The Enhancing Cybersecurity with AI Algorithms and Big Data Analytics: Challenges and Solutions

Authors

  • Setiyo Adi Nugroho Universitas Sains dan teknologi komputer
  • Sumaryanto Universitas Sains dan Teknologi Komputer
  • Andik Prakasa Hadi Universitas Sains dan Teknologi Komputer

DOI:

https://doi.org/10.51903/jtie.v3i3.200

Keywords:

Cybersecurity Optimization , Artificial Intelligence (AI) , Big Data Analytics , Threat Detection , Explainable AI (XAI)

Abstract

As digital transformation accelerates across industries, cybersecurity faces escalating challenges due to increasingly sophisticated cyber threats. This study explores the integration of artificial intelligence (AI) algorithms and big data analytics to enhance cybersecurity systems, focusing on addressing data integration and interpretability issues. Employing a descriptive-qualitative methodology, the research analyzes literature, case studies, and secondary data to evaluate the effectiveness of AI and big data in detecting and mitigating cyber threats. Key findings reveal that deep learning algorithms, such as artificial neural networks, achieved an accuracy of 93% in anomaly detection, outperforming traditional rule-based approaches by 18%. Additionally, big data platforms like Spark demonstrated superior efficiency, processing 500 GB of data in 35 seconds compared to Hadoop’s 60 seconds. However, the study identifies challenges related to the interpretability of AI models and the complexity of integrating diverse datasets, which impede real-time threat detection. Periodic updates to AI training datasets were found to improve detection accuracy by up to 15%, emphasizing the importance of adaptive learning models. This research contributes to the field by proposing strategies to enhance system resilience, including adopting Explainable AI (XAI) for transparency and advanced data integration techniques. The findings underscore the potential of AI and big data to revolutionize cybersecurity, offering organizations a proactive approach to combating evolving cyber threats. Future studies should focus on sector-specific implementations and optimizing response mechanisms for comprehensive security frameworks.

References

Adebimpe Bolatito Ige, Eseoghene Kupa, & Oluwatosin Ilori. (2024). Best Practices in Cybersecurity for Green Building Management Systems: Protecting Sustainable Infrastructure from Cyber Threats. International Journal of Science and Research Archive, 12(1), 2960–2977. https://doi.org/10.30574/ijsra.2024.12.1.1185

Admass, W. S., Munaye, Y. Y., & Diro, A. A. (2024). Cyber Security: State of the Art, Challenges and Future Directions. Cyber Security and Applications, 2, 100031. https://doi.org/10.1016/j.csa.2023.100031

Al-Taleb, N., & Saqib, N. A. (2022). Towards a Hybrid Machine Learning Model for Intelligent Cyber Threat Identification in Smart City Environments. Applied Sciences, 12(4), 1863. https://doi.org/10.3390/app12041863

Al Ka’bi, A. (2023). Proposed Artificial Intelligence Algorithm and Deep Learning Techniques for Development of Higher Education. International Journal of Intelligent Networks, 4, 68–73. https://doi.org/10.1016/j.ijin.2023.03.002

Anderson, A. W., Marinovich, M. L., Houssami, N., Lowry, K. P., Elmore, J. G., Buist, D. S. M., Hofvind, S., & Lee, C. I. (2022). Independent External Validation of Artificial Intelligence Algorithms for Automated Interpretation of Screening Mammography: A Systematic Review. Journal of the American College of Radiology, 19(2), 259–273. https://doi.org/10.1016/j.jacr.2021.11.008

Aslan, Ö., Aktuğ, S. S., Ozkan-Okay, M., Yilmaz, A. A., & Akin, E. (2023). A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions. Electronics, 12(6), 1333. https://doi.org/10.3390/electronics12061333

Babar, M., Jan, M. A., He, X., Tariq, M. U., Mastorakis, S., & Alturki, R. (2023). An Optimized IoT-Enabled Big Data Analytics Architecture for Edge-Cloud Computing. IEEE Internet of Things Journal, 10(5), 3995–4005. https://doi.org/10.1109/jiot.2022.3157552

Batko, K., & Ślęzak, A. (2022). The Use of Big Data Analytics in Healthcare. Journal of Big Data, 9(1), 3. https://doi.org/10.1186/s40537-021-00553-4

Berisha, B., Mëziu, E., & Shabani, I. (2022). Big Data Analytics in Cloud Computing: An Overview. Journal of Cloud Computing, 11(1), 24. https://doi.org/10.1186/s13677-022-00301-w

Chen, J., Ramanathan, L., & Alazab, M. (2021). Holistic Big Data Integrated Artificial Intelligent Modeling to Improve Privacy and Security in Data Management of Smart Cities. Microprocessors and Microsystems, 81, 103722. https://doi.org/10.1016/j.micpro.2020.103722

Cheng, L., Varshney, K. R., & Liu, H. (2021). Socially Responsible AI Algorithms: Issues, Purposes, and Challenges. Journal of Artificial Intelligence Research, 71, 1137–1181. https://doi.org/10.1613/jair.1.12814

Dameff, C., Tully, J., Chan, T. C., Castillo, E. M., Savage, S., Maysent, P., Hemmen, T. M., Clay, B. J., & Longhurst, C. A. (2023). Ransomware Attack Associated with Disruptions at Adjacent Emergency Departments in the US. JAMA Network Open, 6(5), 2312270. https://doi.org/10.1001/jamanetworkopen.2023.12270

Dasgupta, D., Akhtar, Z., & Sen, S. (2022). Machine Learning in Cybersecurity: A Comprehensive Survey. Journal of Defense Modeling and Simulation, 19(1), 57–106. https://doi.org/10.1177/1548512920951275

Fathi, M., Haghi Kashani, M., Jameii, S. M., & Mahdipour, E. (2022). Big Data Analytics in Weather Forecasting: A Systematic Review. Archives of Computational Methods in Engineering, 29(2), 1247–1275. https://doi.org/10.1007/s11831-021-09616-4

Firat Kilincer, I., Ertam, F., Sengur, A., Tan, R. S., & Rajendra Acharya, U. (2023). Automated Detection of Cybersecurity Attacks in Healthcare Systems with Recursive Feature Elimination and Multilayer Perceptron Optimization. Biocybernetics and Biomedical Engineering, 43(1), 30–41. https://doi.org/10.1016/j.bbe.2022.11.005

Georgiadis, G., & Poels, G. (2022). Towards a Privacy Impact Assessment Methodology to Support the Requirements of the General Data Protection Regulation in a Big Data Analytics Context: A Systematic Literature Review. Computer Law & Security Review, 44, 105640. https://doi.org/10.1016/j.clsr.2021.105640

Ghiasi, M., Niknam, T., Wang, Z., Mehrandezh, M., Dehghani, M., & Ghadimi, N. (2023). A Comprehensive Review of Cyber-Attacks and Defense Mechanisms for Improving Security in Smart Grid Energy Systems: Past, Present and Future. Electric Power Systems Research, 215, 108975. https://doi.org/10.1016/j.epsr.2022.108975

Hassija, V., Chamola, V., Mahapatra, A., Singal, A., Goel, D., Huang, K., Scardapane, S., Spinelli, I., Mahmud, M., & Hussain, A. (2024). Interpreting Black-Box Models: A Review on Explainable Artificial Intelligence. Cognitive Computation, 16(1), 45–74. https://doi.org/10.1007/s12559-023-10179-8

Himeur, Y., Elnour, M., Fadli, F., Meskin, N., Petri, I., Rezgui, Y., Bensaali, F., & Amira, A. (2023). AI-Big Data Analytics for Building Automation and Management Systems: A Survey, Actual Challenges and Future Perspectives. Artificial Intelligence Review, 56(6), 4929–5021. https://doi.org/10.1007/s10462-022-10286-2

Kaur, J., & Ramkumar, K. R. (2022). The Recent Trends in Cyber Security: A Review. Journal of King Saud University - Computer and Information Sciences, 34(8), 5766–5781. https://doi.org/10.1016/j.jksuci.2021.01.018

Mmango, N., & Gundu, T. (2024). Cybersecurity as a Competitive Advantage for Entrepreneurs. Communications in Computer and Information Science, 2159, 374–387. https://doi.org/10.1007/978-3-031-64881-6_22

N. N. Misra, Manreet Singh Bhullar, Ahmad Al-Mallahi, Yash Dixit, Rohit Upadhyay, & Alex Martynenko. (2022). IoT, Big Data, and Artificial Intelligence in Agriculture and Food Industry. IEEE Internet of Things Journal, 9(9), 6305–6324. https://doi.org/10.1109/jiot.2020.2998584

Santoso, J. T., Raharjo, B., & Wibowo, A. (2024). Combination of Alphanumeric Password and Graphic Authentication for Cyber Security. Journal of Internet Services and Information Security, 14(1), 16–36. https://doi.org/10.58346/jisis.2024.i1.002

Sarker, I. H. (2023). Machine Learning for Intelligent Data Analysis and Automation in Cybersecurity: Current and Future Prospects. Annals of Data Science, 10(6), 1473–1498. https://doi.org/10.1007/s40745-022-00444-2

Sarker, I. H., Furhad, M. H., & Nowrozy, R. (2021). AI-Driven Cybersecurity: An Overview, Security Intelligence Modeling and Research Directions. SN Computer Science, 2(3), 173. https://doi.org/10.1007/s42979-021-00557-0

Shafiq, M., Gu, Z., Cheikhrouhou, O., Alhakami, W., & Hamam, H. (2022). The Rise of “Internet of Things”: Review and Open Research Issues Related to Detection and Prevention of IoT-Based Security Attacks. Wireless Communications and Mobile Computing, 2022(1), 8669348. https://doi.org/10.1155/2022/8669348

Sharma, S. K., Al-Wanain, M. I., Alowaidi, M., & Alsaghier, H. (2024). Mobile Healthcare (m-Health) Based on Artificial Intelligence in Healthcare 4.0. Expert Systems, 41(6), 13025. https://doi.org/10.1111/exsy.13025

Sreedevi, A. G., Nitya Harshitha, T., Sugumaran, V., & Shankar, P. (2022). Application of Cognitive Computing in Healthcare, Cybersecurity, Big Data And IoT: A Literature Review. Information Processing and Management, 59(2), 102888. https://doi.org/10.1016/j.ipm.2022.102888

Wang, J., Xu, C., Zhang, J., & Zhong, R. (2022). Big Data Analytics for Intelligent Manufacturing Systems: A Review. Journal of Manufacturing Systems, 62, 738–752. https://doi.org/10.1016/j.jmsy.2021.03.005

Wehbe, R. M., Sheng, J., Dutta, S., Chai, S., Dravid, A., Barutcu, S., Wu, Y., Cantrell, D. R., Xiao, N., Allen, B. D., MacNealy, G. A., Savas, H., Agrawal, R., Parekh, N., & Katsaggelos, A. K. (2021). DeepCOVID-XR: An Artificial Intelligence Algorithm to Detect COVID-19 on Chest Radiographs Trained and Tested on a Large U.S. Clinical Data Set. Radiology, 299(1), 167–176. https://doi.org/10.1148/radiol.2020203511

Wei, K., Zang, H., Pan, Y., Wang, G., & Shen, Z. (2024). Strategic Application of AI Intelligent Algorithm in Network Threat Detection and Defense. Journal of Theory and Practice of Engineering Science, 4(1), 2024. https://doi.org/10.53469/jtpes.2024.04(01).07

Published

2024-12-23

How to Cite

The Enhancing Cybersecurity with AI Algorithms and Big Data Analytics: Challenges and Solutions. (2024). Journal of Technology Informatics and Engineering, 3(3), 279-295. https://doi.org/10.51903/jtie.v3i3.200