Artificial Intelligence in Cybersecurity: Advancing Intelligent Threat Detection, Prevention, and Automated Response

Authors

Muhammed Sanad V. K.

School of Computer Science and Information Technology, Jain (Deemed to be University) (India)

M. S. Bhavath Krishna

School of Computer Science and Information Technology, Jain (Deemed to be University) (India)

Eldhose James

School of Computer Science and Information Technology, Jain (Deemed to be University) (India)

Dr. Suma S.

School of Computer Science and Information Technology, Jain (Deemed to be University) (India)

Article Information

DOI: 10.51584/IJRIAS.2026.110400103

Subject Category: Computer Science

Volume/Issue: 11/4 | Page No: 1428-1432

Publication Timeline

Submitted: 2026-04-18

Accepted: 2026-04-24

Published: 2026-05-11

Abstract

The digital world is expanding fast, but so are the cracks in its armor. Traditional security tools are failing to keep up with the sheer volume of modern cyber threats. This paper takes a hard look at how Artificial Intelligence (AI) is stepping in to fix this mess. We're shifting from a reactive defense strategy to one that predicts attacks before they land. We explore how AI is being used to detect intrusions, classify malware, and stop phishing, while also being honest about the risks, like attackers using AI against us and the problem of opaque algorithms we can't explain. The bottom line? AI isn't a magic fix, but it’s the only way we stand a chance against the speed of modern cybercrime.

Keywords

Computer Science, Cybersecurity, Artificial Intelligence

Downloads

References

1. Alotaibi, A., & Rassam, M. A. (2023). Adversarial Machine Learning Attacks against Intrusion Detection Systems: A Survey on Strategies and Defense. *Future Internet*. [Google Scholar] [Crossref]

2. Chaulagain, B. R., Pandey, A., Basnet, S. R., & Shakya, S. (2021). Hybrid Malware Detection Using Deep Learning and Data Fusion. [Google Scholar] [Crossref]

3. Foley, M., O'Reilly, P., & O'Sullivan, D. (2022). Autonomous Network Defence using Reinforcement Learning. *Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security*. [Google Scholar] [Crossref]

4. Gu, J., & Lu, S. (2021). An Effective Intrusion Detection Approach Using SVM with Naïve Bayes Feature Embedding. *Computers & Security*. [Google Scholar] [Crossref]

5. Hindy, H., Brosset, D., Bayne, E., Seeam, A., Tachtatzis, C., Atkinson, R., & Bellekens, X. (2020). A Taxonomy of Network Threats and the Effect of Current Datasets on Intrusion Detection Systems. *IEEE Access*. [Google Scholar] [Crossref]

6. Karki, M., & Nasoz, F. (2022). Comparative Analysis of BERT, RoBERTa, and DistilBERT for Phishing Email Detection. *IEEE Access*. [Google Scholar] [Crossref]

7. Sahingoz, O. K., Buber, E., Demir, O., & Diri, B. (2019). Machine Learning Based Phishing Detection from URLs. *Expert Systems with Applications*. [Google Scholar] [Crossref]

8. Sarker, I. H. (2021). As models get smarter, they get darker. We can't see inside them. This "Black Box" issue is a dealbreaker for critical infrastructure. And it gets worse: "Adversarial AI" is real. Attackers are using their own AI to generate. [Google Scholar] [Crossref]

9. . *SN Computer Science*. [Google Scholar] [Crossref]

10. Shelar, P., & Rao, S. (2021). Enhanced Capsule Network-based Executable Files Malware Detection and Classification. *Concurrency and Computation: Practice and Experience*. [Google Scholar] [Crossref]

11. Zhang, Y., & Wang, Q. (2024). Explainable Artificial Intelligence (XAI) for Cybersecurity: A Survey of Recent Trends. *Journal of Network and Computer Applications*. [Google Scholar] [Crossref]

Metrics

Views & Downloads

Similar Articles