Review of artificial intelligence-based cybersecurity

Publish Year: 1403
نوع سند: مقاله کنفرانسی
زبان: English
View: 167

This Paper With 13 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

AICNF01_005

تاریخ نمایه سازی: 11 اردیبهشت 1404

Abstract:

Cybersecurity is one of the most important issues for organizations and companies in today's world. With the advancement of technology and the increase in the number of internet-connected devices and services, security risks have also increased. One of the solutions to combat security risks is the use of artificial intelligence. Security operations centers (SOCs) must be better equipped to manage the vast scale of data to monitor and analyze the complexity of threats. SOC analysts face a daunting task: sifting through thousands of alerts a day – most of which are false – while quickly identifying and mitigating real cybersecurity threats. Artificial intelligence excels at data analysis and quickly processes large data sets to identify patterns that indicate malicious behavior. When specifically trained on cybersecurity data, it can simplify cybersecurity operations by automating routine tasks such as triaging alerts, analyzing reports, and performing vulnerability scans, saving valuable time and resources for human analysts. AI's dominance in cyberattacks demonstrates the technology's unparalleled power to identify and counter complex threats. The use of AI in cybersecurity has become a vital tool in defending digital systems by combining machine learning algorithms, big data analysis, and predicting attacker behavior. Using advanced algorithms, AI can help detect cyberattacks automatically and in the shortest possible time. By analyzing huge amounts of data, AI can examine network traffic patterns and detect any attacks. Also, using neural networks, AI can automatically predict suspicious user behavior and notify him/her if necessary.

Authors

Marziyeh Felahat

Department of Mathematics, Faculty of Basic Sciences, Bozorgmehr University of Qaenat, Iran

Mohammad Kazem Beshkani

Master of Business Administration, E-Commerce, Hakim Nezami Quchan Institute of Higher

Maria Akbarpour Koumleh

Ph.D. student of Computer Engineering, University of Qatar