Securing the Future: How Organizations Can Combat AI-Based Attacks
DOI:
https://doi.org/10.32628/CSEIT25113330Abstract
Artificial Intelligence (AI) in the field of cybersecurity is recognized as a double-edged sword; on one hand, it strengthens cyber defense, while on the other, cyber attackers also exploit it to create more sophisticated attacks (1). AI tools are highly effective for rapid data analysis and threat pattern recognition, which helps organizations prevent cyberattacks. For example, AI can identify attacks in real-time and prevent their progression—something that is challenging with traditional methods (2). However, hackers also use AI to design complex and deceptive attacks, bypassing security systems using advanced algorithms (3).
Downloads
References
World Economic Forum. Cybersecurity and AI: Here's what you need to know. Available from: https://www.weforum.org
R Street Institute. The Transformative Role of AI in Cybersecurity: Understanding Current Applications and Benefits. Available from: https://www.rstreet.org
National Institute of Standards and Technology. AI-Driven Cybersecurity: A Comprehensive Framework. 2023 [cited 2024 Oct 30]. Available from: https://nist.gov/ai-cybersecurity-framework
IEEE Xplore. Harnessing Artificial Intelligence Capabilities to Improve Cybersecurity. Available from: https://ieeexplore.ieee.org
Google Security Blog. Leveraging Machine Learning for Enhanced Security. 2024 [cited 2024 Oct 30]. Available from: https://security.googleblog.com/machine-learning-security
R Street Institute. The Transformative Role of AI in Cybersecurity: Understanding Current Applications and Benefits. Available from: https://www.rstreet.org
Cyber Defense Magazine. AI in Cybersecurity: Understanding Challenges, Opportunities and New Approaches. Available from: https://www.cyberdefensemagazine.com
BDO Insights. AI-Powered Cyber Attacks: Understanding and Mitigating the Risks. Available from: https://www.bdo.com
World Economic Forum. Cybersecurity and AI: Here's what you need to know. Available from: https://www.weforum.org
Fang Binxing, Shi Jinqiao, Wang Zhonggru, Yu Weiqiang. China Engineering Science, 201,23(03):60-66.
Gao Fei, Yan Zheng. Security threats and countermeasures of artificial intelligence empowered network attack [J]. Network Security Technology and Application,2022(04):18-19.
Hu Anjun. Artificial intelligence, comprehensive empowerment and economic cycle [J]. Contemporary Economic Management,202,44(05):58- 64.
Liu Zhangyi , Li Gang.Risk prevention and control of network ideology empowered by artificial intelligence: background, direction and approach [J]. Contemporary Communication,2022(03):56-58+84.
Pan Shuyang .The military application of American artificial intelligence under the strategic perspective of the third offset [D]. National University of Defense Technology,2019.
Mu Lin.Development characteristics of new network technologies and applications in network security field in 2019 [J]. China Information Security,2020(01):78-83.
Ji Tiantian, Fang Binxing, Cui Xiang, Wang Zhongru, Gan Ruiling, Han Yu, Yu Weiqiang Research progress of malicious code attack and defense enabled by deep learning [j] Journal of computer science, 2021,44 (04): 669-695.
Wang Yufu, Li Peichen, Yi Bo, Wang Xingwei. Journal of Guangzhou University (Natural Science edition), 201,20(02):1-12.
Yang Yu. Logic and Path of Artificial Intelligence technology enabling Communication Engineering Industry [J]. Marketing Industry,2021(31):103-104.
Avanzo Michele, Porzio Massimiliano, Lorenzon Leda et al. Artificial intelligence applications in medical imaging: A review of the medical physics research in Italy[J] Physica Medica, 2021, 83.
Kastriot Dermaku; Liridon Hoti; Selami Klaiqi;Hifoblina Dermaku;IP Packaging Filtering in Computer Networks Using Artificial Intelligence in the Regulatory Authority of Electronic and Communications Kosovo.Journal of Communications.Volume 17, Issue 2, 2022.
Barragán-Montero Ana, Javaid Umair, Valdés Gilmer et al. Artificial intelligence and machine learning for medical imaging: A technology review[J] Physica Medica, 2021, 83.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 International Journal of Scientific Research in Computer Science, Engineering and Information Technology

This work is licensed under a Creative Commons Attribution 4.0 International License.