Empowering Cybersecurity: A Deep Dive into AI-Driven Security Intelligence Modelling

Rachit Garg*, Jayanthila Devi**
*-** Srinivas University, Karnataka, India.
Periodicity:October - December'2023
DOI : https://doi.org/10.26634/jit.12.4.20363

Abstract

The term "cyber security" refers to the process of protecting computer networks from malicious online attacks or unauthorized access. Cyber security solutions are essential for organisations, enterprises, and governments due to the pervasive danger posed by cyber criminals. AI has immense potential as a viable solution for addressing this issue. By using the capabilities of artificial intelligence, security specialists can enhance their ability to protect susceptible networks and data from cyber assailants. This article provides an overview of the use of AI in the field of cyber security. AIdriven cyber security utilises AI and machine learning technology to enhance the safeguarding of computer systems and networks against cyber threats, including hacking, malware, phishing, and other types of assaults. AI-driven security solutions are specifically developed to automate the identification, examination, and handling of security breaches in real-time, thereby enhancing the efficiency and efficacy of cyber security. These systems provide the capability to process vast quantities of data, detect patterns and irregularities, and make prompt and precise choices, beyond the abilities of people alone. This enables organisations to proactively address emerging cyber risks.

Keywords

Cyber Security, Artificial Intelligence, Cyber Defence, Cyber Criminals, Security Intelligence, Computer Networks.

How to Cite this Article?

Garg, R., and Devi, J. (2023). Empowering Cybersecurity: A Deep Dive into AI-Driven Security Intelligence Modelling. i-manager’s Journal on Information Technology, 12(4), 1-6. https://doi.org/10.26634/jit.12.4.20363

References

[2]. Aslam, M. (2024). AI and Cybersecurity: An Ever-Evolving Landscape. International Journal of Advanced Engineering Technologies and Innovations, 1(1), 52-71.
[5]. Barbara, D. (2001). ADAM: Detecting intrusions by data mining. In Proceedings 2001 IEEE Workshop Information Assurance and Security, June (pp. 5-6).
[12]. Pattnaik, O., Nayak, M., Pani, S., Kumar, R., & Sharma, B. (2024). Empowering Safety: A Deep Dive Into AI and Machine Learning Solutions for Women's Security. In AI Tools and Applications for Women's Safety (pp. 121-131). IGI Global.
[13]. Yaseen, A. (2023). AI-driven threat detection and response: A paradigm shift in cybersecurity. International Journal of Information and Cybersecurity, 7(12), 25-43.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.