Artificial Intelligence in Security and Privacy: A Study on AI's Role in Cybersecurity and Data Protection

PDF (236KB), PP.44-51

Views: 0 Downloads: 0

Author(s)

Mahmoud Mohamed 1,* Khaled Alosman 1

1. Electrical and Computer Engineering, King Abdul Aziz University, Saudi Arabia

* Corresponding author.

DOI: https://doi.org/10.5815/ijeme.2025.01.04

Received: 27 May 2024 / Revised: 27 Jul. 2024 / Accepted: 1 Nov. 2024 / Published: 8 Feb. 2025

Index Terms

Artificial Intelligence, Cybersecurity, Data Protection, Machine Learning

Abstract

The increase in value of security and privacy is compounded by the rapid advancements in the digital landscape sprouting new problems in information security. This research explores the use of artificial intelligence (AI) to enhance cybersecurity and to strengthen data protection. This research aims to first assess and critically evaluate the potential of applying AI methods to improve predicting, mitigating, and resolving cyber threats while addressing important ethical issues. Specifically, it wants to determine AI’s advantages compared to traditional cybersecurity ways and the plausible technological risks and ethical implications associated with its use. We show that AI tools, especially machine learning and deep learning, can greatly aid the threat detection and response automation. The rise of AI, however, brings forth new vulnerabilities and necessitates stronger ethical frameworks to preclude their misuse. This study offers a balanced view of potential with AI and hazards. The results emphasize the importance of AI in securing both the cybersecurity and data protection portfolio, and urge strongly for ethical standards to be met and the research to be continued in order to mitigate risks and promote responsible AI integration.

Cite This Paper

Mahmoud Mohamed, Khaled Alosman, "Artificial Intelligence in Security and Privacy: A Study on AI's Role in Cybersecurity and Data Protection", International Journal of Education and Management Engineering (IJEME), Vol.15, No.1, pp. 44-51, 2025. DOI:10.5815/ijeme.2025.01.04

Reference

[1]Alazab, M., Venkatraman, S., & Watters, P. (2018). Cybersecurity threats classification: A machine learning approach. Journal of Network and Computer Applications, 107, 71-80.
[2]Arshad, H., & Tariq, M. (2020). Artificial intelligence for cybersecurity: A review of trends, challenges, and opportunities. Journal of Network and Computer Applications, 152, 102495.
[3]Asghar, H., Imran, M., Zia, T., & Mahmood, K. (2017). Cyber security threats and vulnerabilities: An overview. Journal of Cyber Security Technology, 1(1), 1-12.
[4]Bacivarov, I., & Cotorobai, A. (2020). An overview of artificial intelligence for cybersecurity. Journal of Cybersecurity, 6(1), tyaa003.
[5]Besharati, A., & Haddadi, H. (2019). A novel deep learning approach for intrusion detection in wireless sensor networks. Journal of Network and Computer Applications, 128, 1-12.
[6]Bhatia, S., & Sharma, A. (2018). A survey on artificial intelligence and its application in cyber security. International Journal of Computer Sciences and Engineering, 6(10), 256-260.
[7]Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153-1176.
[8]Meidan, Y., Bohadana, M., Mathov, Y., Mirsky, Y., Shabtai, A., Breitenbacher, D., & Elovici, Y. (2018). Detection of unauthorized IoT devices using machine learning techniques. arXiv preprint arXiv:1803.00742.
[9]Wang, Y., Cui, Q., Sun, J., Shen, J., Shen, X., & Zheng, X. (2019). A privacy-preserving deep learning approach for face recognition with cloud support. Journal of Parallel and Distributed Computing, 130, 33-43.
[10]Mittelstadt, B., Allo, P., Taddeo, M., Wachter, S., & Floridi, L. (2016). The ethics of algorithms: Mapping the debate. Big Data & Society, 3(2).
[11]Garcia, D. (2020). Bias and fairness in AI decision-making: A review. IEEE Access, 8, 200380-200399.
[12]Garcia, M. (2020). Challenges in machine learning for cybersecurity: A review. Journal of Cybersecurity and Privacy, 4(1).
[13]Shiravi, A., Shiravi, H., Tavallaee, M., & Ghorbani, A. A. (2012). Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Computers & Security, 31(3), 357-374.
[14]Ahmadian, A., He, Y., Kauppinen, I., & Pournaras, E. (2020). Privacy-aware big data analytics as a service for public health policies in smart cities. Sustainable Cities and Society, 54, 102003.
[15]Zeng, Y., Tang, D., & Seneviratne, O. (2019). Cloud-based data leakage detection for trustworthy lifecycle management of personal data. Journal of Cloud Computing, 8(1), 1-17.
[16]Shen, C., Cai, Z., Guan, X., & Du, Y. (2017). Detecting credit card frauds by learning from imbalanced data. In 2017 IEEE Symposium Series on Computational Intelligence (SSCI) (pp. 1-7). IEEE.
[17]Zhou, Q., Du, J., Liu, Y., Chen, Y., & Zhao, J. (2020). Privacy-preserving distributed deep learning and its applications. Journal of Parallel and Distributed Computing, 143, 58-69.
[18]Jha, S., & Kumar, V. (2019). An overview of artificial intelligence for cyber security. International Journal of Advanced Research in Computer Science and Software Engineering, 9(8), 58-66.
[19]Jose, J., & Dhanapal, R. (2019). A survey on artificial intelligence for cyber security. International Journal of Advanced Science and Technology, 28(10), 771-781.
[20]Kaur, A., & Singh, A. (2020). Artificial intelligence techniques for cyber security: A review. International Journal of Humanistic Computing, 3(2), 1-9.
[21]Kumar, A., & Gupta, S. (2020). Artificial intelligence-based cyber security: A systematic review. Journal of Ambient Intelligence and Humanized Computing, 11(11), 4885-4905.
[22]Kumar, A., & Singh, S. (2021). Artificial intelligence in cyber security: A review and future directions. Journal of Ambient Intelligence and Humanized Computing, 12(7), 7709-7726.
[23]Kumar, S., & Singh, A. (2020). A survey on artificial intelligence in cyber security. Journal of Information Security, 11(1), 1-20.
[24]Liao, Y., Huang, Z., & Zhang, H. (2019). A survey on artificial intelligence for cyber security. Journal of Cyber Security Technology, 3(2), 67-85.
[25]Liu, Y., & Li, X. (2019). Artificial intelligence and cyber security: A survey. International Journal of Information Management, 47, 146-157.
[26]Mahajan, A., & Gupta, A. (2020). Artificial intelligence techniques for cyber security: A review. International Journal of Advanced Science and Technology, 29(1), 1843-1852.