Iranian Journal of Information Processing and Management

Iranian Journal of Information Processing and Management

Exploring the Synergy between AI and Cybersecurity for Threat Detection

Document Type : Original Article

Authors
1 Al-Turath University, Baghdad 10013, Iraq
2 Al-Mansour University College, Baghdad 10067, Iraq
3 Osh State University, Osh City 723500, Kyrgyzstan
4 Al-Rafidain University College Baghdad 10064, Iraq
5 5Madenat Alelem University College, Baghdad 10006, Iraq
Abstract
ABSTRACT
Background: Security has been a major issue of discussion due to increase in the number and sophistication of Cyber threats in the modern era. Conventional approaches to threat identification might face difficulties in a number of things, namely the relevancy and the ability to process new and constantly evolving threats. Machine learning (ML) and deep learning (DL) based Approaches present AI as a potential solution to the problem of efficient threat detection.
 
Objective: The article aims to compare the RF, SVM, CNNs, and RNNs models’ performance, computational time, and resilience in identifying potential cyber threats, such as malware, phishing, and DoS attacks.
 
Methods: The proposed models were trained as well as evaluated on the NSL-KDD and CICIDS 2017 datasets. This was done based on common scheme indicators including accuracy, precision, recollection, F1 measure, detection rate of efficiency, AUC-ROC, False Alarm Rate (FAR), and the stability to adversaries. Rating of computational efficiency was defined by training time and memory consumption.
 
Results: The findings indicate that the CNNs gave the best accuracy (96%) and resisted perturbation better, and the RF showed good performance with little computational load. RNNs have been proved effective in sequential data analysis and SVM also performed fairly well on binary data classification although there is a problem of scalability.
 
Conclusion: CNNs used in AI models are the best solutions to protection from the threats in the cybersecurity space. Nevertheless, some of them still require computational optimization in order to make those beneficial in scenarios with a limited usage of computational resources. It is suggested that these findings can be used in the context of subsequent research and practical applications.
Keywords

References

Abbas, T. N. A., Hameed, R., Kadhim, A. A., and Qasim, N. H. (2024). Artificial intelligence and criminal liability: exploring the legal implications of ai-enabled crimes.  Encuentros. Revista de Ciencias Humanas, Teoría Social y Pensamiento Crítico., (22 ), 140-159. https://doi.org/:10.5281/zenodo.13386675
Adel, A., Mohammed, A., Daoguo, Y., and Abdulrahman, A. (2023). Advanced techniques for cyber threat intelligence-based APT detection and mitigation in cloud environments. Proc. SPIE. https://doi.org/:10.1117/12.2681627.
Ali, S., Abusabha, O., Ali, F., Imran, M., and Abuhmed, T. (2023). Effective Multitask Deep Learning for IoT Malware Detection and Identification Using Behavioral Traffic Analysis.  IEEE Transactions on Network and Service Management, 20 (2), 1199-1209. https://doi.org/:10.1109/TNSM.2022.3200741
Almutlaq, S., Derhab, A., Hassan, M. M., and Kaur, K. (2023). Two-Stage Intrusion Detection System in Intelligent Transportation Systems Using Rule Extraction Methods From Deep Neural Networks.  IEEE Transactions on Intelligent Transportation Systems, 24 (12), 15687-15701. https://doi.org/:10.1109/TITS.2022.3202869
Alzahrani, A., and Aldhyani, T. H. H. (2022). Artificial Intelligence Algorithms for Detecting and Classifying MQTT Protocol Internet of Things Attacks. Electronics, 11 (22). https://doi.org/:10.3390/electronics11223837.
Bhusal, D., Shin, R., Shewale, A. A., Veerabhadran, M. K. M., Clifford, M., Rampazzi, S., and Rastogi, N. (2023). SoK: Modeling Explainability in Security Analytics for Interpretability, Trustworthiness, and Usability. Proceedings of the 18th International Conference on Availability, Reliability and Security, Benevento, Italy. https://doi.org/:10.1145/3600160.3600193
Dong, M., Yao, L., Wang, X., Benatallah, B., Zhang, S., and Sheng, Q. Z. (2023). Gradient Boosted Neural Decision Forest.  IEEE Transactions on Services Computing, 16 (1), 330-342. https://doi.org/:10.1109/TSC.2021.3133673
Et al., N. K. (2023). AI in Cybersecurity: Threat Detection and Response with Machine Learning. Tuijin Jishu/Journal of Propulsion Technology, 44, 38–46. https://doi.org/:10.52783/tjjpt.v44.i3.237
He, N., Zhang, Z., Wang, X., and Gao, T. (2023). Efficient Privacy-Preserving Federated Deep Learning for Network Intrusion of Industrial IoT.  International Journal of Intelligent Systems, 2023 (1), 2956990. https://doi.org/:10.1155/2023/2956990
Lee, H. W., Han, T. H., and Lee, T. J. (2023). Reference-Based AI Decision Support for Cybersecurity. IEEE Access, 11, 143324-143339. https://doi.org/:10.1109/ACCESS.2023.3342868
Li, H., Wu, J., Xu, H., Li, G., and Guizani, M. (2022). Explainable Intelligence-Driven Defense Mechanism Against Advanced Persistent Threats: A Joint Edge Game and AI Approach.  IEEE Transactions on Dependable and Secure Computing, 19 (2), 757-775. https://doi.org/:10.1109/TDSC.2021.3130944
Li, S., Chai, G., Wang, Y., Zhou, G., Li, Z., Yu, D., and Gao, R. (2023). CRSF: An Intrusion Detection Framework for Industrial Internet of Things Based on Pretrained CNN2D-RNN and SVM. IEEE Access, 11, 92041-92054. https://doi.org/:10.1109/ACCESS.2023.3307429
Li, Y., Wang, J., Fujiwara, T., and Ma, K.-L. (2023). Visual Analytics of Neuron Vulnerability to Adversarial Attacks on Convolutional Neural Networks.  ACM Trans. Interact. Intell. Syst., 13 (4), Article 20. https://doi.org/:10.1145/3587470
Nameer, Q., Aqeel, J., and Muthana, M. (2023). The Usages of Cybersecurity in Marine Communications.  Transport Development, 3 (18). https://doi.org/:10.33082/td.2023.3-18.05
Park, C., Lee, J., Kim, Y., Park, J. G., Kim, H., and Hong, D. (2023). An Enhanced AI-Based Network Intrusion Detection System Using Generative Adversarial Networks.  IEEE Internet of Things Journal, 10 (3), 2330-2345. https://doi.org/:10.1109/JIOT.2022.3211346
Qasim, N., Shevchenko, Y.P., and Pyliavskyi, V. (2019). Analysis of methods to improve energy efficiency of digital broadcasting.  Telecommunications and Radio Engineering, 78 (16), 1457-1469. https://doi.org/:10.1615/TelecomRadEng.v78.i16.40
Rao Sangarsu, R. (2023). Enhancing Cyber Security Using Artificial Intelligence: A Comprehensive Approach.  International Journal of Science and Research (IJSR), 12 (11), 8-13. https://doi.org/:10.21275/SR231029092527
Rjoub, G., Bentahar, J., Wahab, O. A., Mizouni, R., Song, A., Cohen, R., Otrok, H., et al. (2023). A Survey on Explainable Artificial Intelligence for Cybersecurity.  IEEE Transactions on Network and Service Management, 20 (4), 5115-5140. https://doi.org/:10.1109/TNSM.2023.3282740
Sagu, A., Gill, N. S., Gulia, P., Singh, P. K., and Hong, W.-C. (2023). Design of Metaheuristic Optimization Algorithms for Deep Learning Model for Secure IoT Environment. Sustainability, 15 (3). https://doi.org/:10.3390/su15032204.
Salloum, S., Gaber, T., Vadera, S., and Shaalan, K. (2022). A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques.  IEEE Access, 10, 65703-65727. https://doi.org/:10.1109/ACCESS.2022.3183083
Sauka, K., Shin, G.-Y., Kim, D.-W., and Han, M.-M. (2022). Adversarial Robust and Explainable Network Intrusion Detection Systems Based on Deep Learning. Applied Sciences, 12 (13). https://doi.org/:10.3390/app12136451.
Shanthi, R. R., Sasi, N. K., and Gouthaman, P. (2023). A New Era of Cybersecurity: The Influence of Artificial Intelligence. 2023 International Conference on Networking and Communications (ICNWC), 5-6 April. https://doi.org/:10.1109/ICNWC57852.2023.10127453.
Shashkov, A., Hemberg, E., Tulla, M., and O’Reilly, U.-M. (2023). Adversarial agent-learning for cybersecurity: a comparison of algorithms.  The Knowledge Engineering Review, 38, e3. https://doi.org/:10.1017/S0269888923000012
Sugumaran, D., John, Y. M. M., C, J. S. M., Joshi, K., Manikandan, G., and Jakka, G. (2023). Cyber Defence Based on Artificial Intelligence and Neural Network Model in Cybersecurity. 2023 Eighth International Conference on Science Technology Engineering and Mathematics (ICONSTEM), 6-7 April. https://doi.org/:10.1109/ICONSTEM56934.2023.10142590.
Yousif, O., Dawood, M., Jassem, F. T., and Qasim, N. H. (2024). Curbing crypto deception: evaluating risks, mitigating practices and regulatory measures for preventing fraudulent transactions in the middle east.  Encuentros: Revista de Ciencias Humanas, Teoría Social y Pensamiento Crítico, (22), 311-334. https://doi.org/:10.5281/zenodo.13732337