Research Article

The Role of Artificial Intelligence in Cybersecurity: Understanding the Dynamics, Impacts, and Remediations

Authors

  • Asere Gbenga Femi Centre for Cyberspace Studies, School of Postgraduate Studies, Nasarawa State University Keffi, Nigeria

    aseregbenga@gmail.com

  • Nuga Kehinde Adetayo Department of Statistics, Federal School of Statistics, Manchok, Kaduna State, Nigeria
  • Madu Medugu Department of Statistics, Federal School of Statistics, Manchok, Kaduna State, Nigeria

Abstract

This study explores the transformative role of Artificial Intelligence (AI) in enhancing cybersecurity measures. The integration of AI into cybersecurity frameworks offers significant advancements in threat detection, prevention, and response. Leveraging machine learning algorithms and sophisticated data analytics, AI systems can analyze large datasets in real-time to identify patterns and anomalies that indicate potential security threats. This capability allows for the early detection of cyber threats that traditional security measures might miss. AI also improves threat intelligence by learning from new data and evolving attack methodologies, enhancing predictive accuracy. The research highlights how AI-driven automation can expedite incident response, thereby reducing the damage and costs associated with security breaches. Additionally, AI strengthens authentication processes through behavioral biometrics and anomaly detection, offering robust protection against identity theft and fraud. However, the study also addresses the challenges posed by AI in cybersecurity, including the potential for adversaries to use AI for developing sophisticated attacks and the ethical concerns surrounding AI algorithms’ biases and transparency. The research argues for a balanced approach that maximizes AI’s benefits while mitigating its risks. Ensuring transparency, accountability, and continuous improvement of AI models is critical for maintaining trust and efficacy in AI-powered cybersecurity solutions. This research concludes that while AI significantly enhances cybersecurity capabilities, addressing its inherent challenges is essential for its successful and ethical application in the cybersecurity domain.

Keywords:

Artificial Intelligence Cybersecurity Data Loss Protection Machine Learning

Article information

Journal

Journal of Computer, Software, and Program

Volume (Issue)

2(1), (2025)

Pages

1-9

Published

02-02-2025

How to Cite

Asere, G. F., Nuga, K. A., & Medugu, M. (2025). The Role of Artificial Intelligence in Cybersecurity: Understanding the Dynamics, Impacts, and Remediations. Journal of Computer, Software, and Program, 2(1), 1-9. https://doi.org/10.69739/jcsp.v2i1.120

References

Abbott, R. (2016). I think, therefore I invent: Creative computers and the future of patent law. Boston College Law Review, 57(4), 1079-1126.

Ahmed, M., Hu, J., & Yu, S. (2020). A survey of machine learning for cybersecurity in IoT. IEEE Access, 8, 89771-89783. https://doi.org/10.1109/ACCESS.2020.2995865

Alzain, M. A., & Soh, B. (2019). Machine learning for data classification and management in cloud computing: A review. Computers & Security, 87, 101605. https://doi.org/10.1016/j.cose.2019.101605

Berman, D. S., Buczak, A. L., Chavis, J. T., & Corbett, C. L. (2019). A survey of deep learning methods for cyber security. Information, 10(4), 122. https://doi.org/10.3390/info10040122

Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cybersecurity intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153-1176. https://doi.org/10.1109/COMST.2015.2494502

Casey, B., Farhangi, A., & Vogl, R. (2019). Rethinking explainable machines: The GDPR’s “right to explanation” debate and the rise of algorithmic audits in enterprise. Berkeley Technology Law Journal, 34(1), 143-188. https://doi.org/10.15779/Z38M32N986

Cisco. (2022). How AI is transforming cybersecurity. Cisco White Paper. Retrieved from https://www.cisco.com/c/en/us/products/security/white-paper-c11-741469.html

Gartner. (2023). Challenges of AI in cybersecurity. Gartner.

Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences, 80(5), 973-993. https://doi.org/10.1016/j.jcss.2014.02.005

Kruse, C. S., Frederick, B., Jacobson, T., & Monticone, D. K. (2017). Cybersecurity in healthcare: A systematic review of modern threats and trends. Technology and Health Care, 25(1), 1-10. https://doi.org/10.3233/THC-161263

Lepri, B., Oliver, N., Letouzé, E., Pentland, A. S., & Vinck, P. (2018). Fair, transparent, and accountable algorithmic decision-making processes. Philosophy & Technology, 31(4), 611-627. https://doi.org/10.1007/s13347-017-0279-x

Mittelstadt, B. D., Allo, P., Taddeo, M., Wachter, S., & Floridi, L. (2016). The ethics of algorithms: Mapping the debate. Big Data & Society, 3(2), 1-21. https://doi.org/10.1177/2053951716679679

Pfahringer, B., & Reutemann, P. (2021). Machine learning for automated cybersecurity incident response. ACM Computing Surveys, 54(7), 1-35. https://doi.org/10.1145/3451026

PwC. (2017). Global State of Information Security Survey 2017. Pricewaterhouse Coopers. https://www.pwc.com/gx/en/issues/cybersecurity/information-security-survey.html

Sokolov, A., & Gavrilov, I. (2020). Machine learning in cybersecurity: A survey. Journal of Cybersecurity Technology, 4(1), 1-20. https://doi.org/10.1080/23742917.2020.1727735

Voigt, P., & Von dem Bussche, A. (2017). The eu general data protection regulation (gdpr). A Practical Guide, 1st Ed., Cham: Springer International Publishing, 10(3152676), 10-5555. https://doi.org/10.1007/978-3-319-57959-7

Downloads

Views

26

Downloads

2