Iranian Journal of Information Processing and Management

Iranian Journal of Information Processing and Management

Artificial Intelligence in Network Security with Autonomous Threat Response Systems

Document Type : Original Article

Authors
1 Al-Turath University, Baghdad 10013, Iraq
2 Al-Mansour University College, Baghdad 10067, Iraq
3 3Osh State University, Osh City 723500, Kyrgyzstan
4 Al-Rafidain University College Baghdad 10064, Iraq
5 Madenat Alelem University College, Baghdad 10006, Iraq
Abstract
ABSTRACT
Background: With the continued advance in cyber threats, traditional network security systems offer little returns to organizations. AI has turned out to be a useful technology in improving network security because it proactively identifies and responds to threats in a short time.
Objective: This article seeks to discuss the role played by AI self-defending mechanisms in autonomous network security given their effectiveness in threat detection, response time, and the overall harm that can be caused to networks by cyber criminals.
Methods: Three separate studies were made, including conventional security systems, and analytically compared them with the AI-driven system across 100 different network environments. Machine learning (ML), deep learning (DL), and other forms of AI were applied to identify and counteract distinct threats like viruses, phishing, and even DDoS attacks. Detecting accuracy, response time and ability to mitigate attacks where among some of the other factors that were examined.
Results: Automated threat intelligence systems have a 92% accuracy while legacy systems only have 78%. Mean response time was also decreasing by 65% from 45 seconds to 15 seconds. A significant increase to attack mitigation rates was noted with fifty percent effectiveness of the AI programs averting 85 percent of the threats in the first 30 seconds of identification.
Conclusion: Autonomous threat response systems substantiate AI, which function as a radically superior replacement to conventional network security structures, minimizing threat response time and boosting the overall threat neutralization outcome. Incorporation of these types of secure mechanisms into contemporary security landscapes is important as a means of counteraction against new forms of cyber threats.
Keywords

 

References

Abbas, T. N. A., Hameed, R., Kadhim, A. A., and Qasim, N. H. (2024). Artificial intelligence and criminal liability: exploring the legal implications of ai-enabled crimes.  Encuentros. Revista de Ciencias Humanas, Teoría Social y Pensamiento Crítico., (22 ), 140-159. https://doi.org/:10.5281/zenodo.13386675
Adil, M., Khan, M. K., Farouk, A., Jan, M. A., Anwar, A., and Jin, Z. (2024). AI-Driven EEC for Healthcare IoT: Security Challenges and Future Research Directions.  IEEE Consumer Electronics Magazine, 13 (1), 39-47. https://doi.org/:10.1109/MCE.2022.3226585
Alnuaemy, L. M. (2023). Peculiarities of using neuro-linguistic programming for the rehabilitation of servicemen who were in armed conflicts.  Development of Transport Management and Management Methods, 3 (84), 40-55. https://doi.org/:10.31375/2226-1915-2023-3-40-55
Applebaum, A., Dennler, C., Dwyer, P., Moskowitz, M., Nguyen, H., Nichols, N., Park, N., et al. (2022). Bridging Automated to Autonomous Cyber Defense: Foundational Analysis of Tabular Q-Learning. Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, Los Angeles, CA, USA. https://doi.org/:10.1145/3560830.3563732
Bae, I.-s., Yun, J., and Seol, S. (2022). A Study on Response to Cyber Threats using Artificial Intelligence.  J-Institute, 7 (11), 10-21. https://kiss.kstudy.com/DetailOa/Ar?key=52357348
Bao, H., Zhao, Y., Zhang, X., Wang, G., Duan, J., Tian, R., Men, J., et al. (2024). A Probabilistic and Distributed Validation Framework Based on Blockchain for Artificial Intelligence of Things.  IEEE Internet of Things Journal, 11 (1), 17-28. https://doi.org/:10.1109/JIOT.2023.3279849
Benzaïd, C., and Taleb, T. (2020). AI for Beyond 5G Networks: A Cyber-Security Defense or Offense Enabler?  IEEE Network, 34 (6), 140-147. https://doi.org/:10.1109/MNET.011.2000088
Cao, X., Sun, C., and Wang, X. (2024). Threat Assessment Strategy of Human-in-the-Loop Unmanned Underwater Vehicle Under Uncertain Events.  IEEE Transactions on Systems, Man, and Cybernetics: Systems, 54 (1), 520-532. https://doi.org/:10.1109/TSMC.2023.3311778
Das, R., and Sandhane, R. (2021). Artificial Intelligence in Cyber Security.  Journal of Physics: Conference Series, 1964 (4), 042072. https://doi.org/:10.1088/1742-6596/1964/4/042072
Deng, Z., Liu, J., Xun, Y., and Qin, J. (2024). IdentifierIDS: A Practical Voltage-Based Intrusion Detection System for Real In-Vehicle Networks.  IEEE Transactions on Information Forensics and Security, 19, 661-676. https://doi.org/:10.1109/TIFS.2023.3327026
Fang, W., Zhu, C., and Zhang, W. (2024). Toward Secure and Lightweight Data Transmission for Cloud–Edge–Terminal Collaboration in Artificial Intelligence of Things.  IEEE Internet of Things Journal, 11 (1), 105-113. https://doi.org/:10.1109/JIOT.2023.3295438
Fatah, O. R., and Qasim, N. (2022). The role of cyber security in military wars.  PCSIТS-V International Scientific and Practical Conference, 2022, 78 (06), 114-116. https://www.researchgate.net/profile/Nameer-Qasim/publication/369899226_The_role_of_cyber_security_in_military_wars/links/6431beafad9b6d17dc44d44e/The-role-of-cyber-security-in-military-wars.pdf
Havenga, W., Bagula, A., and Ajayi, O. (2022). Autonomous Threat Detection and Response for Self-Protected Networks. 2022 Conference on Information Communications Technology and Society (ICTAS), 9-10 March 2022. https://doi.org/:10.1109/ICTAS53252.2022.9744643.
Hu, Y., Kuang, W., Qin, Z., Li, K., Zhang, J., Gao, Y., Li, W., et al. (2021). Artificial Intelligence Security: Threats and Countermeasures.  ACM Comput. Surv., 55 (1), Article 20. https://doi.org/:10.1145/3487890
Jan, M. A., Zhang, W., Akbar, A., Song, H., Khan, R., and Chelloug, S. A. (2024). A Hybrid Mutual Authentication Approach for Artificial Intelligence of Medical Things.  IEEE Internet of Things Journal, 11 (1), 311-320. https://doi.org/:10.1109/JIOT.2023.3317292
Jawaid, S. A. (2023). Artificial Intelligence with Respect to Cyber Security.  Journal of Advances in Artificial Intelligence, 1, 96-102. https://doi.org/:10.18178/JAAI.2023.1.2.96-102
Khakurel, U., and Rawat, D. B. (2024). Real-Time Physical Threat Detection on Edge Data Using Online Learning.  IEEE Consumer Electronics Magazine, 13 (1), 72-78. https://doi.org/:10.1109/MCE.2023.3256641
Kim, H., Ben-Othman, J., Mokdad, L., Son, J., and Li, C. (2020). Research Challenges and Security Threats to AI-Driven 5G Virtual Emotion Applications Using Autonomous Vehicles, Drones, and Smart Devices.  IEEE Network, 34 (6), 288-294. https://doi.org/:10.1109/MNET.011.2000245
Li, H., Li, X., Zhang, Z., Hu, C., Dunkin, F., and Ge, S. S. (2024). ESUAV-NI: Endogenous Security Framework for UAV Perception System Based on Neural Immunity.  IEEE Transactions on Industrial Informatics, 20 (1), 732-743. https://doi.org/:10.1109/TII.2023.3271443
Li, H., and Zuo, H. (2023). Research on the Application of Artificial Intelligence Technology in Network Security. 2023 6th International Conference on Computer Network, Electronic and Automation (ICCNEA), 22-24 Sept. 2023. https://doi.org/:10.1109/ICCNEA60107.2023.00054.
Moustafa, N. (2021). A new distributed architecture for evaluating AI-based security systems at the edge: Network TON_IoT datasets.  Sustainable Cities and Society, 72, 102994. https://doi.org/:https://doi.org/10.1016/j.scs.2021.102994
Naik, S., Thippeswamy, P., Raghavan, A., Rajgopal, M., and Sujith, A. (2024). Efficient network management and security in 5G enabled internet of things using deep learning algorithms Keywords: 5G enabled IoT Deep learning Network management Network security Predictive modelling. Vol. 14. https://doi.org/:10.11591/ijece.v14i1.pp1058-1070
Nameer, Q., Aqeel, J., and Muthana, M. (2023). The Usages of Cybersecurity in Marine Communications.  Transport Development, 3 (18). https://doi.org/:10.33082/td.2023.3-18.05
Qasim, N. H., Vyshniakov, V., Khlaponin, Y., and Poltorak, V. (2021). Concept in information security technologies development in e-voting systems.  International Research Journal of Modernization in Engineering Technology and Science (IRJMETS), 3 (9), 40-54. https://www.irjmets.com/uploadedfiles/paper/volume_3/issue_9_september_2021/15985/final/fin_irjmets1630649545.pdf
Rizvi, M. (2023). Enhancing cybersecurity: The power of artificial intelligence in threat detection and prevention.  International Journal of Advanced Engineering Research and Science, 10 (Research5). https://doi.org/:10.22161/ijaers.105.8
Tan, L., Yu, K., Ming, F., Cheng, X., and Srivastava, G. (2022). Secure and Resilient Artificial Intelligence of Things: A HoneyNet Approach for Threat Detection and Situational Awareness.  IEEE Consumer Electronics Magazine, 11 (3), 69-78. https://doi.org/:10.1109/MCE.2021.3081874
Xu, X., Xu, B., Han, S., Dong, C., Xiong, H., Meng, R., and Zhang, P. (2024). Task-Oriented and Semantic-Aware Heterogeneous Networks for Artificial Intelligence of Things: Performance Analysis and Optimization.  IEEE Internet of Things Journal, 11 (1), 228-242. https://doi.org/:10.1109/JIOT.2023.3305011
Yang, Z., Xiong, B., Chen, K., Yang, L. T., Deng, X., Zhu, C., and He, Y. (2024). Differentially Private Federated Tensor Completion for Cloud–Edge Collaborative AIoT Data Prediction.  IEEE Internet of Things Journal, 11 (1), 256-267. https://doi.org/:10.1109/JIOT.2023.3314460
Zhang, C., Lian, Z., Huang, H., and Su, C. (2024). PCIDS: Permission and Credibility-Based Intrusion Detection System in IoT Gateways.  IEEE Internet of Things Journal, 11 (1), 904-913. https://doi.org/:10.1109/JIOT.2023.3289206
Zhang, Z., Hamadi, H. A., Damiani, E., Yeun, C. Y., and Taher, F. (2022). Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research.  IEEE Access, 10, 93104-93139. https://doi.org/:10.1109/ACCESS.2022.3204051
Zhang, Z., Ning, H., Shi, F., Farha, F., Xu, Y., Xu, J., Zhang, F., et al. (2022). Artificial intelligence in cyber security: research advances, challenges, and opportunities.  Artificial Intelligence Review, 55 (2), 1029-1053. https://doi.org/:10.1007/s10462-021-09976-0