (2017). Malicious URL detection using machine learning: A survey. arXiv preprint arXiv:1701.07179.

[20]

Sahoo, D., Liu, C., & Wang, C. (2017). Unsupervised learning for robust detection of anomalous behavior in large-scale network traffic. In 2017 IEEE Conference on Dependable and Secure Computing (pp. 279-286). IEEE.

[21]

Sharma, B. K., & Chen, K. (2019). Emerging Cyber Threats and Security Measures in the Era of New Technologies: Big Data, Cloud Computing, Internet of Things, and Social Media. In Advanced Methodologies and Technologies in Network Architecture, Mobile Computing, and Data Analytics (pp. 1979-1997). IGI Global.

[22]

Silva, C., Croda, P., Abe, V., & Jino, M. (2020). A systematic literature review of automated incident response in the context of cyber threat intelligence. Computers & Security, 91, 101690.

[23]

Tang, B., He, H., Baggenstoss, P. M., & Kay, S. (2016). A Bayesian classification approach using class-specific features for text categorisation. IEEE Transactions on Knowledge and Data Engineering, 28(6), 1602-1606.

[24]

Xu, W., Evans, D., & Qi, Y. (2019). Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks. In Proceedings of the 2018 Network and Distributed Systems Symposium.

[25]

Zhou, M., Zhang, R., Xie, W., Qian, W., & Zhou, A. (2018). Security and privacy in cloud computing: A survey. In Semantics in Mobile, Pervasive, and Ubiquitous Computing (pp. 105-127). Springer, Berlin, Heidelberg.

Article Information

Article Details
Volume & IssueVol. 7, Iss. 4
Publication DateJun 30, 2023
Authors
Almahdi Mosbah Almahdi Ejreaw
Najiya B Annowari
DOI
10.30566/ijo-bs/2023.06.111
PDF Download
Artificial Intelligence in Cybersecurity: Opportunities and Challenges | International Journal of Business Society