Cyber Security Threat and Its Prevention
Cyber Security Threat and Its Prevention
Cyber Security Threat and Its Prevention
net/publication/376717717
CITATIONS READS
13 3,300
2 authors, including:
Bhuman Vyas
CreditAccetance
15 PUBLICATIONS 173 CITATIONS
SEE PROFILE
All content following this page was uploaded by Bhuman Vyas on 21 December 2023.
Abstract
Over the last decade, cyber threats have become a challenge for the proficient. Current security systems
need more advancement to deal with exceptionally trained cybercriminals. Implementing Artificial
Intelligence (AI) techniques helps detect scams but may bring other risks.
This research paper focuses on the intersection between cyber security threats and their forestallment using
Artificial Intelligence (AI) technologies. It briefly outlines Artificial Intelligence (AI) applications for
several cybersecurity crimes and estimates the probability of expanding cybersecurity by conservation of
the defense mechanisms. The innovation of Artificial Intelligence has unlocked new room for the world’s
future. The methods to secure data have influenced the growth of Artificial Intelligence (AI) in
cybersecurity.
The paper aims to establish awareness regarding the benefits of Artificial Intelligence (AI) technology and
its assistance in protecting on a larger scale, i.e., in an organization or a business. The statistics mentioned
in the paper are taken from valid sources and proved to favor the study. The study’s implications can be
used to promote the significance of Artificial intelligence (AI) in revolutionizing cyber security.
Keywords: Artificial Intelligence (AI), cyber security, cybercrimes, protection, revolutionizing, etc.
Introduction
A cyber security threat refers to malicious activities carried out by individuals with harmful intentions,
aiming to cause disruption, damage, and chaos in cyberspace. Cybersecurity, on the other hand,
encompasses the proactive actions taken to secure the vast realm of cyberspace, which includes
information, data, and software, from all potential threats. As technology continues to advance,
cybercriminals have become more creative and adept at evading traditional security measures. They
constantly stay ahead of the game, making it increasingly challenging for individuals and organizations to
effectively protect themselves from cyber threats.
In the modern era, the rise of cybercrimes poses significant risks and challenges that demand our
immediate attention. Orthodox cybersecurity solutions have become insufficient at sensing and mitigating
emergency cyberattacks. Developments in cryptographic and Artificial Intelligence (AI) techniques (in
particular, machine learning) show potential in enabling cybersecurity specialists to counter the ever-
evolving danger modeled by adversaries.
The accessibility of advanced technologies on the internet has surely revolutionized our lives. But it has
also opened up new avenues for criminals to engage in acts of vandalism and commit various other crimes.
This has led to a serious increase in cybersecurity threats, and this requires unconventional and innovative
solutions to maintain our safety and privacy.
In the 21st century, humans have made multiple revolutions in the field of cybersecurity to safeguard
systems and networks from unforeseen threats. However, it is becoming increasingly evident that relying
solely on human efforts has its limitations. No matter how sophisticated the security measures are, there
will always be vulnerabilities that cybercriminals can exploit.
This paper intends to compare diverse approaches of artificial intelligence for fighting misconduct in
cyberspace, or rather their application in systems for detecting and averting intrusions.
According to a statistics report, a 63% increase in cyber crimes was noticed in 2016, which showed a
major rise compared to the previous year (Fig. 1). However, each year, a different threat demands unique
solutions. As soon as the attackers access the system, they move laterally in search of high-profile targets
from which they can ultimately exfiltrate intellectual property and data.
To address this pressing issue, it is imperative to incorporate cutting-edge technologies and strategies into
our cybersecurity arsenal. One of the most remarkable innovations in recent years is the advent of Artificial
Intelligence (AI). AI offers a promising solution for analyzing massive amounts of data and identifying
potential threats in real-time. By leveraging AI techniques and knowledge-intensive tools, we can
significantly enhance our ability to detect, prevent, and respond to cyber-attacks.
With the stride in cyber-attacks, the human factor is not satisfactory for timely action. Intelligent agents
carry out most system attacks, such as computer viruses and worms. Intelligent agents are autonomous
computer-generated forces that can make conclusions or complete a service based on their environment,
user input, and experiences (Fig. 2).
The integration of AI into cybersecurity practices not only improves protection but also enables efficient
crisis management and response to network attacks. AI-powered systems can continually learn and adapt
to emerging threats, ensuring that security measures remain effective even in the face of evolving
cybercrime tactics. However, it is crucial to acknowledge that systems solely reliant on static algorithms
may encounter challenges as new encounters emerge daily in the ever-evolving cyberspace.
Background
The idea to create a system beyond the horizons of human minds has been the goal for yesteryears. This
idea has long been in action, chased by the most brilliant minds – researchers and innovators. Though
there is always room for improvement, it looks like we have finally achieved it. However, it still requires
protection and security from viruses that may corrupt it and the humans who may abuse it.
The need for a defensive system for technology became apparent when the first computer virus, known as
the ‘Creeper Virus,’ was created in 1971 by Bob Thomas, widely recognized as the ‘Father of Cyber
Security.’ The intention behind the virus was not to cause harm or adverse impact on the computers but
rather to identify vulnerabilities in computer programs.
The invention of computers has signified the use of Artificial Intelligence (AI) to deal with all queries.
Algorithms have been developed and advanced with the generation of computers. It is a fact that countries
compete to get the best Artificial Intelligence (AI) technology for the improvement of their systems.
The term ‘Artificial intelligence’ was first invented by John McCarthy in 1956 as he held the first academic
conference. The idea behind Artificial Intelligence (AI) was to design a machine that depicts human
knowledge and expressions magnificently. This machine is a device or software that easily predicts the
outcome and improves the accuracy of threat detection and response.
The primary purpose of integrating Artificial Intelligence (AI) technology is to identify all the threats that
are not conceivable to human analysts. This can significantly reduce the number of cybercrimes and
increase the efficiency of cybersecurity operations.
intelligence measures from acting like a human through the Turing test (Fig. 3). It is a method to inquire
whether a computer is responding like a human. A computer communicating with a human is said to have
intelligence when the human cannot distinguish whether the responses come from a computer or a human.
Machine learning:
Conventionally, machine learning (ML) approaches can be classified into two groups: supervised and
unsupervised learning. Supervised machine learning studies the relationship between labeled input and
output training data. The samples are labeled according to their class (e.g., malicious or legitimate). In
unsupervised machine learning, no data labeling or training is required. The nomenclature perspectives
are converging, making it less essential to define machine learning algorithms based on whether they are
supervised or unsupervised(Fig. 5).
Decision Tree:
A decision tree is a non-parametric supervised learning algorithm to create rules from training data
samples. It has a hierarchical tree-like structure categorizes the data samples into many divisions. The
figure below depicts a decision tree that starts with the root node(Fig. 6). The root nodes branch into
decision nodes. Based on the existing features, both node types conduct evaluations to form similar subsets
denoted by leaf nodes. The leaf nodes signify all the probable conclusions within the dataset.
1) Phishing Attacks:
Phishing is a tactic of manipulating or deceiving a person to steal personal data like login credentials and
credit card numbers(Fig. 9). The hacker impersonates a reliable entity and compels the person to access a
malevolent email or text. As soon as it opens, the hackers get access to all the systems that reveal
confidential information, leading to fraud and forgery.
This considerable problem was solved by the invention of Artificial Intelligence (AI) as the leading
company, Darktrace, came up with the solution to the problem. Artificial Intelligence (AI) helps to
identify all the links and attachments that might cause jeopardy in the business. The Antigena solution is
highly developed to recognize all phishing attacks.
2) DNS Poisoning:
It is a highly misleading cyberattack where the culprits move the web traffic towards illegitimate websites
instead of the intended one (Fig. 10). The user is usually unaware and often shares personal information
that causes a problem.
This is a critical problem businesses face as there are more than 30,000 DNS poisoning attacks every day,
and 70% of all cyber-attacks include the DNS layer. To deal with the problem, DNS filters offer AI-
powered DNS security. This filter helps to block fake and inappropriate websites.
DNS filtering is considered to provide edge-layer protection from all the security threats.
FIGURE 12. Deep Fake Detection using CNN and LSTM stage
8) Malware attacks:
This is one of the challenging difficulties that businesses often have to encounter. Introducing malware
into a system can happen through numerous methods, including email attachments, malicious websites,
or infected ones. Malware can decelerate computer performance by consuming system resources.
Symantec’s 2016 threat report specifies that 78% of websites contain a critical vulnerability that, if
exploited, may allow malicious code to be run without user interaction.
To keep up a website’s defenses, proper security controls such as web proxies, firewalls, and intrusion
detection systems must be maintained. Malware protection and recognition can be strengthened without
discouragingly impacting business output by using antiviral tools that can help against unforeseen viruses
and worms(Fig. 16). The endpoint detection and response technology constantly looks out for any malware
attacks and helps to provide protection. It is important to backup data regularly and repeatedly from
endpoints and servers to allow for effective disaster recovery.
9) Password attacks:
Password attacks object to gain unofficial access to sensitive data and systems by compromising user
passwords. The applications that use passwords as the only authentication factor are on the verge of
password attacks because of the vulnerability.
The invader uses various methods to expose the credentials of a legitimate user, assuming their identity
and privileges. The username-password combination is one of the oldest authentication techniques, so
several approaches exist to obtain guessable passwords.
In a Brute force attack approach, the attackers use every possible password until the real one is found(Fig.
17). Usually, they start with the most generally used one that helps them to filter accounts in seconds. A
specialized brute-force option is a dictionary attack, which restricts candidate passwords to words from
the dictionary.
Another type is the keylogger, in which Hackers install software on a user’s computer to record the user’s
keystrokes as they type the password.
To prevent the damage from this attack, it is wise to enforce strong password policies that assure users
follow set criteria to prevent malicious actors from cracking their passwords. Other executions include the
One-Time Password (OTP), biometric authentication, software tokens, and behavioral analysis.
Results:
Artificial intelligence (AI) brings many benefits, but some risks come along. AI plays the role of a double-
edged sword. The incorporation of AI in an organization can be a source of threat. The vulnerabilities in a
system can be a potential threat to the system and a positive target for hackers. This is very common for
regular users to be unaware of the system’s security patches, which often leads to cyber-attacks and
vulnerabilities for businesses.
Establishing regulations to reduce the widespread threat to cybersecurity is a complex task for
policymakers. With the extensive use of AI, it has become easily accessible to anybody. As resourceful
cybercriminals learn to use AI maliciously, they become a predominant threat. The easy availability of
books and software allows hackers to learn new techniques to disrupt cyber security.
With the rise in speed and sophistication of attacks, AI has become an indispensable technology in the
cybersecurity zone—the article emphasizes the increase in cyber threats and their complexities. We
highlighted future risks of cybercrimes with a brief overview of their solutions.
Lately, proposed AI-based cybersecurity explanations have largely focused on machine learning
techniques that use intelligent agents to differentiate between attack traffic and legitimate traffic.
The statistics are not inclusive, but the purpose is to outline the cyber threat landscape.
During 2016, the level of attacks was quite similar to the last year. However, a peak was experienced in
the central months. Starting from September 2015, it registered a more steady activity until December,
when 2016 experienced a new tail of events (Fig. 18).
FIGURE 18. Graphic Representation showing comparative analysis in monthly attacks of (2016
vs. 2015 vs. 2014)
There has been an increase in connectivity worldwide over the last decade. It has become mandatory to
carry a device to stay linked all the time. The internet remains evolving in terms of the number of users,
its size, heterogeneity of devices, and the type of applications that are developed for the ease of mankind.
Today, similar to electricity, water, and gas, the Internet has become a significant utility in the daily lives
of people around the world. As more devices connect to the internet, it is susceptible to more attacks by
cybercriminals.
Artificial Intelligence (AI) is a technology that allows machines to duplicate human behavior smartly. On
the other hand, the Internet of Things (IoT) is referred to as a network of devices and sensors that are
connected to the internet. The growth of IoT devices over the past few years is illustrated in the graph
below(Fig. 19).
AI and IoT are the two sets of dynamic technologies that are changing quickly. These two technologies
are bringing transformation to the world of business. It has surely impacted consumer psychology, from
managing inventories to improving personalized shopping experiences. Both inventions have
revolutionized the way of dealing in the business. IoT analytics helps many companies improve the
performance and delivery of better outcomes.
FIGURE 19. Graphic representation showing an increase in IoT over the years
Although AI’s role in cracking cybersecurity issues continues to be inspected, some fundamental
apprehensions surround where AI deployment can become regulated. For example, as machines become
imperative solutions for humanity, these will consume fundamental resources for life increasingly. When
humans and machines strive for scarce resources, a new form of domination will propagate. This, in turn,
will provoke a new research avenue.
Conclusion
Modern problems require modern solutions. AI’s invention for humankind’s benefit has proven to be the
best discovery of the century. The advantages of Artificial Intelligence (AI) have shadowed the flaws that
come along from its misuse. The above articles prove that the scams offered by the attackers can only be
dealt with through Artificial Intelligence (AI). Artificial Intelligence (AI) software in cyber security helps
in early detection of problem that avoids later impairment.
The field of AI has vast options for researchers to explore. The Intrusion Detection and Prevention Systems
research proves that Machine Learning is a technique that brings constructive results. Applying Machine
Learning in IDPS systems reduces false positives and increases accuracy with the understanding to learn
new threats. This causes cybercriminals to hide their intentions when probing networks and sending
malware. Cybersecurity professionals need forceful policies to regulate AI in organizations so threats are
less imminent.
AI allows growing autonomous computing solutions using the methods of self-control and self-
configuration. Regarding the future of information security, AI is a promising area of research that focuses
on improving cyberspace security. AI has undergone noteworthy variations over the last decade, with
scientists progressing in the fight against cybercrime.
The recent development in Artificial Intelligence (AI) software helps detect online scams and frauds that
can be a breakthrough for many cyber security organizations. The excellence of Artificial Intelligence (AI)
in detecting threats and resolving them before human intervention has flabbergasted the world. Phishing
detection with Artificial Intelligence (AI) technology has incredibly provided a haven for humans.
Multiple Artificial Intelligence (AI) software has concealed the confidentiality of the user.
There is no doubt that cyber security threats are intimidating for any business. But with the developing
breaches in the organization, the human source alone can’t deal with it. Therefore, incorporating Artificial
Intelligence (AI) technology with human involvement in an organization is key to staying protected and
secure in a digital world.
With the help of Artificial Intelligence (AI) technology, organizations can probe cyber threats more hastily
and effectively. This will enhance the security of the systems by bringing new modifications each time per
the need.
References:
1. Anonymous. Father of Cybersecurity: Brief History, Contributions Explained [Internet]. Testbook.
2023. Available from: https://testbook.com/articles/father-of-
cybersecurity#:~:text=Bob%20Thomas%20is%20a%20computer
2. Smith C, McGuire B, Huang T, Yang G. The History of Artificial Intelligence [Internet]. University
of Washington; 2006 Dec. Available from:
https://courses.cs.washington.edu/courses/csep590/06au/projects/history-ai.pdf
3. Mackay J. The Benefits And Challenges Of AI In Cyber Security [Internet].
www.metacompliance.com. 2023. Available from: https://www.metacompliance.com/blog/data-
breaches/benefits-and-challenges-of-ai-in-cyber-security
4. Imperva. What is phishing | Attack techniques & scam examples | Imperva [Internet]. Imperva. 2023.
Available from: https://www.imperva.com/learn/application-security/phishing-attack-scam/
5. Gray C. Five ways AI can be used to prevent cyber attacks [Internet]. aimagazine.com. 2022. Available
from: https://aimagazine.com/ai-strategy/five-ways-ai-can-be-used-to-prevent-cyber-attacks
6. VanVliet S. What is DNS Poisoning? (aka DNS Spoofing) [Internet]. Keyfactor. 2021. Available from:
https://www.keyfactor.com/blog/what-is-dns-poisoning-and-dns-spoofing/
7. Balbix. Using Artificial Intelligence in Cybersecurity | Balbix [Internet]. Balbix. 2018. Available from:
https://www.balbix.com/insights/artificial-intelligence-in-cybersecurity/
8. Solinap M. Six Advantages Of Using SentinelOne [Internet]. SPK and Associates. 2022. Available
from: https://www.spkaa.com/blog/six-advantages-of-using-sentinelone
9. Britt K. How are deepfakes dangerous? [Internet]. University of Nevada, Reno. 2023. Available from:
https://www.unr.edu/nevada-today/news/2023/atp-
deepfakes#:~:text=Typically%2C%20deepfakes%20are%20used%20to
10. Anonymous. Stopping deepfake news with an AI algorithm that can tell when a face doesn’t fit
[Internet]. spie.org. 2020. Available from: https://spie.org/news/stopping-deepfake-news-with-an-ai-
algorithm-that-can-tell-when-a-face-doesnt-fit?SSO=1
11. Anonymous. AI in Cyber Security: Pros and Cons | Terranova Security [Internet].
terranovasecurity.com. 2023. Available from: https://terranovasecurity.com/blog/ai-in-cyber-security/
12. Anonymous. AI in Cybersecurity: Revolutionizing threat detection and defense | Data Science Dojo
[Internet]. datasciencedojo.com. Available from: https://datasciencedojo.com/blog/ai-in-
cybersecurity/
13. Calderon R. The Benefits of Artificial Intelligence in Cybersecurity [Internet]. 2019 Jan. Available
from: https://digitalcommons.lasalle.edu/cgi/viewcontent.cgi?article=1035&context=ecf_capstones
14. Das R. Artificial Intelligence in Cyber Security. https://iopscience.iop.org/article/10.1088/1742-
6596/1964/4/042072/pdf. 2021.
15. Ansari MF, Dash B, Sharma P, Yathiraju N. The Impact and Limitations of Artificial Intelligence in
Cybersecurity: A Literature Review [Internet]. papers.ssrn.com. Rochester, NY; 2022. Available from:
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4323317
16. Dakov Yoshinov R. Increasing the level of network and information security using artificial
intelligence. https://www.researchgate.net/profile/Georgi-
Tsochev/publication/323919777_Increasing_the_level_of_network_and_information_security_using
_artificial_intelligence/links/5c331bf5a6fdccd6b598b393/Increasing-the-level-of-network-and-
information-security-using-artificial-intelligence.pdf. 2017.
17. Sheridan K. Major Cyberattacks On Healthcare Grew 63% In 2016 [Internet]. www.darkreading.com.
2016 [cited 2023 Dec 11]. Available from: https://www.darkreading.com/attacks-breaches/major-
cyberattacks-on-healthcare-grew-63-in-2016
18. Zeadally S, Adi E, Baig Z, Khan I. Harnessing Artificial Intelligence Capabilities to Improve
Cybersecurity. IEEE Access. 2020;8:1–1. https://doi.org/10.1109/access.2020.2968045
19. Anderson I. The 12 Most Common Types of Cybersecurity Attacks Today [Internet].
https://blog.netwrix.com/. 2018. Available from: https://blog.netwrix.com/types-of-cyber-attacks
20. Anonymous. Top 5 Cyber Attack Types in 2016 So Far [Internet]. www.calyptix.com. 2016 [cited
2023 Dec 11]. Available from: https://www.calyptix.com/reports/top-5-cyber-attack-types-in-2016-
so-far/
21. Passeri P. 2016 Cyber Attacks Statistics [Internet]. HACKMAGEDDON. 2017. Available from:
https://www.hackmageddon.com/2017/01/19/2016-cyber-attacks-statistics/
22. Dilek S, Cakır H, Aydın M. Applications of Artificial Intelligence Techniques to Combating Cyber
Crimes: A Review. International Journal of Artificial Intelligence & Applications [Internet].