AI and ML Algorithms in Cyber Security

Authors

  • Chandrababu C Nallapareddy

Keywords:

Artificial Intelligence, Cybersecurity, Machine Learning, Threat Intelligence, Incident Response, Adversarial Attacks, Ethical Considerations, Collaborative Defense Strategies.

Abstract

The rapid evolution of cyber threats, coupled with the increasing complexity of digital ecosystems, has necessitated more intelligent and adaptive security solutions. Artificial Intelligence (AI) and Machine Learning (ML) have emerged as transformative technologies in the cybersecurity landscape, enabling organizations to proactively detect, prevent, and respond to malicious activities with greater speed and precision. This paper explores the integration of AI and ML algorithms in various cybersecurity applications, including threat detection, incident response, vulnerability management, and user behavior analytics. It also examines the alignment of these technologies with established cybersecurity frameworks and standards such as NIST CSF, ISO/IEC 27001, and the NIST AI Risk Management Framework to ensure ethical, secure, and effective implementation. By evaluating real-world use cases and current challenges, the paper underscores the critical role of AI/ML in building resilient, future-ready cyber defense strategies.

Downloads

Download data is not yet available.

References

P. K. Bhattacharya and R. C. Glenn Jr., “IDES: An Intrusion Detection Expert System,” in Proceedings of the 15th National Computer Security Conference, pp. 439–449, 1992.

Kabir, A. Idress, and A. K. Majumdar, “Hybrid Intrusion Detection System Using Artificial Neural Network and Fuzzy Logic,” International Journal of Advanced Computer Science and Applications, vol. 6, no. 7, pp. 322–329, 2015.

G. K. Hans, “A Survey of Machine Learning Algorithms for Cybersecurity Applications,” Journal of Information Security, vol. 8, no. 3, pp. 121–137, 2017.

M. Ozkan‐Okay, S. Padhy, and T. Thomas, “A Comprehensive Survey: Evaluating the Efficiency of Artificial Intelligence and Machine Learning Techniques on Cyber Security Solutions,” IEEE Access, vol. 12, pp. 12229–12256, 2024.

J. Saxe and K. Berlin, “Deep Neural Network Based Malware Detection Using Two‐Dimensional Binary Program Features,” in Proceedings of the 10th Workshop on Mathematics in Software Engineering (MSE), pp. 1–8, 2017.

P. Chu, L. Chen, and S. J. Yang, “Phishing Website Detection via Hypergraph Learning,” ACM Transactions on Information and System Security, vol. 25, no. 1, article 2, 2022.

M. Ahmed, A. N. Mahmood, and J. Hu, “A Survey of Network Anomaly Detection Techniques,” Journal of Network and Computer Applications, vol. 60, pp. 19–31, 2016.

C. Yang, L. Ding, and X. Li, “Semi‐Supervised Deep Belief Network for Intrusion Detection,” Information Sciences, vol. 507, pp. 245–256, 2020.

J. Yeh, B. Lin, and M. Chen, “MalConv: Neural Malware Classification Using Raw Binaries,” in Proceedings of the 31st USENIX Security Symposium, pp. 103–118, 2018.

T. Wagner, S. Zhang, and K. Li, “LSTM‐Based Detection of Fileless Ransomware Activities,” Computers & Security, vol. 86, article 101588, 2019.

X. Wang, Y. Feng, and Z. Liu, “Variational Autoencoder for Early DDoS Detection in IoT Networks,” IEEE Internet of Things Journal, vol. 6, no. 2, pp. 1515–1526, 2019.

Z. Wang and J. Yuan, “Graph Neural Networks for Cybersecurity: A Survey,” IEEE Communications Surveys & Tutorials, vol. 25, no. 1, pp. 232–258, 2023.

Goodfellow et al., “Generative Adversarial Nets,” in Advances in Neural Information Processing Systems (NeurIPS), vol. 27, pp. 2672–2680, 2014.

Z. Hu and Y. Tan, “Generating Adversarial Malware Examples for Black‐Box Attacks Based on GAN,” arXiv preprint arXiv:1702.05983, 2017.

Q. Mu, J. Yu, and S. Wang, “Improving Fraud Detection with Generative Adversarial Networks in Imbalanced Datasets,” in Proceedings of the 2020 IEEE International Conference on Big Data, pp. 4921–4930, 2020.

C. Xu, E. Qian, and I. Molloy, “Adversarial Training on Malware Images: A Realistic Approach,” Journal of Cybersecurity, vol. 5, no. 1, taax019, 2020.

S. Patel and A. Sinha, “AI‐Driven Predictive Analytics for Security Incident Recovery,” in Proceedings of the 2022 ACM Conference on Data and Application Security and Privacy (CODASPY), pp. 250–262, 2022.

S. K. Arcot Ramesh, “AI‑Enhanced Cyber Threat Detection,” International Journal of Computer Trends and Technology, vol. 72, no. 6, pp. 64–71, 2024.

https://zvelo.com/ai-and-machine-learning-in-cybersecurity

https://www.stanfieldit.com/the-role-of-ai-and-ml-in-business-cyber-security

M. Ozkan-Okay et al., "A Comprehensive Survey: Evaluating the Efficiency of Artificial Intelligence and Machine Learning Techniques on Cyber Security Solutions," in IEEE Access, vol. 12, pp. 12229-12256, 2024, Doi: 10.1109/ACCESS.2024.3355547.

Sai Kiran Arcot Ramesh, "AI-Enhanced Cyber Threat Detection," International Journal of Computer Trends and Technology, vol. 72, no. 6, pp. 64-71, 2024

Downloads

Published

19.04.2025

How to Cite

Chandrababu C Nallapareddy. (2025). AI and ML Algorithms in Cyber Security. International Journal of Intelligent Systems and Applications in Engineering, 13(1), 286 –. Retrieved from https://www.ijisae.org/index.php/IJISAE/article/view/7691

Issue

Section

Research Article