2021
DOI: 10.1007/s40747-021-00494-8
|View full text |Cite
|
Sign up to set email alerts
|

The impacts of artificial intelligence techniques in augmentation of cybersecurity: a comprehensive review

Abstract: Given the prevailing state of cybersecurity, it is reasonable to understand why cybersecurity experts are seriously considering artificial intelligence as a potential field that can aid improvements in conventional cybersecurity techniques. Various progressions in the field of technology have helped to mitigate some of the issues relating to cybersecurity. These advancements can be manifested by Big Data, Blockchain technology, Behavioral Analytics, to name but a few. The paper overviews the effects of applica… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(17 citation statements)
references
References 78 publications
0
4
0
Order By: Relevance
“…The vital defense comes not only from the indication of AI defense or an intentional act of threat but also involves the fog of cognitive concealment based on which the threat cannot escalate. Consistent with the opinion of Naik et al (2021), artificial intelligence as a technology is among the imperative components of cybersecurity infrastructure that detects abnormalities and compares data. This can be seen as the main way the organizations tell that a bigger challenge is to come, and the right measures can stand up against the forthcoming events.…”
Section: Ai In Cybersecuritymentioning
confidence: 76%
“…The vital defense comes not only from the indication of AI defense or an intentional act of threat but also involves the fog of cognitive concealment based on which the threat cannot escalate. Consistent with the opinion of Naik et al (2021), artificial intelligence as a technology is among the imperative components of cybersecurity infrastructure that detects abnormalities and compares data. This can be seen as the main way the organizations tell that a bigger challenge is to come, and the right measures can stand up against the forthcoming events.…”
Section: Ai In Cybersecuritymentioning
confidence: 76%
“…The majority of previous works on immune-inspired IDSs target computer networks [ 192 , 193 ], IoT devices [ 187 ], or CPSs [ 188 ]. In additions, several works apply immune principles to IDSs applicable to WSNs, such as the negative selection-based IDS for WSNs named WSN-NSA [ 183 ], the multi-level IDS for WSNs [ 73 ], or Co-FAIS [ 135 ], a danger-theory-based IDS that utilizes fuzzified network traffic in WSNs.…”
Section: Literature Review On Immune-inspired Approachesmentioning
confidence: 99%
“…(9) Nowadays, cyber terrorism has increased. Therefore, there is an urgent need on how to prevent cyber-terrorism using modern scientific approaches such as AI ( Dilek et al, 2015 ), machine learning algorithms ( Salih et al, 2021 , Zhang et al, 2021 , Naik et al, 2021 ), mathematical models (Oludare et al, 2018), forensic DNA profiling (Oludare et al, 2018) amongst others. Likewise, there is a need for increasing forensic investigation ( Arshad et al, 2022 , Arshad et al, 2020 ) into crime scene to searching for evidence that can be used for justice.…”
Section: Practitioner Recommendationsmentioning
confidence: 99%