Articles | Open Access | https://doi.org/10.37547/ijasr-03-10-16

A THOROUGH EXPLORATION OF ARTIFICIAL INTELLIGENCE'S ROLE IN CYBERSECURITY THROUGH LITERARY ANALYSIS

Elyor Nasrullayev Tashkent University of Information Technologies named after Muhammad al-Khwarizmi Tashkent, Uzbekistan Zumrad Zarifova Tashkent University of Information Technologies named after Muhammad al-Khwarizmi Tashkent, Uzbekistan Tuyboyov Oybek Valijonovich Associate professor of the department of Mechanical Engineering, Tashkent State Technical University named after Islam Karimov, Tashkent, Uzbekistan

Abstract

This paper explores the integration of artificial intelligence (AI) in cybersecurity. While centralized digital systems enable secure communication, the digital revolution has brought new risks, including unauthorized data mining. Relying on service providers for central solutions results in redundancy, security flaws, and user complexities. Ensuring the privacy and security of dispersed digital identities hinges on robust digital authentication and verification. However, there's a lack of comprehensive studies on unified communications, user privacy, and data security within identity management systems. Blockchain technology holds great promise for digital identity management and verification. It addresses the need for more secure data storage and exchange. Traditional security measures, coupled with human intervention, prove inadequate against the array of cybercrimes committed online. Cybersecurity's primary goal is minimizing threats through AI applications, which already demonstrate value in the field. AI methods hold potential for tackling specific cybersecurity challenges and advancing beneficial applications.

Keywords

Artificial intelligence, Blockchain technology, Cyber-attacks

References

Pawlicka, Kinga, and Monika Bal. "Sustainable Supply Chain Finances implementation model and Artificial Intelligence for innovative omnichannel logistics." Management 26.1 (2022).

Tojiboyev, Ikromjon, and Nuriddin Safoev. "The Influence and Limitations of AI in Cybersecurity Domain." Texas Journal of Engineering and Technology 18 (2023): 53-59.

Franki, Vladimir, Darin Majnarić, and Alfredo Višković. "A Comprehensive Review of Artificial Intelligence (AI) Companies in the Power Sector." Energies 16.3 (2023): 1077.

Sarker, Iqbal H. "Machine learning for intelligent data analysis and automation in cybersecurity: current and future prospects." Annals of Data Science (2022): 1-26.

Valijonovich, Tuyboyov Oybek, and Nuriddin Safoev. "A Brief Overview of Packet Classification Techniques in Computer Networks." Texas Journal of Engineering and Technology 18 (2023): 60-62.

de Freitas, Fabio Vinicius, Marcus Vinicius Mendes Gomes, and Ingrid Winkler. "Benefits and challenges of virtual-reality-based industrial usability testing and design reviews: A patents landscape and literature review." Applied Sciences 12.3 (2022): 1755.

George, A. Shaji, and S. Sagayarajan. "Acoustic Eavesdropping: How AIs Can Steal Your Secrets by Listening to Your Typing." Partners Universal International Innovation Journal 1.4 (2023): 1-14.

Möller, Dietmar PF. "Threats and Threat Intelligence." Guide to Cybersecurity in Digital Transformation: Trends, Methods, Technologies, Applications and Best Practices. Cham: Springer Nature Switzerland, 2023. 71-129.

Rani, Deepti, Nasib Singh Gill, and Preeti Gulia. "Classification of Security Issues and Cyber Attacks in Layered Internet of Things." Journal of Theoretical and Applied Information Technology 100.13 (2022): 4895-4913.

Kaur, Jasleen, Urvashi Garg, and Gourav Bathla. "Detection of cross-site scripting (XSS) attacks using machine learning techniques: a review." Artificial Intelligence Review (2023): 1-45.

Dang-Pham, Duy, et al. "Protecting organizational information security at home during the COVID-19 pandemic in Vietnam: exploratory findings from technology-organization-environment framework." Information Systems Research in Vietnam: A Shared Vision and New Frontiers. Singapore: Springer Nature Singapore, 2022. 83-96.

Srivastava, G., Jhaveri, R. H., Bhattacharya, S., Pandya, S., Maddikunta, P. K. R., Yenduri, G., ... & Gadekallu, T. R. (2022). XAI for cybersecurity: state of the art, challenges, open issues and future directions. arXiv preprint arXiv:2206.03585.

Nasrullayev, Nurbek, et al. "IMPLEMENTING PACKET CLASSIFICATION USING STANDARD ACL." International Journal of Advance Scientific Research 3.06 (2023): 63-71.

Dhayanidhi, Glory. "Research on IoT Threats & Implementation of AI/ML to Address Emerging Cybersecurity Issues in IoT with Cloud Computing." (2022).

Dalave, Chetan Vijaykumar, and Tushar Dalave. "A review on artificial intelligence in cyber security." Proc. 6th Int. Conf. Comput. Sci. Eng.(UBMK). 2022.

Wu, Mingxi. Intelligent Warfare: Prospects of Military Development in the Age of AI. Taylor & Francis, 2022.

Anderson, Kelly L., and Graham Cairns. "Participatory Practice in Space, Place, and Service Design." (2022).

Ahmad, Atif, et al. "How can organizations develop situation awareness for incident response: A case study of management practice." Computers & Security 101 (2021): 102122.

Article Statistics

Downloads

Download data is not yet available.

Copyright License

Download Citations

How to Cite

A THOROUGH EXPLORATION OF ARTIFICIAL INTELLIGENCE’S ROLE IN CYBERSECURITY THROUGH LITERARY ANALYSIS. (2023). International Journal of Advance Scientific Research, 3(10), 92-100. https://doi.org/10.37547/ijasr-03-10-16