2022
DOI: 10.1177/15501329221084882
|View full text |Cite
|
Sign up to set email alerts
|

Artificial intelligence analysis in cyber domain: A review

Abstract: The application of Big Data Analytics is identified through the Cyber Research Alliance for cybersecurity as the foremost preference for future studies and advancement in the field of cybersecurity. In this study, we develop a repeatable procedure for detecting cyber-attacks in an accurate, scalable, and timely manner. An in-depth learning algorithm is utilized for training a neural network for detecting suspicious user activities. The proposed system architecture was implemented with the help of Splunk Enterp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 28 publications
(15 citation statements)
references
References 40 publications
0
15
0
Order By: Relevance
“…• Human-AI collaboration: The research may overlook the human factors involved in the interaction between humans and AI systems in CS operations [9,10]. Further exploration is needed to understand the dynamics of human-AI collaboration, including human-machine interaction, decision-making processes, and trust dynamics, to optimize the effectiveness and usability of AI-driven CS solutions.…”
Section: Limited Focus On Industry-specific Applications Of Ai In Csmentioning
confidence: 99%
See 1 more Smart Citation
“…• Human-AI collaboration: The research may overlook the human factors involved in the interaction between humans and AI systems in CS operations [9,10]. Further exploration is needed to understand the dynamics of human-AI collaboration, including human-machine interaction, decision-making processes, and trust dynamics, to optimize the effectiveness and usability of AI-driven CS solutions.…”
Section: Limited Focus On Industry-specific Applications Of Ai In Csmentioning
confidence: 99%
“…• Phishing attacks: Phishing remains one of the most prevalent and widely-used tactics employed by cybercriminals to deceive users and gain unauthorized access to sensitive information [10,11]. These attacks often involve the use of fraudulent emails, websites, or messages designed to trick recipients into disclosing personal data, login credentials, or financial information.…”
Section: Figure 1 Road Map Of This Study 2 Evolution Of Cyber Threatsmentioning
confidence: 99%
“…It is important to design and develop safe and secure methods. Several studied techniques use deep learning-, machine learning-, or artificial intelligence-based algorithms [ 93 ]. However, there are some disadvantages to such approaches, such as ensemble datasets and high dimensional data.…”
Section: Vulnerabilities Challenges and Future Prospective In The Iio...mentioning
confidence: 99%
“…This is one of the studies or learning techniques that were inverted in the early 1960s that can be deliberated to be LA where it selects and inferiors their existing action per the past familiarities from the atmosphere. This makes it more suitable to tumble interested in the variety of RL in case the atmosphere is stochastically utilized; MDP is used [38] and [39].…”
Section: Learning Automatamentioning
confidence: 99%