Ravi Kumar, Sonia Mishra, Pradeesh Ashokan, 2024. "AI-Driven Threat Intelligence Platforms: A Revolution in Cybersecurity Monitoring and Response", ESP International Journal of Advancements in Computational Technology (ESP-IJACT) Volume 2, Issue 4: 154-163.
We acknowledge that the threat continues to change, and therefore, there is a need to use new technologies to support structures in cyber security. Cyber threat intelligence solutions supported by Artificial Intelligence (AI) are the innovative solutions implemented to identify, analyse and prevent cyber threats in advance. The current article offers a detailed review of threats with the help of AI-based solutions, focusing on the issue of monitoring and responding capabilities. Innovative elements of those platforms involve a breakdown of how machine learning algorithms, natural language processing, and predictive analytics can be incorporated into these tools. The discussed issues include data protection, algorithmic fairness or accountability, and practical implementation difficulties. This work supports the effectiveness of using AI by presenting case studies and experimental evaluations of response time, threat detection, and threat modeling. Prospective studies and implementation tactics for raising the usage of threat intelligence based on artificial intelligence algorithms are suggested in the last section of the article.
[1] Sarker, I. H. (2024). Introduction to AI-Driven Cybersecurity and Threat Intelligence. In AI-Driven Cybersecurity and Threat Intelligence: Cyber Automation, Intelligent Decision-Making and Explainability (pp. 3-19). Cham: Springer Nature Switzerland.
[2] Balantrapu, S. S. (2024). AI for Predictive Cyber Threat Intelligence. International Journal of Management Education for Sustainable Development, 7(7), 1-28.
[3] Sarker, I. H. (2024). AI-driven cybersecurity and threat intelligence: cyber automation, intelligent decision-making and explainability. Springer Nature.
[4] Zahra, Y., & Sanmorino, A. (2024). Exploring the Evolving Role of AI in Cybersecurity. European Journal of Privacy Law & Technologies.
[5] Sun, N., Ding, M., Jiang, J., Xu, W., Mo, X., Tai, Y., & Zhang, J. (2023). Cyber threat intelligence mining for proactive cybersecurity defense: a survey and new perspectives. IEEE Communications Surveys & Tutorials, 25(3), 1748-1774.
[6] Samtani, S., Abate, M., Benjamin, V., & Li, W. (2020). Cybersecurity as an industry: A cyber threat intelligence perspective. The Palgrave Handbook of International Cybercrime and Cyberdeviance, 135-154.
[7] Das, R., & Sandhane, R. (2021, July). Artificial intelligence in cyber security. In Journal of Physics: Conference Series (Vol. 1964, No. 4, p. 042072). IOP Publishing.
[8] Sommer, R., & Paxson, V. (2010, May). Outside the closed world: On using machine learning for network intrusion detection. In 2010 IEEE symposium on security and privacy (pp. 305-316). IEEE.
[9] Garfinkel, S., & Spafford, G. (2002). Web security, privacy & commerce. " O'Reilly Media, Inc.".
[10] Adawadkar, A. M. K., & Kulkarni, N. (2022). Cyber-security and reinforcement learning—a brief survey. Engineering Applications of Artificial Intelligence, 114, 105116.
[11] Cengiz, E., & Gök, M. (2023). Reinforcement learning applications in cyber security: A review. Sakarya University Journal of Science, 27(2), 481-503.
[12] Buczak, A. L., & Guven, E. (2015). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications surveys & tutorials, 18(2), 1153-1176.
[13] An, A. (2022). The Evolution of Cyber security Threats in the Digital Age. International Journal of Business Management and Visuals, ISSN: 3006-2705, 5(2), 22-29.
[14] Niakanlahiji, A., Wei, J., & Chu, B. T. (2018, December). A natural language processing based trend analysis of advanced persistent threat techniques. In 2018 IEEE International Conference on Big Data (Big Data) (pp. 2995-3000). IEEE.
[15] Silvestri, S., Islam, S., Amelin, D., Weiler, G., Papastergiou, S., & Ciampi, M. (2024). Cyber threat assessment and management for securing healthcare ecosystems using natural language processing. International Journal of Information Security, 23(1), 31-50.
[16] Bentz, D., & Schiller, D. (2015). Threat processing: models and mechanisms. Wiley interdisciplinary reviews: cognitive science, 6(5), 427-439.
[17] Feinstein, L., Schnackenberg, D., Balupari, R., & Kindred, D. (2003, April). Statistical approaches to DDoS attack detection and response. In Proceedings DARPA information survivability conference and exposition (Vol. 1, pp. 303-314). IEEE.
[18] Islam, S. M., Bari, M. S., Sarkar, A., Khan, A. O. R., & Paul, R. (2024). AI-Powered Threat Intelligence: Revolutionizing Cybersecurity with Proactive Risk Management for Critical Sectors. Journal of Artificial Intelligence General science (JAIGS) ISSN: 3006-4023, 7(01), 1-8.
[19] Qamar, S., Anwar, Z., Rahman, M. A., Al-Shaer, E., & Chu, B. T. (2017). Data-driven analytics for cyber-threat intelligence and information sharing. Computers & Security, 67, 35-58.
[20] Singh, U. K., Joshi, C., & Kanellopoulos, D. (2019). A framework for zero-day vulnerabilities detection and prioritisation. Journal of Information Security and Applications, 46, 164-172.
[21] Ravi Kumar, Rushil Shah, Shaurya Jain, 2024. "Privacy-Preserving Machine Learning: Balancing Innovation and Data Security" ESP International Journal of Advancements in Science & Technology (ESP-IJAST), Volume 2, Issue 3: 82-94.
AI-Driven, Threat Intelligence, Machine Learning, Predictive Analytics, Cybersecurity.