A CRITICAL EXAMINATION OF SHIELDING THE CYBERSPACE: A REVIEW ON THE ROLE OF AI IN CYBER SECURITY
DOI:
https://doi.org/10.26662/ijiert.v9i9.pp55-60Keywords:
Cyber Security, Artificial Intelligence, Ethics, Machine learning, Cyber Threats, Virus, Malware, Syntactic Variations, Threat Detection, Bots, IT infrastructure.Abstract
This review focuses on the critical analysis of AI’s role in cybersecurity to investigate the issues in the cybersecurity space. By utilizing synchronous and scattered sources on the topic in question, the opinion paper focuses capacity on AI-embedded technologies to enhance cybersecurity and discourage cyber-attacks making critical infrastructure impenetrable by malicious persons [1]. The paper is concerned with applying AI solutions paired with research documenting theoretical outcomes obtained from academic sources, field reports, and practical case examples. Suggestions, pros, and cons of those solutions, as well as the implications, are presented. More importantly, the paper does not only touch on the ethical and policy aspects of AI application in cyber security, but there is also a need for a detailed approach to cyber security, an approach that unites technological innovation to privacy, transparency, and accountability [1]. In contrast, the article brings attention to future developments and innovations in AI-based cybersecurity, which is a crucial need of the hour. AI evolution is seen in different aspects, such as designing complex Machine Learning algorithms till the inclusion of AI in Security Operations Centers (SOCs) and Threat Intelligence Platforms, which have prepared reliable weapons for cyber defense systems.
Downloads
Published
Issue
Section
License
Copyright (c) 2022 International Journal of Innovations in Engineering Research and Technology

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License (CC BY-NC-ND 4.0 DEED).
You are free to:
- Share — copy and redistribute the material in any medium or format
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- NonCommercial — You may not use the material for commercial purposes .
- NoDerivatives — If you remix, transform, or build upon the material, you may not distribute the modified material.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
Rights of Authors
Authors retain the following rights:
1. Copyright and other proprietary rights relating to the article, such as patent rights,
2. the right to use the substance of the article in future works, including lectures and books,
3. the right to reproduce the article for own purposes, provided the copies are not offered for sale,
4. the right to self-archive the article.