Advances in AI for Financial, Cyber, and Healthcare Analytics: A Multidisciplinary Approach

Applicability of AI in Cyber Security

Author(s): Akshat Gautam*, Esha Singh, Komal Shakya and Ajeet Kumar Sharma

Pp: 106-124 (19)

DOI: 10.2174/9798898810542125010011

* (Excluding Mailing and Handling)

Abstract

Connectivity, data proliferation, and technology have gained great advantages in this age of digitization. However, these advantages bring significant cybersecurity challenges. Especially with the advancement of malware, phishing attacks, and ransomware, advances like these are making it challenging to stay ahead in traditional security practices.

The advanced complexity in cyber security arises from these developments, like cloud computing, the Internet of Things, and mobile technologies. Organizations now have to shield not only their traditional networks but also environments based on the cloud, endpoints, and third-party integrations. The more interconnected devices and systems grow, the harder they are to secure from Distributed Denial of Service attacks and data breaches, for instance. An important challenge would be the time it takes to detect and respond to cyber incidents. Traditional security systems rely on static rules or signature-based methods, which make them ineffective at changing attack tactics. Artificial Intelligence has emerged as one of the significant transformative elements within the realm of cybersecurity, offering improved methodologies for the detection, prevention, and alleviation of cyber threats. With the complexity and intricacy of cyberattacks on the rise, AI-driven systems offer a much more advanced system than conventional security approaches. Further, artificial intelligence can predict potential weaknesses and automate redundant security functions so that cybersecurity experts can focus on strategic matters. This chapter analyses the increasing role of artificial intelligence in the cyber defense strategy and its potential use in different sectors of security. 


Keywords: Artificial intelligence, Cyber security, Cyber attack, Network security.

Related Journals
Related Books
© 2025 Bentham Science Publishers | Privacy Policy