AI and ML Algorithms in Cyber Security
Keywords:
Artificial Intelligence, Cybersecurity, Machine Learning, Threat Intelligence, Incident Response, Adversarial Attacks, Ethical Considerations, Collaborative Defense Strategies.Abstract
The rapid evolution of cyber threats, coupled with the increasing complexity of digital ecosystems, has necessitated more intelligent and adaptive security solutions. Artificial Intelligence (AI) and Machine Learning (ML) have emerged as transformative technologies in the cybersecurity landscape, enabling organizations to proactively detect, prevent, and respond to malicious activities with greater speed and precision. This paper explores the integration of AI and ML algorithms in various cybersecurity applications, including threat detection, incident response, vulnerability management, and user behavior analytics. It also examines the alignment of these technologies with established cybersecurity frameworks and standards such as NIST CSF, ISO/IEC 27001, and the NIST AI Risk Management Framework to ensure ethical, secure, and effective implementation. By evaluating real-world use cases and current challenges, the paper underscores the critical role of AI/ML in building resilient, future-ready cyber defense strategies.
Downloads
References
P. K. Bhattacharya and R. C. Glenn Jr., “IDES: An Intrusion Detection Expert System,” in Proceedings of the 15th National Computer Security Conference, pp. 439–449, 1992.
Kabir, A. Idress, and A. K. Majumdar, “Hybrid Intrusion Detection System Using Artificial Neural Network and Fuzzy Logic,” International Journal of Advanced Computer Science and Applications, vol. 6, no. 7, pp. 322–329, 2015.
G. K. Hans, “A Survey of Machine Learning Algorithms for Cybersecurity Applications,” Journal of Information Security, vol. 8, no. 3, pp. 121–137, 2017.
M. Ozkan‐Okay, S. Padhy, and T. Thomas, “A Comprehensive Survey: Evaluating the Efficiency of Artificial Intelligence and Machine Learning Techniques on Cyber Security Solutions,” IEEE Access, vol. 12, pp. 12229–12256, 2024.
J. Saxe and K. Berlin, “Deep Neural Network Based Malware Detection Using Two‐Dimensional Binary Program Features,” in Proceedings of the 10th Workshop on Mathematics in Software Engineering (MSE), pp. 1–8, 2017.
P. Chu, L. Chen, and S. J. Yang, “Phishing Website Detection via Hypergraph Learning,” ACM Transactions on Information and System Security, vol. 25, no. 1, article 2, 2022.
M. Ahmed, A. N. Mahmood, and J. Hu, “A Survey of Network Anomaly Detection Techniques,” Journal of Network and Computer Applications, vol. 60, pp. 19–31, 2016.
C. Yang, L. Ding, and X. Li, “Semi‐Supervised Deep Belief Network for Intrusion Detection,” Information Sciences, vol. 507, pp. 245–256, 2020.
J. Yeh, B. Lin, and M. Chen, “MalConv: Neural Malware Classification Using Raw Binaries,” in Proceedings of the 31st USENIX Security Symposium, pp. 103–118, 2018.
T. Wagner, S. Zhang, and K. Li, “LSTM‐Based Detection of Fileless Ransomware Activities,” Computers & Security, vol. 86, article 101588, 2019.
X. Wang, Y. Feng, and Z. Liu, “Variational Autoencoder for Early DDoS Detection in IoT Networks,” IEEE Internet of Things Journal, vol. 6, no. 2, pp. 1515–1526, 2019.
Z. Wang and J. Yuan, “Graph Neural Networks for Cybersecurity: A Survey,” IEEE Communications Surveys & Tutorials, vol. 25, no. 1, pp. 232–258, 2023.
Goodfellow et al., “Generative Adversarial Nets,” in Advances in Neural Information Processing Systems (NeurIPS), vol. 27, pp. 2672–2680, 2014.
Z. Hu and Y. Tan, “Generating Adversarial Malware Examples for Black‐Box Attacks Based on GAN,” arXiv preprint arXiv:1702.05983, 2017.
Q. Mu, J. Yu, and S. Wang, “Improving Fraud Detection with Generative Adversarial Networks in Imbalanced Datasets,” in Proceedings of the 2020 IEEE International Conference on Big Data, pp. 4921–4930, 2020.
C. Xu, E. Qian, and I. Molloy, “Adversarial Training on Malware Images: A Realistic Approach,” Journal of Cybersecurity, vol. 5, no. 1, taax019, 2020.
S. Patel and A. Sinha, “AI‐Driven Predictive Analytics for Security Incident Recovery,” in Proceedings of the 2022 ACM Conference on Data and Application Security and Privacy (CODASPY), pp. 250–262, 2022.
S. K. Arcot Ramesh, “AI‑Enhanced Cyber Threat Detection,” International Journal of Computer Trends and Technology, vol. 72, no. 6, pp. 64–71, 2024.
https://zvelo.com/ai-and-machine-learning-in-cybersecurity
https://www.stanfieldit.com/the-role-of-ai-and-ml-in-business-cyber-security
M. Ozkan-Okay et al., "A Comprehensive Survey: Evaluating the Efficiency of Artificial Intelligence and Machine Learning Techniques on Cyber Security Solutions," in IEEE Access, vol. 12, pp. 12229-12256, 2024, Doi: 10.1109/ACCESS.2024.3355547.
Sai Kiran Arcot Ramesh, "AI-Enhanced Cyber Threat Detection," International Journal of Computer Trends and Technology, vol. 72, no. 6, pp. 64-71, 2024
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.