Current trends in AI and ML for cybersecurity: A state-of-the-art survey

被引:21
作者
Mohamed, Nachaat [1 ]
机构
[1] Rabdan Acad, Homeland Secur Dept, Abu Dhabi, U Arab Emirates
关键词
AI; ML; cybersecurity; intrusion detection; malware detection; network security; ARTIFICIAL-INTELLIGENCE; ATTACK DETECTION; BIG DATA; SYSTEM; DEEP;
D O I
10.1080/23311916.2023.2272358
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This paper provides a comprehensive survey of the state-of-the-art use of Artificial Intelligence (AI) and Machine Learning (ML) in the field of cybersecurity. The paper illuminates key applications of AI and ML in cybersecurity, while also addressing existing challenges and posing unresolved questions for future research. The paper also emphasizes the ethical and legal implications associated with their implementation. The researchers conducted a thorough survey by reviewing numerous papers and articles from respected sources such as IEEE, ACM, and Springer. Their focus centered on the latest AI and ML breakthroughs in cybersecurity, while also exploring current challenges and open research questions. The results indicate that integrating AI and ML into cybersecurity systems shows great potential for future research and development. Intrusion detection and response, malware detection, and network security are among the most promising applications identified. According to the survey, 45% of organizations have already implemented AI and ML in their cybersecurity systems, while an additional 35% plan to do so. However, 20% of organizations believe that it is not yet the right time for adopting these technologies. Overall, this paper serves as a reliable reference for researchers and practitioners in the field of cybersecurity, offering a comprehensive overview of the use of AI and ML. It not only highlights the potential applications but also addresses the challenges and research gaps. Additionally, the paper raises awareness about the ethical and legal considerations associated with leveraging AI and ML in the cybersecurity domain.
引用
收藏
页数:30
相关论文
共 81 条
[1]   Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review [J].
Abdullahi, Mujaheed ;
Baashar, Yahia ;
Alhussian, Hitham ;
Alwadain, Ayed ;
Aziz, Norshakirah ;
Capretz, Luiz Fernando ;
Abdulkadir, Said Jadid .
ELECTRONICS, 2022, 11 (02)
[2]   State-of-the-art in artificial neural network applications: A survey [J].
Abiodun, Oludare Isaac ;
Jantan, Aman ;
Omolara, Abiodun Esther ;
Dada, Kemi Victoria ;
Mohamed, Nachaat AbdElatif ;
Arshad, Humaira .
HELIYON, 2018, 4 (11)
[3]   Ensemble Machine Learning Techniques for Accurate and Efficient Detection of Botnet Attacks in Connected Computers [J].
Afrifa, Stephen ;
Varadarajan, Vijayakumar ;
Appiahene, Peter ;
Zhang, Tao ;
Domfeh, Emmanuel Adjei .
ENG, 2023, 4 (01) :650-664
[4]   Electrocardiogram (ECG)-Based User Authentication Using Deep Learning Algorithms [J].
Agrawal, Vibhav ;
Hazratifard, Mehdi ;
Elmiligi, Haytham ;
Gebali, Fayez .
DIAGNOSTICS, 2023, 13 (03)
[5]  
Al Ahdal Ahmed, 2023, J Healthc Eng, V2023, P9738123, DOI 10.1155/2023/9738123
[6]   Cyber-Security Threats and Side-Channel Attacks for Digital Agriculture [J].
Alahmadi, Adel N. ;
Rehman, Saeed Ur ;
Alhazmi, Husain S. ;
Glynn, David G. ;
Shoaib, Hatoon ;
Sole, Patrick .
SENSORS, 2022, 22 (09)
[7]   A Secure Internet of Medical Things Framework for Breast Cancer Detection in Sustainable Smart Cities [J].
Aldhyani, Theyazn H. H. ;
Khan, Mohammad Ayoub ;
Almaiah, Mohammed Amin ;
Alnazzawi, Noha ;
Al Hwaitat, Ahmad K. ;
Elhag, Ahmed ;
Shehab, Rami Taha ;
Alshebami, Ali Saleh .
ELECTRONICS, 2023, 12 (04)
[8]   Cyber Security for Detecting Distributed Denial of Service Attacks in Agriculture 4.0: Deep Learning Model [J].
Aldhyani, Theyazn H. H. ;
Alkahtani, Hasan .
MATHEMATICS, 2023, 11 (01)
[9]   A Comprehensive Review of Scab Disease Detection on Rosaceae Family Fruits via UAV Imagery [J].
Ali, Zain Anwar ;
Yang, Chenguang ;
Israr, Amber ;
Zhu, Quanmin .
DRONES, 2023, 7 (02)
[10]   The State of IoT Security: Unequivocal Appeal to Cybercriminals, Onerous to Defenders [J].
Alsheikh, Mohammed ;
Konieczny, Liam ;
Prater, Michael ;
Smith, Gabe ;
Uludag, Suleyman .
IEEE CONSUMER ELECTRONICS MAGAZINE, 2022, 11 (03) :59-68