AI in Cybersecurity: A Literature review
- Version
- Download 15
- File Size 265.22 KB
- File Count 1
- Create Date 7 May 2025
- Last Updated 7 May 2025
AI in Cybersecurity: A Literature review
Authors:
Dr. Neha Yadav1, Arooj Naimuddin Khan2, Ayesha Naimuddin Khan3, Diya Pratap4
1 Department of Artificial Intelligence & Machine Learning, Dr. Akhilesh Das Gupta Institute of Professional Studies
2 Department of Artificial Intelligence & Machine Learning, Dr. Akhilesh Das Gupta Institute of Professional Studies
3 Department of Artificial Intelligence & Machine Learning, Dr. Akhilesh Das Gupta Institute of Professional Studies
4 Department of Artificial Intelligence & Machine Learning, Dr. Akhilesh Das Gupta Institute of Professional Studies
Abstract - In cybersecurity, artificial intelligence is revolutionizing incident response, risk management, and threat identification in a progressively hostile cyber threat landscape. This research presents a thorough literature review on AI in cybersecurity, focusing on both aspects of the balance sheet. This paper discusses how AI-driven technologies like machine learning, deep learning, natural language processing, and expert systems improve security frameworks through predictive analytics, real-time threat intelligence, and anomaly detection. The research explores various uses of AI such as network protection, cloud safety, healthcare, and finance, highlighting how AI-driven solutions enhance the resilience of cybersecurity against attacks. Nonetheless, there are drawbacks too, primarily associated with algorithmic prejudices and aggressive attacks. This paper discusses AI cybersecurity tools like Cylance, Darktrace, and IBM Watson, analyzing their influences and effects on security operations. The study also explores recent advancements and enhancements in AI-driven cybersecurity, ethical concerns, and regulatory structures. To establish a safe digital space, this document highlights the importance of a unified strategy that integrates AI with human expertise, ethics, and regulatory adherence.
Key Words: Artificial Intelligence, Machine Learning, Deep Learning, Expert Systems, Natural Language Processing, Threat Detection, AI-driven Threat Intelligence, Dynamic Threats, Cyber Attack, Cyber Security.
Download