Artificial intelligence for cybersecurity: Literature review and future research directions

被引:121
作者
Kaur, Ramanpreet [1 ]
Gabrijelcic, Dusan [1 ]
Klobucar, Tomaz [1 ]
机构
[1] Jozef Stefan Inst, Lab Open Syst & Networks, Ljubljana, Slovenia
关键词
Detection; Protection; Response; Recovery; Identify; Learning; Cyberattacks; Taxonomy; CYBER-PHYSICAL SYSTEMS; INTERNET-OF-THINGS; DECISION-SUPPORT; GENERATION; NETWORK; VULNERABILITIES; CLASSIFICATION; CYBERATTACKS; METHODOLOGY; INTRUSIONS;
D O I
10.1016/j.inffus.2023.101804
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Artificial intelligence (AI) is a powerful technology that helps cybersecurity teams automate repetitive tasks, accelerate threat detection and response, and improve the accuracy of their actions to strengthen the security posture against various security issues and cyberattacks. This article presents a systematic literature review and a detailed analysis of AI use cases for cybersecurity provisioning. The review resulted in 2395 studies, of which 236 were identified as primary. This article classifies the identified AI use cases based on a NIST cybersecurity framework using a thematic analysis approach. This classification framework will provide readers with a comprehensive overview of the potential of AI to improve cybersecurity in different contexts. The review also identifies future research opportunities in emerging cybersecurity application areas, advanced AI methods, data representation, and the development of new infrastructures for the successful adoption of AI-based cybersecurity in today's era of digital transformation and polycrisis.
引用
收藏
页数:29
相关论文
共 246 条
[1]  
Abdulhammed R, 2018, INT WIREL COMMUN, P524, DOI 10.1109/IWCMC.2018.8450479
[2]   A Scalable Role Mining Approach for Large Organizations [J].
Abolfathi, Masoumeh ;
Jafarian, Haadi ;
Raghebi, Zohreh ;
Banaei-Kashani, Farnoush .
PROCEEDINGS OF THE 2021 ACM WORKSHOP ON SECURITY AND PRIVACY ANALYTICS, IWSPA 2021, 2021, :45-54
[3]   From logs to Stories: Human-Centred Data Mining for Cyber Threat Intelligence [J].
Afzaliseresht, Neda ;
Miao, Yuan ;
Michalska, Sandra ;
Liu, Qing ;
Wang, Hua .
IEEE ACCESS, 2020, 8 :19089-19099
[4]   DAHID: Domain Adaptive Host-based Intrusion Detection [J].
Ajayi, Oluwagbemiga ;
Gangopadhyay, Aryya .
PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, :467-472
[5]  
Aksoy A, 2019, IEEE ICC
[6]  
Al Najada H, 2018, 2018 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI), P631, DOI 10.1109/SSCI.2018.8628685
[7]  
Al-hadhrami Nasser, 2020, SIN 2020: Proceedings of the 13th International Conference on Security of Information and Networks, DOI 10.1145/3433174.3433175
[8]   An Efficient Intrusion Detection Model for Edge System in Brownfield Industrial Internet of Things [J].
AL-Hawawreh, Muna ;
Sitnikova, Elena ;
den Hartog, Frank .
3RD INTERNATIONAL CONFERENCE ON BIG DATA AND INTERNET OF THINGS (BDIOT 2019), 2018, :83-87
[9]   BiSAL - A bilingual sentiment analysis lexicon to analyze Dark Web forums for cyber security [J].
Al-Rowaily, Khalid ;
Abulaish, Muhammad ;
Haldar, Nur Al-Hasan ;
Al-Rubaian, Majed .
DIGITAL INVESTIGATION, 2015, 14 :53-62
[10]   An Insider Data Leakage Detection Using One-Hot Encoding, Synthetic Minority Oversampling and Machine Learning Techniques [J].
Al-Shehari, Taher ;
Alsowail, Rakan A. .
ENTROPY, 2021, 23 (10)