Artificial Intelligence In Cyber Security

Main Article Content

P. S. Dandge
U. I. Dawre
R. F. Shirshikar

Abstract

As cyber threats continue to evolve in complexity and sophistication, the integration of artificial intelligence (AI) in cybersecurity has emerged as a critical frontier for enhancing threat detection, response, and mitigation strategies. This research paper provides a comprehensive examination of the current state of AI applications in cybersecurity, evaluating their strengths, weaknesses, and potential impact on the evolving threat landscape. The study employs a multidimensional methodology, incorporating a thorough literature review, case studies, interviews with cybersecurity experts, and analysis of real-world incidents

Downloads

Download data is not yet available.

Article Details

How to Cite
P. S. Dandge, U. I. Dawre, & R. F. Shirshikar. (2023). Artificial Intelligence In Cyber Security. Journal of Advanced Zoology, 44(S8), 69–72. https://doi.org/10.53555/jaz.v44iS8.3508
Section
Articles
Author Biographies

P. S. Dandge

Department of Information Technology ,Changu Kana Thakur Arts, Commerce and Science College New Panvel, Maharashtra 410206, India.

U. I. Dawre

Department of Information Technology , Changu Kana Thakur ACS College New Panvel, Maharashtra 410206, India.

R. F. Shirshikar

Department of Information Technology, Changu Kana Thakur ACS College New Panvel, Autonomous Maharashtra 410206, India.

References

J. Nogueira, "Mobile Intelligent Agents to Fight Cyber Intrusions", The International Journal of FORENSIC COMPUTER SCIENCE, vol. 1, pp. 28-32, 2006

S. Adebukola, Onashoga, Akinwale O. Bamidele and A. Taofik, "A Simulated Multiagent- Based Architecture for Intrusion Detection System", (IJARAI) International Journal of Advanced Research in Artificial Intelligence, vol. 2, no. 4, 2013

S. Dilek, H. Çakır and M. Aydın,"APPLICATIONS OF ARTIFICIAL INTELLIGENCE TECHNIQUES TO COMBATING CYBER CRIMES: A REVIEW", International Journal of Artificial Intelligence & Applications (IJAIA), vol. 6, no. 1, 2015

J.Raiyn, "A survey of Cyber Attack Detection Strategies", International Journal of Security and Its Applications, vol. 8, no. 1, pp. 247-256, 2014

Cerli and D. Ramamoorthy, "Intrusion Detection System by Combining Fuzzy Logic with Genetic Algorithm", Global Journal of Pure and Applied Mathematics (GJPAM), vol. 11, no. 1, 2015

O. Oriola, A. Adeyemo and A. Robert, "Distributed Intrusion Detection System Using P2P Agent Mining Scheme", African Journal of Computing & ICT, vol. 5, no. 2, 2012

S. Simmons, D. Edwards, N. Wilde, J. Just and M. Satyanarayana, "Preventing Unauthorized Islanding: Cyber-Threat Analysis", 2006 IEEE/SMC International Conference on System of Systems Engineering, pp. 5, 24-26

Ionita and L. Ionita, "An agent-based approach for building an intrusion detection system",RoEduNet International Conference 12th Edition: Networking in Education and Research, pp. 1-6, 26-28, 2013

Similar Articles

1 2 > >> 

You may also start an advanced similarity search for this article.