Opportunities and Challenges in AI-Driven Cybersecurity: A Systematic Literature
Downloads
Background. The need for more sophisticated security strategies has become apparent as the number of cyber threats grows. AI is one framework that has been shown to boost security by providing advanced threat detection and response capabilities. Nonetheless, AI integration introduces inherently ethical and privacy-related concerns.
Purpose. This research examines the AI implementation factors influencing the overall performance of the AI for cybersecurity and data privacy in both critical infrastructures and financial services.
Method. This research derives its data from the extensive literature published from 2019 to 2024 in notable databases such as IEEE, Science Direct, MDPI, and Wiley Library, with more than 300 records. This analysis examined, with the help of artificial intelligence tools, the patterns and recurrent problems about the place of AI in cybersecurity, setting sights on the present challenges in the domains of intrusion detection and mitigation.
Results. The results indicate that better threat detection in industry is enabled by AI. However, disadvantages of bias, the need for privacy, and suboptimal data management are evident, necessitating the need for stronger machine and human-readable regulations.
Conclusion. Although AI strengthens security in an age of cyber-insecurity, its shortcomings point to the need for further development. Post-quantitative encryption palliatives and integration models will be effectively handled as cybersecurity-harming threats evolve.
A. Abidullah, K. R. Rahmani, W. M. Wadeed, and M. Hakimi, "Data Transfer Security in IoT Communication Based on Attribute-Based Cryptography," Int. J. Software Eng. Comput. Sci. (IJSECS), vol. 4, no. 2, pp. 553–565, 2024. [Online]. Available: https://doi.org/10.35870/ijsecs.v4i2.2887
A. K. R. ReddyAyyadapu, "Optimizing incident response in cloud security with AI and big data integration," Chelonian Research Foundation, vol. 18, no. 2, pp. 2212-2225, 2023. [Online]. Available: https://www.acgpublishing.com/index.php/CCB/article/view/195
A. Luqman, R. Mahesh, and A. Chattopadhyay, "Privacy and security implications of cloud-based AI services: A survey," arXiv preprint arXiv:2402.00896, 2024. Available: https://doi.org/10.48550/arXiv.2402.00896
A. Nayak, A. Patnaik, I. Satpathy, and B. C. M. Patnaik, "Data storage and transmission security in the cloud: The artificial intelligence (AI) edge," in Improving Security, Privacy, and Trust in Cloud Computing, A. O. Montoya Benitez et al., Eds., IGI Global, 2024, pp. 194-212, [Online]. Available: https://www.igi-global.com/chapter/data-storage-and-transmission-security-in-the-cloud/338355
A. R. P. Reddy and A. K. R. Ayyadapu, "Securing multi-cloud environments with AI and machine learning techniques," Chelonian Research Foundation, vol. 16, no. 2, pp. 01-12, 2021. [Online]. Available: https://www.acgpublishing.com/index.php/CCB/article/view/296
B. J. Ospina Cifuentes et al., "Analysis of the use of artificial intelligence in software-defined intelligent networks: A survey," Technologies, vol. 12, no. 7, p. 99, Jul. 2024, https://doi.org/10.3390/technologies12070099.
C. P. Filho et al., "A systematic literature review on distributed machine learning in edge computing," Sensors, vol. 22, no. 7, p. 2665, Apr. 2022, https://doi.org/10.3390/s22072665.
D. Ressi, R. Romanello, C. Piazza, and S. Rossi, "AI-enhanced blockchain technology: A review of advancements and opportunities," Journal of Network and Computer Applications, p. 103858, 2024 https://doi.org/10.1016/j.jnca.2024.103858.
D. Stutz et al., "Enhancing security in cloud computing using artificial intelligence (AI)," in Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection, 2024, pp. 179-220, https://doi.org/10.1002/9781394196470.ch11.
H. Gu, L. Zhao, Z. Han, G. Zheng, and S. Song, "AI-enhanced cloud-edge-terminal collaborative network: Survey, applications, and future directions," IEEE Communications Surveys & Tutorials, 2023, https://doi.org/10.1109/COMST.2023.3338153.
Haddaway, N. R., Page, M. J., Pritchard, C. C., & McGuinness, L. A. (2022). PRISMA2020: An R package and Shiny app for producing PRISMA 2020-compliant flow diagrams, with interactivity for optimised digital transparency and Open Synthesis Campbell Systematic Reviews, 18, e1230. https://doi.org/10.1002/cl2.1230
I. Jada and T. O. Mayayise, "The impact of artificial intelligence on organisational cyber security: An outcome of a systematic literature review," Data and Information Management, p. 100063, 2023, https://doi.org/10.1016/j.dim.2023.100063.
J. L. Kreinbrink, "Analysis of artificial intelligence (AI) enhanced technologies in support of cyber defense: Advantages, challenges, and considerations for future deployment," Master’s thesis, Utica College, 2019. [Online]. Available: https://www.proquest.com/openview/2ca10115b5be484fc619b2534e01ace0/1?pq-origsite=gscholar&cbl=18750&diss=y
K. Vignesh Saravanan, P. Jothi Thilaga, S. Kavipriya, and K. Vijayalakshmi, "Data protection and security enhancement in cyber-physical systems using AI and blockchain," in AI Models for Blockchain-Based Intelligent Networks in IoT Systems: Concepts, Methodologies, Tools, and Applications, G. Ludke et al., Eds., Springer International Publishing, 2023, pp. 285-325, https://doi.org/10.1007/978-3-031-31952-5_13.
L. Alevizos and M. Dekker, "Towards an AI-enhanced cyber threat intelligence processing pipeline," Electronics, vol. 13, no. 11, p. 2021, Nov. 2024, https://doi.org/10.3390/electronics13112021.
M. Abdullahi, Y. Baashar, H. Alhussian, A. Alwadain, N. Aziz, L. F. Capretz, and S. J. Abdulkadir, "Detecting cybersecurity attacks in Internet of Things using artificial intelligence methods: A systematic literature review," Electronics, vol. 11, no. 2, p. 198, Feb. 2022, https://doi.org/10.3390/electronics11020198.
M. Abouelyazid and C. Xiang, "Architectures for AI integration in next-generation cloud infrastructure, development, security, and management," International Journal of Information and Cybersecurity, vol. 3, no. 1, pp. 1-19, 2019. [Online]. Available: https://publications.dlpress.org/index.php/ijic/article/view/92
M. Golec, S. S. Ponugoti, and S. S. Gill, "Enhancing data security for cloud service providers using AI," in Applications of AI for Interdisciplinary Research, C. P. Filho et al., Eds., CRC Press, 2024, pp. 187-204, https://doi.org/10.1515/9783110732573.
M. R. Faraji, F. Shikder, M. H. Hasan, M. M. Islam, and U. K. Akter, "Examining the role of artificial intelligence in cyber security (CS): A systematic review for preventing prospective solutions in financial transactions," International Journal, vol. 5, no. 10, pp. 4766-4782, 2024, https://doi.org/10.61707/7rfyma13.
M. Hakimi, G. A. Amiri, S. Jalalzai, F. A. Darmel, and Z. Ezam, "Exploring the Integration of AI and Cloud Computing: Navigating Opportunities and Overcoming Challenges," TIERS, vol. 5, no. 1, pp. 57-69, Jun. 2024. [Online]. Available: https://journal.undiknas.ac.id/index.php/tiers/article/view/5496
M. R. Roshanaei, M. R. Khan, and N. N. Sylvester, "Enhancing cybersecurity through AI and ML: Strategies, challenges, and future directions," Journal of Information Security, vol. 15, no. 3, pp. 320-339, 2024, https://doi.org/10.4236/jis.2024.153019.
M. E. Ebadi, W. Yu, K. R. Rahmani, and M. Hakimi, "Resource Allocation in the Cloud Environment with Supervised Machine Learning for Effective Data Transmission," J. Comput. Sci. Technol. Stud., vol. 6, no. 3, pp. 22–34, 2024. [Online]. Available: https://doi.org/10.32996/jcsts.2024.6.3.3
P. Thapa and T. Arjunan, "AI-enhanced cybersecurity: Machine learning for anomaly detection in cloud computing," Quarterly Journal of Emerging Technologies and Innovations, vol. 9, no. 1, pp. 25–37, 2024. [Online]. Available: https://vectoral.org/index.php/QJETI/article/view/64
R. Kaur, D. Gabrijel?i?, and T. Klobu?ar, "Artificial intelligence for cybersecurity: Literature review and future research directions," Information Fusion, vol. 97, p. 101804, 2023, https://doi.org/10.1016/j.inffus.2023.101804.
S. N. Mohanty, S. Potluri, V. B. Prakash, B. Srinath, and B. Manjunath, "Cloud security concepts, threats and solutions: Artificial intelligence based approach," in Cloud Security: Techniques and Applications, vol. 1, p. 1, 2021, https://doi.org/10.1515/9783110732573.
S. S. Gill, M. Xu, C. Ottaviani, P. Patros, R. Bahsoon, A. Shaghaghi, and S. Uhlig, "AI for next generation computing: Emerging trends and future directions," Internet of Things, vol. 19, p. 100514, 2022, https://doi.org/10.1016/j.iot.2022.100514.
T. de Oliveira Ribeiro et al., "Virtual reality solutions employing artificial intelligence methods: A systematic literature review," ACM Computing Surveys, vol. 55, no. 10, pp. 1-29, 2023, https://doi.org/10.1145/3565020
T. K. Vashishth, V. Sharma, K. K. Sharma, B. Kumar, S. Chaudhary, and R. Panwar, "Enhancing cloud security: The role of artificial intelligence and machine learning," in Improving Security, Privacy, and Trust in Cloud Computing, IGI Global, 2024, pp. 85-112, [Online]. Available: https://www.igi-global.com/chapter/enhancing-cloud-security/338350
Copyright (c) 2024 Shahwali Shahidi, Farid Ahmad Darmel, Safiullah Jalalzai, Ghulam Ali Amiri

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.