ArticlePDF Available

Abstract

Artificial intelligence is opening up new avenues for value generation in enterprises, industries, communities, and society as a whole. Technology has been researched to be relevant in many aspects of the world. This factor has made it to be included mainly in different businesses and industries. The applications of AI are endless to discuss. The research below examines the applications of artificial intelligence (AI) in cybersecurity. Cybersecurity has also been a growing concept in the technological industry. Many companies have included information technology in their businesses. This factor has required companies and organizations to demand more security measures. The attempt to protect the available data and information has resulted in the growth of cybersecurity, and AI has been seen to influence cybersecurity heavily on a large scale. This factor has made machine learning to be significantly induced in recent technologies supporting cybersecurity. The research paper performs a literature review and examines the overall impacts of artificial intelligence on cybersecurity.
ISSN (O) 2278-1021, ISSN (P) 2319-5940
IJARCCE
International Journal of Advanced Research in Computer and Communication Engineering
ISO 3297:2007 CertifiedImpact Factor 7.39Vol. 11, Issue 9, September 2022
DOI: 10.17148/IJARCCE.2022.11912
© IJARCCE This work is licensed under a Creative Commons Attribution 4.0 International License 81
The Impact and Limitations of Artificial
Intelligence in Cybersecurity:
A Literature Review
Meraj Farheen Ansari1, Bibhu Dash2, Pawankumar Sharma3, Nikhitha Yathiraju4
School of Computer and Information Sciences, University of the Cumberlands, Williamsburg, KY 1,2,3,4
Abstract: Artificial intelligence is opening up new avenues for value generation in enterprises, industries, communities,
and society as a whole. Technology has been researched to be relevant in many aspects of the world. This factor has made
it to be included mainly in different businesses and industries. The applications of AI are endless to discuss. The research
below examines the applications of artificial intelligence (AI) in cybersecurity. Cybersecurity has also been a growing
concept in the technological industry. Many companies have included information technology in their businesses. This
factor has required companies and organizations to demand more security measures. The attempt to protect the available
data and information has resulted in the growth of cybersecurity, and AI has been seen to influence cybersecurity heavily
on a large scale. This factor has made machine learning to be significantly induced in recent technologies supporting
cybersecurity. The research paper performs a literature review and examines the overall impacts of artificial intelligence
on cybersecurity.
Keywords: Cybersecurity, AI, Cyber threats, Vulnerability, Data Privacy, AI value creation.
I. INTRODUCTION
Artificial intelligence was developed in the 20th century. This development resulted from trying to create a structure that
would not require the help of a human brain. The discovery led to more research being conducted on the matter [1]. More
people have tried to create intelligent systems and robots. The developments all attempted to include an object that mimics
human behavior and acts without significant impact on humans. The research was also included in mathematics, where
several mathematicians tried to develop formulas to help with the aspect. Organizations poured much money to ensure
these research studies were successful. The entire history of AI showcases the growth that the technology has come. AI
platforms assist enterprises in the development, management, and deployment of machine learning and deep learning
models at scale. Decreasing software development tasks such as data management and deployment make AI technology
more accessible and economical [2]. With the increase in cyber risks, artificial intelligence (AI) is increasingly widely
employed to monitor and restrict cybercrime.
II. BACKGROUND
The development of computers and processing units ensured that the growth of AI was to continue incredibly. Looking
at the graph above, it is clear that people were finding the use of the technology [3]. Other people have seen the potential
of AI since its early years. Algorithms were developed and continued to grow with the generations of computers.
Countries were now in competition over who would set the technology first. This aspect led to the factor of the technology
extensively growing. As shown above, the end of the 20th century saw a remarkable rise in AI technology [4]. During
this period, the true power of AI and its significance had been noticed. The continued research ensured that more
applications were being discovered for the technology. Below Fig.1 shows an AI life cycle in detail.
Fig.1 Graphical life-cycle of AI [5]
ISSN (O) 2278-1021, ISSN (P) 2319-5940
IJARCCE
International Journal of Advanced Research in Computer and Communication Engineering
ISO 3297:2007 CertifiedImpact Factor 7.39Vol. 11, Issue 9, September 2022
DOI: 10.17148/IJARCCE.2022.11912
© IJARCCE This work is licensed under a Creative Commons Attribution 4.0 International License 82
Looking at the situation today, it is clear that artificial intelligence has dramatically grown. Over the years, vast amounts
of information have been collected to provide correct analysis and predictions [6]. These attributes have greatly
influenced the applications of AI in different industries and organizations. Technology has dramatically benefited
initiatives such as banking, marketing, and entertainment. Modeling human actions and reactions has shown fruitful when
done by computers. Robots mimicking human behavior have also been developed. Personal assistant applications and
devices have also been on the rise based on artificial intelligence technology. Key examples of such devices include
Alexa and Siri. Applications such as Google assistant have also proven efficient in helping people. Below fig.2 showcases
some of the applications of AI. The figure below showcases the overall impact of AI on different technologies.
Fig 2. Possible Applications of Artificial Intelligence.
As mentioned above, artificial intelligence has many applications in different sectors and industries. One of the sectors
that have continued to benefit from artificial intelligence has been cyber security. This has resulted in specific impacts
that are discussed in the study below. The aspect has resulted in different challenges and benefits, which are discussed
below. Cyber security is the aspect of protecting computers and other devices from attacks. Most of these attacks are over
the Internet [7, 8]. Based on these attacks, organizations always lose many resources. Stevens [9] showcases those cyber-
attacks will become the new forms of terrorism attacks on countries. Recent developments in the technological universe
have shown that businesses and companies could be destroyed based on a single attack. Trappe and Straub [10] define
cyber security as protecting computers from attacks that could be performed through the Internet. Organizations need to
include strategies that will ensure the protection of their information. Competitors may attack an organization to gain an
advantage against the company. These factors all require the aspects of cyber security. Confidential and private
information always requires more measures to ensure people cannot access this information. This factor ensures that
people and organizations have been made safer.
Fig.3: Types of Cybersecurity Threats
Cyber security, in general, has been divided into different sections. The essential parts and units in cybersecurity ensure
privacy and security by companies and individuals [11]. These categories include application, network, information, and
ISSN (O) 2278-1021, ISSN (P) 2319-5940
IJARCCE
International Journal of Advanced Research in Computer and Communication Engineering
ISO 3297:2007 CertifiedImpact Factor 7.39Vol. 11, Issue 9, September 2022
DOI: 10.17148/IJARCCE.2022.11912
© IJARCCE This work is licensed under a Creative Commons Attribution 4.0 International License 83
operational security. Achieving these factors ensures that all the benefits of cybersecurity have been experienced. This
factor thus allows for business continuity and development. Fig.3, showcased below, explains the types of threats
affecting cybersecurity. Based on the discussions above, it is clear that individuals must protect their information. There
are a few ways through which this is achieved. The different methods are being improved daily. Artificial intelli gence is
one of the applications of AI to ensure more security. Stoianov and Ivanov [12] detailed that significant data advantages
result from the recent successes of artificial intelligence in cybersecurity. The threats available are avoided using machine
learning technology. This factor has included more security on the company's data and information. Based on this factor,
artificial intelligence has enormously impacted cybersecurity. Below are other impacts as a result of artificial intelligence
on cyber security.
III. IMPACT OF AI ON CYBERSECURITY
Different impacts result from including AI technology worldwide. The effects resulting from the technology are both
positive and negative. Technology has showcased massive development in different industries [13]. All industries have,
however, benefited from the impact it has had on cybersecurity. Perols and Murthy [14] showcase that artificial
intelligence has influenced businesses and companies. However, the overall implications of artificial intelligence on
cybersecurity are both positive and negative. Attacks on companies have proven to become more and more dangerous.
Attackers have neem found to increase their knowledge to find weaknesses in cybersecurity technologies. The automation
resulting from machine learning algorithms has ensured that attackers cannot use the same ways to attack systems with
artificial intelligence. The technology has showcased that machine learning algorithms are better at providing security
than humans. Integrating artificial intelligence into cybersecurity ensures that errors are avoided. This factor is among
the different benefits of AI on cybersecurity discussed below.
The different artificial intelligence technologies have all obtained different roles in ensuring cyber security [15, 16]. The
technologies are continuing research to ensure maximum efficiency in avoiding attacks. As mentioned above, other
organizations across the world have information that they need confidential. The technologies have to ensure that nobody
can access this information. The future has also been seen to incorporate artificial intelligence on a larger scale. This
factor will mean artificial intelligence will be highly developed to ensure maximum security in organizations. Having
systems that could protect themselves and detect any attempt is one of the visions of most companies. The aspect of
security is a dream that researchers and IT companies are fighting to achieve. The first key attribute of artificial
intelligence being significantly embedded in systems is learning from their experiences. This is one of the essential
characteristics of AI in general. It has been proven that systems could learn from the different aspects that have made the
technology highly relevant in cybersecurity. AI has been regarded as t come and rescue technology in cybersecurity [17].
Learning from experiences is an attribute of artificial intelligence algorithms where systems can learn from factors that
have happened before [18]. The algorithms have been used in cyber security technologies and algorithms to ensure that
a mistake cannot happen again. Attacks are thus embedded in a system where the artificial intelligence algorithm will
detect and learn from the attack.
AI technology is one of the most sophisticated technologies in the modern world. Technology has perfected everything
the machine works and wishes to achieve. Man has an insatiable need to create gadgets that can conduct flawless
computations and carry out activities without constraints. AI technology is one of man's best works, even beyond most
of our understanding. Every organization implementing the technology guarantees they have improved their services and
efficiency [19]. AI technology has also contributed to ensuring that it has helped reduce the cybercrimes we experience,
as this is one of the challenges in the world today [18]. AI technology has confirmed that these activities are detected and
dealt with. AI technology has ensured faster detection of malfunctioning in the system as their monitoring stills are much
greater than those of man [19]. This aspect dramatically impacts ensuring that there are no crimes or penetration into the
system by unauthorized individuals [17]. And therefore, technology has contributed to having excellent technological
security in the world today. Real-time traffic monitoring allows AI technology to identify any activity without the correct
measurements or protocols and act on the actions [3]. Upon placing the move, the system must ensure it has worked on
the matter [18]. This factor allows the technology to deal with the situation before it's too late. The system will be safe
and not corrupt at this stage, helping the organization better its security protocols and protect its data and information.
In data security measures and protocols, AI technology has been one of the best technologies in ensuring that they have
improved them. Data is critical to business organizations, so it needs to be secured [20]. With the help of multiple data
encryption protocols, the system can facilitate great encryption and guarantee the security of the data involved. The great
protocol significantly impacts the technology in the cybersecurity sector of technology [21].
AI technology has also resulted in unemployment in some cyber security posts it replaced. The computer has better
efficiency in whatever it does makes it a priority for individuals with skills in the field [10]. The introduction affected the
ISSN (O) 2278-1021, ISSN (P) 2319-5940
IJARCCE
International Journal of Advanced Research in Computer and Communication Engineering
ISO 3297:2007 CertifiedImpact Factor 7.39Vol. 11, Issue 9, September 2022
DOI: 10.17148/IJARCCE.2022.11912
© IJARCCE This work is licensed under a Creative Commons Attribution 4.0 International License 84
employment of cybersecurity specialists as they had less contribution to an organization since the AI technology has done
it all well and efficiently. It also resulted in the organization reducing the system's maintenance and c heck-up rate. How
AI technology secures the security protocols is incredibly efficient compared to where an individual does it. Organizations
with this technology are guaranteed to secure their data as the technology in their system ensures greater efficiency as it
continues to understand its system and operations.
Mengidis et al. [22] also state that including artificial intelligence learning systems in cybersecurity helps prevent attacks
in a system. The learning-based system learns from the attackers' actions ad adjusts to protect the information. This factor
makes it impossible for attackers to gain access to the data. Having a system that keeps adjusting and learning is one of
the attributes that has made the technology very efficient. AI has been able to avoid cyber-attacks using the approaches
discussed below. The different techniques ensure the efficiency of AI in cybersecurity.
A. Signature Based Techniques
The subsequent impact of AI on cybersecurity is through signature-based techniques. Understanding signature codes has
been a critical attribute of AI technology in cybersecurity. The method involves AI detecting cyberattacks and malware
through the available codes [29]. These codes in the malware or attacks are detected using an AI algorithm [21]. Matching
the signature from recent attacks or a database thus gives the cyber security team an advantage in stopping the attack.
The signatures must be compared quickly to detect the attack. The type of attack being understood thus provides the time
and resources required to stop the attack [30]. Before AI technology impacted cybersecurity, these detections would be
conducted a lot of time, leading to massive failures and losses.
The database mentioned above, where malware signatures are stored, is called the blacklist. The system detects the attack
by comparing the available signatures in the blacklists to the known signature caught in the attack. The signatures are
sometimes referred to as the patterns present in the attack, and this could be said to be another form of machine-based
learning [31]. Although the method has proven very efficient over the years, it has been seen to be useless in the case of
a new attack. The technique fails since the database has no record of the attack. The technology, however, has been seen
to be very efficient and stopped many attacks over the years. The above technique has been seen to be evaded using
specific techniques. A key example is how attackers have understood the different ways of avoiding attacks by altering
their patterns. Hackers understand the aspects susceptible to AI and change these values completely [10]. Changing their
patterns ensures they can access the data and information before they are detected. As mentioned above, the technique
has shown huge impacts on cybersecurity. Research shows that most attacks have been stopped and avoided using the
method. Below fig.4 shows applications of AI in cybersecurity.
Fig. 4 Application of AI in Cybersecurity
B. Machine Learning Approach
As mentioned above, machine-based learning has dramatically influenced cybersecurity. Mengidis et al. [22] discovered
that humans always make mistakes when analyzing data or information. A considerable advantage of AI technology is
that they are system. The system has the advantage of avoiding errors or missing details of attacks. Using AI to analyze
logs and network packets has ensured that attacks are quickly detected [11]. The AI technology detects systems, analyses
the available records, and detects logs included in the system. This factor ensures that system administrators can change
the information accessed to avoid further loss. This factor has led to the analogy that AI closely replaces human analysts
ISSN (O) 2278-1021, ISSN (P) 2319-5940
IJARCCE
International Journal of Advanced Research in Computer and Communication Engineering
ISO 3297:2007 CertifiedImpact Factor 7.39Vol. 11, Issue 9, September 2022
DOI: 10.17148/IJARCCE.2022.11912
© IJARCCE This work is licensed under a Creative Commons Attribution 4.0 International License 85
The main advantage of AI in cybersecurity is the attribute of being able to analyze enormous data. Extensive data is
always tiring to investigate, being a human analyst. This attribute was significantly changed after the information of AI
technology. AI can analyze large pieces of information and not make an error. Human analysts are also efficient in
detection since they can operate AI technology [23]. The efforts between the systems and analysts ensure that all the data
available has been analyzed and compared. This factor has proven efficient in stopping attacks. Before preventing attacks
and protecting the available data, malware identification is always the first step. Classification and clustering are thus
great attributes of machine learning systems. They compare the available information and how it should be in the logs.
This factor provides detection if there are errors in the system. The regular records are compared to the current ones to
identify the infected logs. After an attack has been detected, necessary steps are taken to ensure the att ack has been
stopped. Clustering involves grouping the available records or information from the system and detecting anomalies.
Both of these techniques used in machine learning have proven effective since it is impossible for humans.
C. Network Intrusion Detection
Network attacks are one of cyber security's most used forms of aggression. The raids are conducted through the networks
that the organizations or companies use. It is always important to detect attacks through networks. This factor gives the
system the advantage of stopping the attack from the web. Through AI, this attribute has been made very easy. Network
firewalls being embedded with AI technology have also been found to be very efficient. Accessing the network has been
made very hard without the proper authorization. Stopping attacks from the web is the first step in protecting the
information available. This approach has thus been very efficient in preventing future attacks. The above guidelines are
also embedded in the networks to ensure maximum security. The main key attribute and advantage of network intrusion
detection systems are that they have five elements that support the full security of such networks. The first key element
is how AI systems acquire large sums of information from the network. This factor can be achieved through the AI
system's ability to analyze large amounts of data [23]. All the factors help ensure the security of the network has been
completed. Stopping an attack from the network gives the organization a higher chance of protecting the information. All
the way a network may be compromised is avoided using the AI techniques available.
The above discussions showcase that AI has influenced cyber security on a large scale. The way mentioned above is from
an impact of artificial intelligence on cyber security at a network level. The systems are taught the different forms of
avoiding any possible attack to ensure the network is uncompromised [24]. This factor of artificial intelligence learning
also played a massive part in ensuring network security [25]. This factor and many others have increased the benefits of
artificial intelligence to AI impacting cybersecurity.
D. Vulnerability Management
Vulnerability management is the attribute of artificial intelligence machines managing the possible vulnerabilities that
organizations may have in their systems. Research showcases that in 2019, around 20,362 vulnerabilities were reported.
There was an 18% increase compared to 2018 [24]. This factor showcases that organizations are continuing to experience
threats daily. The management of these vulnerabilities is becoming exhausting for the personnel present. This factor
required the inclusion of AI systems to manage recorded exposures. This factor has made it hard for hackers to gain
access to systems. Vulnerability management is thus one of the benefits resulting from the impact of AI on cyber security.
According to IBM research on AI in cybersecurity market dynamics that considers all disclosed vulnerabilities, spending
on cyberspace globally is increasing despite the COVID-19 pandemic (see Table 1) [26].
Table I Artificial Intelligence Valuation in Cybersecurity market prediction
Market
Artificial Intelligence in Cybersecurity Market
Market size 2018
USD 9.8 Billion
Market size 2021
USD 14.9 Billion
Market size 2025
USD 36.6 Billion
Market size 2030
USD 133.8 Billion
Most hackers used to exploit the slow reaction of the available vulnerability management. Artificial intelligent systems
managing the vulnerability database ensure that attack attempts are re4ported in real-time, thus ensuring safer systems
[27]. Another critical aspect is how machine learning algorithms detect user account anomalies [23]. This factor ensures
that the systems are protected if a user in the system proves to be a threat. The aspect of vulnerability management by AI
systems has provided servers are safer, and information stored in these machines is safer.
ISSN (O) 2278-1021, ISSN (P) 2319-5940
IJARCCE
International Journal of Advanced Research in Computer and Communication Engineering
ISO 3297:2007 CertifiedImpact Factor 7.39Vol. 11, Issue 9, September 2022
DOI: 10.17148/IJARCCE.2022.11912
© IJARCCE This work is licensed under a Creative Commons Attribution 4.0 International License 86
E. Data Centers Security
Cyber security involves the protection of data from any attacks. The use of AI, as mentioned above, has ensured that
these ways are more efficient and secure. Data centers are one of the most critical aspects that require cybersecurity [28].
The main advantage of AI has been found to ensure that processes included in these centers have been automated. Power
consumption, bandwidth usage, and temperatures are vital aspects significantly controlled in data centers. Since humans
sometimes make errors, using AI to manage such canters ensures maximum efficiency.
Another critical factor in data centers is that the cost of hardware maintenance is always observed when using AI systems
to manage the entire center. The data centers always require protection from environmental factors since they hold
essential information for the customers or organizations [28]. Based on this factor, it is always necessary for AI to ensure
that machines are safe. Over the years, more companies and organizations have included AI systems in their data centers
for more security and efficiency [23]. This factor showcases the impact of AI on cyber security. Although Artificial
intelligence is beneficial in cybersecurity, there are other limitations resulting from AI in cyber security.
IV. LIMITATION OF AI IN CYBERSECURITY
From Charles Darwin's theory about Man's devolution, we can learn that man has always tried to ensure that they have
perfected how nature treats them. The ability to change what nature offers to favor their activities and survival has always
been the objective of humanity in ensuring that they have a better environment to stay in. Getting to the industrial stage
of the human revolution, we can see that they have contributed to ensuring that they extensively utilize the knowledge of
machinery that will help them in their day-to-day activities [32]. The idea of physics knowledge and how to use and
advance machinery helped humanity entirely replace the animals allowing them in their activities. With the help of the
machinery, there were able to ensure that they have improved their product and efficiency in their work. A man comes
to learn that machinery is better than humans. Therefore, the goal was to entirely replan making with a machine to have
more excellent production and avoid any inconvenience brought by human actions. And by developing the machinery,
they could get to the computer technology we have today.
Computer technology has become one of the most widely used technologies today, resulting in many essential elements
in life being supported by technology. Therefore, some standards must be implemented in the technology to ensure that
the efficiency and the security of the services offered are of concern [32]. The technology is entitled to financial
institutions and other sectors that hold essential information about our lives. Also, the technology contains information
about our organization, which other organizations can use to create a competitive advantage. Considering how vital
information is to the current world, computer technicians and developers must ensure that they have included all the
security protocols to ensure the security of the data involved in the system. Computer scientists had to develop a way of
ensuring data security; therefore, they had to encrypt their data before sending it [33]. The encrypting protocol will ensure
that if the data falls to the wrong people, they will still be unable to use it. One must have the decryption code to decode
the data involved, making it difficult to use [34]. Data encryption generation continued, so people understood the
principles used in the process. The below fig.5 explains how data encryption and business process barriers are the huddles
to use AI in all organizational challenges, including cyber threats to generate value.
Fig. 5 Barriers to implementing AI against cyber threats on delivering business value [5]
People learning and understanding the process resulted in another challenge catered for [35]. People learning the protocols
used by the encryption systems and programs made it easy to reverse engineer the process. The ability to obtain the data
being transmitted by having the protocol of identifying the encryption key significantly puts the entire process of securing
ISSN (O) 2278-1021, ISSN (P) 2319-5940
IJARCCE
International Journal of Advanced Research in Computer and Communication Engineering
ISO 3297:2007 CertifiedImpact Factor 7.39Vol. 11, Issue 9, September 2022
DOI: 10.17148/IJARCCE.2022.11912
© IJARCCE This work is licensed under a Creative Commons Attribution 4.0 International License 87
data in a hot soup [35]. Computer scientists had to develop more complicated protocols and methods for encrypting data
and ensuring it operates correctly. The ultimate goal of securing the data is achieved. With the idea that machines are
better than humans in everything they have been programmed to do, it is logical to say that they will be best at ensuring
their security [36]. This results in introducing Artificial Intelligence technology that ensures the machine's security is
excellent. There is no instance where the information can get unintended [22]. The AI system works to ensure that they
have assigned all the protocols they are programmed to follow to guarantee the security of the data involved.
The AI feeds into different protocols of data encryption and uses other methods. It can generate a more complex way to
solve or encrypt the data. With these different data encryption protocols, the system can ensure that it is difficult enough
to ensure that nobody can decode the data involved in the transaction. AI has served networking companies and other
organizations efficiently as data security is more advanced and guaranteed. However, considering that man created the
technology, they have faults even though they were designed to reprogram and develop themselves in case of any
responsibility. The fact that man created the program gives him a chance to study it and reverse engineer the process
involved, thereby putting the security problem at risk of getting into the wrong hands [35]. As an individual, has indeed
created the AI technology involved in data security.
One of the most significant limitations of AI is that it is just a computer code programmed to ensure that they have
followed the protocols and developed themselves in case of anything. This instance may sound okay as they can develop
themselves in case of anything. However, the system is entirely programmed; therefore, anybody can take control of
them, and they can be manipulated and used as a weapon. Few lines of code are required to be edited, and then the long
work hours may be turned into a weapon that will be used against itself. Therefore, with the appropriate ability and
knowledge, AI technology can be used as a weapon that will be used to destroy what it was made to protect. This factor
is one of AI's most significant limitations to cyber security [26]. Developers and computer scientists should consider this
as they understand the capability of AI technology.
AI systems can also be trained to detect cyber threats and malicious malware, thus making them more effective in cyber
security. The increasing number of cyber security attacks has led to AI adoption in cybersecurity. The entire process is
to ensure that there is efficiency and accuracy. However, AI is limited and cannot replace humans since it is only
instructed to perform a specific task. At times, it cannot detect virtually indistinguishable threats and hence gets into
trouble since it looks like the actual message. AI may also find it difficult to detect threats due to evolving cyber threats.
Viruses and malware improve at any given time, and so should the AI system need an improvement for efficiency. Also,
the practice of cybersecurity is many compared to cybercriminals, who tend to acquire more information on hacking.
Therefore, cybercriminals can create a better threat that artificial intelligen ce would not detect easily [9]. Although AI
saves time for the security team, it also requires human experts for creativity, thus making work easier for them. The
limitation calls for the developers to ensure they have equipped the technology with multiple capabilities to handle any
crime resulting from their restraints.
On the other hand, we can identify that AI technology is not entirely being used to protect data and ensure data security.
We can also have the AI technology that is developed to have it generate and create computer viruses. The complexity
included in the technology makes it difficult for an individual to compete with the machine, leading to the bridging of
data. With as many powers generated in the AI-generated codes, which are used to develop a computer virus, it makes it
entirely possible for it to be super easy to corrupt a database and manipulate data in it. This is another limitation that is
essentially not to AI technology as a watchdog of cybercrime but as a participant in cybercrime. This limitation showcases
another massive impact of AI in cybersecurity. The complexity of the technology is a limitation of AI technology as not
everyone in society knows technology. There is also the fact that it is not a simple task to understand the different models
involved in the technology. Technology being so challenging to use and implement to the total capacity can give criminals
a chance to get the system as we cannot operate the approach to the maximum capability. The technology requires much
information about its operation, which many individuals do not have. Therefore, organizations are still at risk as they
cannot get the system to operate to its best.
Also, because we have complexity in the system, we understand that the technology will cost a lot [34]. Therefore, the
cost of implementing the technology is much more expensive. Therefore, not all organizations in the world will be able
to access the technology and ensure the security of the data. Therefore, the cost of the technology is also a limitation to
the implementation [38, 39]. Even though the organization's information is essential to any organization, the cost of
implementing AI technology is much higher, limiting the number of individuals who will use the technology for the
safety of their data and information. The system's cost results in few members and organizations using the technology,
making it hard to appreciate the technology's ability.
ISSN (O) 2278-1021, ISSN (P) 2319-5940
IJARCCE
International Journal of Advanced Research in Computer and Communication Engineering
ISO 3297:2007 CertifiedImpact Factor 7.39Vol. 11, Issue 9, September 2022
DOI: 10.17148/IJARCCE.2022.11912
© IJARCCE This work is licensed under a Creative Commons Attribution 4.0 International License 88
V. CONCLUSION
There are many impacts resulting from AI technology in different industries. These impacts include both the benefits and
limitations of this technology. Looking at the discussion above, it is clear that AI has proven more beneficial to cyber
security than its limitations. Artificial intelligence is still growing, and more research is being done on the technology.
This factor showcases huge advancements underway in the technologythe approaches used to ensure cybersecurity
support. The procedures showcase the technological impact of the technology on cybersecurity measures. The above
research also focuses on some limitations of AI impacting cyber security. The limits showcase how people have managed
to use AI for their gains. This factor has led to constraints in cybersecurity. Researchers and innovators should work to
ensure that the limitations discussed above have been avoided. Systems should be made more secure through the use of
AI systems. Increasing cybersecurity measures will ensure that attackers cannot exploit organizations. This factor will
ensure more growth and development of organizations and companies. Based on the research above, the conclusion is
that artificial intelligence has dramatically impacted cyber security.
ACKNOWLEDGMENT
We are thankful to our advisor Dr. Azad Ali from the University of the Cumberlands, for all his support and guidance in
writing this review paper on cyber security. Also, thanks to him for reviewing it before our submission.
REFERENCES
[1] Blake, C. (2020). Artificial Intelligence and Advances. Advances In Machine Learning & Artificial Intelligence, 1(1).
https://doi.org/10.33140/amlai.01.01.03
[2] Dash, B., & Sharma, P. (2022). Role of artificial intelligence in smart cities for information gathering and
dissemination (a review). Academic Journal of Research and Scientific Publishing, 4(39), 5875.
https://doi.org/10.52132/ajrsp.e.2022.39.4
[3] Chen, Z., & Liu, B. (2016). Lifelong Machine Learning. Synthesis Lectures On Artificial Intelligence And Machine
Learning, 10(3), 1-145. https://doi.org/10.2200/s00737ed1v01y201610aim033
[4] Vorobeychik, Y., & Kantarcioglu, M. (2018). Adversarial Machine Learning. Synthesis Lectures On Artificial
Intelligence And Machine Learning, 12(3), 1-169. https://doi.org/10.2200/s00861ed1v01y201806aim039
[5] Dilmegani, C. (2022, September 12). AI platforms: Guide to ML Life Cycle Support Tools. AIMultiple. Retrieved
September 26, 2022, from https://research.aimultiple.com/ai-platform/
[6] Chen, Z., & Liu, B. (2018). Lifelong Machine Learning, Second Edition. Synthesis Lectures On Artificial Intelligence
And Machine Learning, 12(3), 1-207. https://doi.org/10.2200/s00832ed1v01y201802aim037
[7] Heldah, C. (2021). How Artificial Intelligence (AI) is Transforming Cybersecurity. Plug and Play Tech Center.
Retrieved 1 September 2021, from https://www.plugandplaytechcenter.com/resources/how-artificial-intelligence-
transforming-cybersecurity/.
[8] Ansari, M. F., Sharma, P. K., & Dash, B. (2022). Prevention of phishing attacks using AI-based Cybersecurity
Awareness Training. International Journal of Smart Sensor and Adhoc Network., 6172.
https://doi.org/10.47893/ijssan.2022.1221
[9] Stevens, T. (2020). Knowledge in the grey zone: AI and cybersecurity. Digital War, 1(1-3), 164-170.
https://doi.org/10.1057/s42984-020-00007-w
[10] Trappe, W., & Straub, J. (2018). Cybersecurity: A New Open Access Journal. Cybersecurity, 1(1), 1.
https://doi.org/10.3390/cybersecurity1010001
[11] Catherine. (2021). Artificial Intelligence in Cyber Security - Impacts & Advancements. Intellipaat Blog. Retrieved
1 September 2021, from https://intellipaat.com/blog/artificial-intelligence-in-cyber-security/.
[12] Stoianov, N., & Ivanov, A. (2020). Public Key Generation Principles Impact Cybersecurity. Information & Security:
An International Journal, 47(2), 249-260. https://doi.org/10.11610/isij.4717
[13] Vlassis, N. (2007). A Concise Introduction to Multiagent Systems and Distributed Artificial Intelligence. Synthesis
Lectures On Artificial Intelligence And Machine Learning, 1(1), 1-71.
https://doi.org/10.2200/s00091ed1v01y200705aim002
[14] Perols, R., & Murthy, U. (2018). The Impact of Cybersecurity Risk Management Examinations and Cybersecurity
Incidents on Investor Perceptions. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.3112872
[15] Hamilton, W. (2020). Graph Representation Learning. Synthesis Lectures On Artificial Intelligence And Machine
Learning, 14(3), 1-159. https://doi.org/10.2200/s01045ed1v01y202009aim046
ISSN (O) 2278-1021, ISSN (P) 2319-5940
IJARCCE
International Journal of Advanced Research in Computer and Communication Engineering
ISO 3297:2007 CertifiedImpact Factor 7.39Vol. 11, Issue 9, September 2022
DOI: 10.17148/IJARCCE.2022.11912
© IJARCCE This work is licensed under a Creative Commons Attribution 4.0 International License 89
[17] Szepesvári, C. (2015). Algorithms for Reinforcement Learning. Synthesis Lectures On Artificial Intelligence And
Machine Learning, 4(1), 1-103. https://doi.org/10.2200/s00268ed1v01y201005aim009
[18] Hassanien, A., Haqiq, A., Tonellato, P., Bellatreche, L., Goundar, S., & Azar, A. et al. Proceedings of the
International Conference on Artificial Intelligence and Computer Vision (AICV2021).
[19] Puthal, D., & Mohanty, S. (2021). Cybersecurity Issues in AI. IEEE Consumer Electronics Magazine, 10(4), 33-35.
https://doi.org/10.1109/mce.2021.3066828
[20] Keen, E. (2021). The benefits and limitations of AI in cybersecurity - Help Net Security. Help Net Security. Retrieved
1 September 2021, from https://www.helpnetsecurity.com/2018/12/20/ai-cybersecurity-benefits-limitations/.
[21] Raedt, L., Kersting, K., Natarajan, S., & Poole, D. (2016). Statistical Relational Artificial Intelligence: Logic,
Probability, and Computation. Synthesis Lectures On Artificial Intelligence And Machine Learning, 10(2), 1-189.
https://doi.org/10.2200/s00692ed1v01y201601aim032
[22] Mengidis, N., Tsikrika, T., Vrochidis, S., & Kompatsiaris, I. (2019). Blockchain and AI for the Next Generation
Energy Grids: Cybersecurity Challenges and Opportunities. Information & Security: An International Journal, 43(1),
21-33. https://doi.org/10.11610/isij.4302
[23] Daily, J., & Gardiner, B. (2018). Cybersecurity Considerations for Heavy Vehicle Event Data Recorders. SAE
International Journal Of Transportation Cybersecurity And Privacy, 1(2), 113-143. https://doi.org/10.4271/11-01-
02-0006
[24] Vostoupal, J. (2021). The Cybersecurity Qualifications as the Prerequisite for the Cybersecurity Certification of
Entities. Jusletter-IT, (27-Mai-2021). https://doi.org/10.38023/2029e2f5-bd30-4757-aef5-01b27ae61962
[25] Vermesan, O., & Bacquest, J. Next Generation Internet of Things.
[26] Johnson, R. (2022, July 18). Artificial Intelligence in cybersecurity market size to reach USD 133.8 billion by 2030
driven by growing number of cyber attacks. Yahoo! Finance. Retrieved September 26, 2022, from
https://finance.yahoo.com/news/artificial-intelligence-cybersecurity-market-size-070000706.html
[27] Rada, R. (2014). Artificial intelligence. Artificial Intelligence, 28(1), 119-121. https://doi.org/10.1016/0004-
3702(86)90034-2
[28] Kravets, V. (2019). Comparative Analysis of the Cybersecurity Indices and Their Applications. Theoretical And
Applied Cybersecurity, 1(1). https://doi.org/10.20535/tacs.2664-29132019.1.169090
[29] Chung, S. (2021). AI-Based CYBERSECURITY: Benefits and Limitations. 1-2.
https://doi.org/10.22471/ai.2021.6.1.18
[30] Computer.org. (2021). The Impact of AI on Cybersecurity | IEEE Computer Society. Computer.org. Retrieved 1
September 2021, from https://www.computer.org/publications/tech-news/trends/the-impact-of-ai-on-cybersecurity/.
[31] Creese, S., Dutton, W., Esteve-Gonzalez, P., & Shillair, R. (2020). Cybersecurity Capacity Building: Cross-National
Benefits and International Divides. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.3658350
[32] Raghavan, V., Venkat N. Gudivada, & Venu Govindaraju. (2016). Cognitive Computing: Theory and Applications.
Elsevier Science.
[33] Here, P., Look, E., & Data, B. (2021). Impact of AI-Driven Cybersecurity in Fighting Data-Driven Cyberattacks.
SmartData Collective. Retrieved 1 September 2021, from https://www.smartdatacollective.com/how-ai-driven-
cybersecurity-drastically-impacts-our-lives/.
[34] upGrad. (2021). Artificial Intelligence in Cyber Security: Role, Impact, Applications & List of Companies | upGrad
blog. upGrad blog. Retrieved 1 September 2021, from https://www.upgrad.com/blog/artificial-intelligence-in-cyber-
security/.
[35] John, N. (2021). The Impact of AI and Machine Learning on CyberSecurity. Globaltechcouncil.org. Retrieved 1
September 2021, from https://www.globaltechcouncil.org/cyber-security/the-impact-of-ai-and-machine-learning-
on-cybersecurity/.
[36] Dubber, M., Pasquale, F., & Das, S. (2020). The Oxford Handbook of Ethics of AI. Oxford University Press,
Incorporated.
[37] Thomas, B. (2021). Artificial Intelligence in Cyber Security: Role, Impact, Applications & List of Companies |
upGrad blog. upGrad blog. Retrieved 1 September 2021, from https://www.upgrad.com/blog/artificial-intelligence-
in-cyber-security/.
[38] Xia, L. (2019). Learning and Decision-Making from Rank Data. Synthesis Lectures On Artificial Intelligence And
Machine Learning, 13(1), 1-159. https://doi.org/10.2200/s00876ed1v01y201810aim040
[39] Dash, B., Ansari, M. F., Sharma, P., & Ali, A. (2022). Threats and Opportunities with AI-based Cyber Security
Intrusion Detection: A Review. International Journal of Software Engineering & Applications, 13(5), 1321.
https://doi.org/10.5121/ijsea.2022.13502
[16]
Sharma, P., Dash, B., & Ansari, M. F. (2022). Anti-phishing techniques – a review of Cyber Defense
Mechanisms. IJARCCE, 11(7). https://doi.org/10.17148/ijarcce.2022.11728
ISSN (O) 2278-1021, ISSN (P) 2319-5940
IJARCCE
International Journal of Advanced Research in Computer and Communication Engineering
ISO 3297:2007 CertifiedImpact Factor 7.39Vol. 11, Issue 9, September 2022
DOI: 10.17148/IJARCCE.2022.11912
© IJARCCE This work is licensed under a Creative Commons Attribution 4.0 International License 90
BIOGRAPHY
Bibbu Dash is a data Architect in a Fortune 100 financial organization in Madison, WI. He completed his Ph.D. in
Information Technology from the University of the Cumberlands, Kentucky. Bibhu has also completed his Master of
Engineering in Electronics and Communication Engg. and MBA from Illinois State University, Normal, IL. Bibhu's
research interests include AI, Cloud Computing, Big Data, and Blockchain technologies.
Meraj Farheen Ansari completed her Ph.D. (IT) from the Graduate School of Information Technology, University of
the Cumberlands. She also completed her MBA with a Specialization in Management Information Systems from
Concordia University, Milwaukee, WI, USA. Her research interests include cybersecurity awareness, eliminating Cyber
Threats, & ML. Her current research involves making organizational employees aware of cyber security threats using AI
awareness programs. Currently, she is a Cyber Security Analyst at Northern Trust Bank, Chicago, IL.
Pawankumar Sharma is a Senior Product Manager for Walmart in San Bruno, California. He is currently on his Ph.D.
in Information Technology at the University of the Cumberlands, Kentucky. Pawankumar completed his Master of
Science in Management Information Systems from the University of Nebraska at Omaha in 2015. He also holds another
Master of Science in Information Systems Security from the University of the Cumber lands, Kentucky, and graduated
in 2020. His research interests are cyber security, Artificial Intelligence, Cloud Computing, Neural Networks,
Information Systems, Big Data Analytics, and Intrusion Detection and Prevention.
Nikhitha Yathiraju completed her Ph.D. (IT) from the Graduate School of Information Technology, University of the
Cumberlands. She also completed her Master’s in computer sciences from Silicon Valley university, USA in 2016. She
works as a Lead QA automation engineer and a teaching assistant at Silicon Valley university. Her research interests
include cybersecurity awareness, Cloud technologies, IoT, AI & ML.
... Additionally, the increased use of social media for business purposes has also created new vulnerabilities that AI-powered cyber security solutions can address [69][70][71]. Figure 6 summarizes the anticipated global growth in AI-powered cyber security market. Figure 6: Anticipated global growth of AI-powered cyber security market [72]. ...
Article
Full-text available
As we navigate the digital era of the 21st century, cyber security has grown into a pressing societal issue that requires innovative, cutting-edge solutions. In response to this pressing need, Artificial Intelligence (AI) has emerged as a revolutionary instrument, causing a paradigm shift in cyber security. AI's prowess resides in its capacity to process and analyze immense quantities of heterogeneous cyber security data, thereby facilitating the efficient completion of crucial tasks. These duties, which include threat detection, asset prioritization, and vulnerability management, are performed with a level of speed and accuracy that far exceeds human capabilities, thereby transforming our approach to cyber security. This document provides a comprehensive dissection of AI's profound impact on cyber security, as well as an in-depth analysis of how AI tools not only augment, but in many cases transcend human-mediated processes. By delving into the complexities of AI implementation within the realm of cyber security, we demonstrate the potential for AI to effectively anticipate, identify, and preempt cyber threats, empowering organizations to take a proactive stance towards digital safety. Despite these advancements, it is essential to consider the inherent limitations of AI. We emphasize the need for sustained human oversight and intervention to ensure that cyber security measures are proportionate and effective. Importantly, we address potential ethical concerns and emphasize the significance of robust governance structures for the responsible and transparent use of artificial intelligence in cyber security. This paper clarifies the transformative role of AI in reshaping cyber security strategies, thereby contributing to a safer, more secure digital future. In doing so, it sets the groundwork for further exploration and discussion on the use of AI in cyber security, a discussion that is becoming increasingly important as we continue to move deeper into the digital age.
... Secondly, there may be dangers based on AI or rising threats. Additionally, the expense of preventing threats rises due to the high cost of hiring specialists (Ansari et al., 2022). The development and application of algorithms to identify those dangers likewise involve a lot of time, money, and effort. ...
Article
Full-text available
Due to its ability to evaluate security threats in real-time and take appropriate action, artificial intelligence has emerged as a key component of cyber security. AI now has a bigger impact on spotting and stopping attacks that keep businesses on the cutting edge. Threat detection and prevention are the main focus of AI's role in cybersecurity. Artificial intelligence can detect trends and anomalies in network traffic and user behavior that may indicate a potential cyberattack through the use of machine learning algorithms and advanced data analysis. This allows security personnel to respond to potential attacks quickly and proactively. Through predictive modeling, AI can be used to prevent attacks. AI also can recognize potential threats before they occur and take action to avoid them by assessing past attacks and detecting similarities. Creating automated incident response systems is another important function of artificial intelligence in cybersecurity. These systems can evaluate data, identify potential risks, and then work to contain or mitigate the attack, minimizing damage and disruption. Businesses must employ artificial intelligence in cybersecurity to protect their networks and sensitive data from ever changing online threats. Because of its ability to analyze vast volumes of data in real time and automate incident response, AI is swiftly becoming into a key tool for efficient cybersecurity in today's digital environment. In this paper, we will discuss the role of AI in cybersecurity including its uses in threat detection and prevention.
... Artificial intelligence algorithms can be taught to recognize common forms of assault and to spot novel ones that have certain traits. Patching security holes, keeping tabs on network traffic, and handling incidents are just some of the mundane responsibilities that may be automated with the help of AI [53,54]. Cybersecurity experts can then devote their time and energy to solving problems that call for their unique set of skills. ...
Article
Full-text available
Smart contracts (SCs) are digital agreements that execute themselves and are stored on a blockchain. Despite the fact that they offer numerous advantages, such as automation and transparency, they are susceptible to a variety of assaults due to their complexity and lack of standardization. In this paper, we investigate the use of artificial intelligence (AI) to improve SC security. We provide an overview of Smart Contracts (SCs) and blockchain technology, as well as a discussion of possible SC-based attacks. Then, we introduce various AI categories and their applications in cybersecurity, followed by a thorough analysis of how AI can be used to enhance SC security. We also highlight the open questions and future directions of research in this field. Our research demonstrates that AI can provide an effective defense against assaults on SCs and contribute to their security and dependability. This article lays the groundwork for future research in the field of AI for SC security.
Book
Full-text available
Este trabalho destaca que a cibersegurança é um assunto necessariamente multidimensional, multissetorial e, frequentemente, transnacional. Tal natureza é evidente, considerando que a elaboração e implementação de conceitos, estratégias, normas, ferramentas e mecanismos de governança de cibersegurança depende de atores de natureza extremamente diferente – pública, privada, associativa etc. – que não são necessariamente localizados na mesma jurisdição. Ao mesmo tempo, ciberataques implicam frequentemente atores de natureza diferente localizados em várias jurisdições, tornando a cooperação internacional uma necessidade não somente para conseguir respostas apropriadas aos ciberataques, mas, ainda mais basicamente, para conseguir um nível de certeza adequado na atribuição mesma dos ataques. Assim, esta obra oferece uma análise do quadro regulatório da cibersegurança no Brasil sob perspectiva sistêmica centrada nas pessoas e na soberania digital e propõe uma minuta de Marco regulatório de cibersegurança e soberania digital.
Conference Paper
Full-text available
In the modern world, drones or unmanned aerial vehicles (UAVs) are utilized for many different things and have lately attracted much scientific attention to the changing geo-political state. In addition to the military and businesses, scientists and researchers have used drones to study space and the ocean and find endangered species. Improved remote control and better communications are essential for any drone operation, which got a boost with innovation in 5G networks. A successful and fully operational modern 5G wireless network requires artificial intelligence (AI) procedures. Current 4G networks' reactive architecture with all-IP (Internet Protocol) internet access leads to inferior spectrum efficiency. Due to developments in AI and related subfields, such as machine learning and deep learning, fifth-generation (5G) wireless networks may now be proactive and predictive. The improved AI and sensor technology features are critical to achieving the 5G target and innovation with UAV techs. The study examines the possibilities of AI-based solutions in relation to UAV and 5G smart devices. The goal is to evaluate the various obstacles and unresolved problems facing UAV advancements and how the UAV revolution is changing the globe.
Article
Full-text available
Internet usage has increased quickly, particularly in the previous decade. With the widespread use of the internet, cybercrime is growing at an alarming rate in our daily lives. However, with the growth of artificial intelligence (AI), businesses are concentrating more on preventing cybercrime. AI is becoming an essential component of every business, affecting individuals worldwide. Cybercrime is one of the most prominent domains where AI has begun demonstrating valuable inputs. As a result, AI is being deployed as the first line of defense in most firms' systems. Because AI can detect new assaults faster than humans, it is the best alternative for constructing better protection against cybercrime. AI technologies also offer more significant potential in the development of such technology. This paper discusses recent cyber intrusions and how the AI-enabled industry is preparing to defend itself in the long run.
Article
Full-text available
Phishing has been a constant issue across the global community. The approach has primarily been related to most attackers gaining access to sensitive information about users. Lack of awareness is among the main factors that result in successful phishing attacks. There are different types of phishing attacks available. However, cybersecurity specialists have developed algorithms that have effectively prevented phishing attacks. The report below includes information on anti-phishing algorithms that can detect phishing attacks. The algorithms include different technologies and capabilities that promote safety for most individuals. The paper focuses on describing each of these concepts and how they promote cybersecurity across the globe.
Article
Full-text available
Machine learning has been described as an effective measure in avoiding most cyber attacks. The development of AI has therefore promoted increased security for most computer attacks. Phishing attacks are risky and can be prevented through AI-based solutions. This factor suggests the need for increased awareness of cyber security through AI. Developing awareness for most people will prevent these types of attacks. The research paper describes how the awareness of AI-based cyber security could ensure a reduction of phishing attacks. The paper, therefore, showcases the effectiveness of AI-based cyber security awareness training and how it may influence cyber-attacks.
Article
Full-text available
The rise in urban population and technological innovation has resulted in climatic, technological, and economic changes that can severely impact the value of life in cities. In reaction to the changes, the idea of smart cities has been developed, which refers to the novel application of information communication technology to minimize the severe impacts on the cities and their occupants. Artificial Intelligence is among the technologies being adopted to develop smart cities. Research shows that Artificial Intelligence (AI) is improving rapidly, and it plays a substantial role in helping intelligent city-wide systems in various domains. Thus, it is vital to decide the modern research advances to realize the role played by Artificial Intelligence in smart cities for intelligence gathering and dissemination. Also, there is a need to analyze the relationship between Artificial Intelligence and smart cities scientifically. To identify this relationship, this research paper will focus on the role of Artificial Intelligence, its applications, and the challenges associated with concepts and technologies identified as Artificial Intelligence in smart cities. Therefore, this research paper attempts to give insights into Artificial Intelligence's role in smart cities for intelligence gathering and dissemination.
Article
Full-text available
AI security is vital; however, it should be designed carefully by considering the suitable assurance processes based on system requirements. Data should be secure throughout the process of an AI system. The use case3 of self-driving cars is briefly considered.
Conference Paper
Full-text available
Public key cryptography algorithms are based on number theory laws and principles. For every cryptography system one of the most important is-sues is the user’s key which he/she uses to encrypt the messages. That is the reason the key generation process is always fundamental for data protection and, since cryptography takes up more space in our daily lives, the public key generation principles are so important. In this article the authors discuss the Miller–Rabin primality test in its relation to the key generation process.