The Enhancing Cybersecurity with AI Algorithms and Big Data Analytics: Challenges and Solutions
DOI:
https://doi.org/10.51903/jtie.v3i3.200Keywords:
Cybersecurity Optimization , Artificial Intelligence (AI) , Big Data Analytics , Threat Detection , Explainable AI (XAI)Abstract
As digital transformation accelerates across industries, cybersecurity faces escalating challenges due to increasingly sophisticated cyber threats. This study explores the integration of artificial intelligence (AI) algorithms and big data analytics to enhance cybersecurity systems, focusing on addressing data integration and interpretability issues. Employing a descriptive-qualitative methodology, the research analyzes literature, case studies, and secondary data to evaluate the effectiveness of AI and big data in detecting and mitigating cyber threats. Key findings reveal that deep learning algorithms, such as artificial neural networks, achieved an accuracy of 93% in anomaly detection, outperforming traditional rule-based approaches by 18%. Additionally, big data platforms like Spark demonstrated superior efficiency, processing 500 GB of data in 35 seconds compared to Hadoop’s 60 seconds. However, the study identifies challenges related to the interpretability of AI models and the complexity of integrating diverse datasets, which impede real-time threat detection. Periodic updates to AI training datasets were found to improve detection accuracy by up to 15%, emphasizing the importance of adaptive learning models. This research contributes to the field by proposing strategies to enhance system resilience, including adopting Explainable AI (XAI) for transparency and advanced data integration techniques. The findings underscore the potential of AI and big data to revolutionize cybersecurity, offering organizations a proactive approach to combating evolving cyber threats. Future studies should focus on sector-specific implementations and optimizing response mechanisms for comprehensive security frameworks.
References
Adebimpe Bolatito Ige, Eseoghene Kupa, & Oluwatosin Ilori. (2024). Best Practices in Cybersecurity for Green Building Management Systems: Protecting Sustainable Infrastructure from Cyber Threats. International Journal of Science and Research Archive, 12(1), 2960–2977. https://doi.org/10.30574/ijsra.2024.12.1.1185
Admass, W. S., Munaye, Y. Y., & Diro, A. A. (2024). Cyber Security: State of the Art, Challenges and Future Directions. Cyber Security and Applications, 2, 100031. https://doi.org/10.1016/j.csa.2023.100031
Al-Taleb, N., & Saqib, N. A. (2022). Towards a Hybrid Machine Learning Model for Intelligent Cyber Threat Identification in Smart City Environments. Applied Sciences, 12(4), 1863. https://doi.org/10.3390/app12041863
Al Ka’bi, A. (2023). Proposed Artificial Intelligence Algorithm and Deep Learning Techniques for Development of Higher Education. International Journal of Intelligent Networks, 4, 68–73. https://doi.org/10.1016/j.ijin.2023.03.002
Anderson, A. W., Marinovich, M. L., Houssami, N., Lowry, K. P., Elmore, J. G., Buist, D. S. M., Hofvind, S., & Lee, C. I. (2022). Independent External Validation of Artificial Intelligence Algorithms for Automated Interpretation of Screening Mammography: A Systematic Review. Journal of the American College of Radiology, 19(2), 259–273. https://doi.org/10.1016/j.jacr.2021.11.008
Aslan, Ö., Aktuğ, S. S., Ozkan-Okay, M., Yilmaz, A. A., & Akin, E. (2023). A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions. Electronics, 12(6), 1333. https://doi.org/10.3390/electronics12061333
Babar, M., Jan, M. A., He, X., Tariq, M. U., Mastorakis, S., & Alturki, R. (2023). An Optimized IoT-Enabled Big Data Analytics Architecture for Edge-Cloud Computing. IEEE Internet of Things Journal, 10(5), 3995–4005. https://doi.org/10.1109/jiot.2022.3157552
Batko, K., & Ślęzak, A. (2022). The Use of Big Data Analytics in Healthcare. Journal of Big Data, 9(1), 3. https://doi.org/10.1186/s40537-021-00553-4
Berisha, B., Mëziu, E., & Shabani, I. (2022). Big Data Analytics in Cloud Computing: An Overview. Journal of Cloud Computing, 11(1), 24. https://doi.org/10.1186/s13677-022-00301-w
Chen, J., Ramanathan, L., & Alazab, M. (2021). Holistic Big Data Integrated Artificial Intelligent Modeling to Improve Privacy and Security in Data Management of Smart Cities. Microprocessors and Microsystems, 81, 103722. https://doi.org/10.1016/j.micpro.2020.103722
Cheng, L., Varshney, K. R., & Liu, H. (2021). Socially Responsible AI Algorithms: Issues, Purposes, and Challenges. Journal of Artificial Intelligence Research, 71, 1137–1181. https://doi.org/10.1613/jair.1.12814
Dameff, C., Tully, J., Chan, T. C., Castillo, E. M., Savage, S., Maysent, P., Hemmen, T. M., Clay, B. J., & Longhurst, C. A. (2023). Ransomware Attack Associated with Disruptions at Adjacent Emergency Departments in the US. JAMA Network Open, 6(5), 2312270. https://doi.org/10.1001/jamanetworkopen.2023.12270
Dasgupta, D., Akhtar, Z., & Sen, S. (2022). Machine Learning in Cybersecurity: A Comprehensive Survey. Journal of Defense Modeling and Simulation, 19(1), 57–106. https://doi.org/10.1177/1548512920951275
Fathi, M., Haghi Kashani, M., Jameii, S. M., & Mahdipour, E. (2022). Big Data Analytics in Weather Forecasting: A Systematic Review. Archives of Computational Methods in Engineering, 29(2), 1247–1275. https://doi.org/10.1007/s11831-021-09616-4
Firat Kilincer, I., Ertam, F., Sengur, A., Tan, R. S., & Rajendra Acharya, U. (2023). Automated Detection of Cybersecurity Attacks in Healthcare Systems with Recursive Feature Elimination and Multilayer Perceptron Optimization. Biocybernetics and Biomedical Engineering, 43(1), 30–41. https://doi.org/10.1016/j.bbe.2022.11.005
Georgiadis, G., & Poels, G. (2022). Towards a Privacy Impact Assessment Methodology to Support the Requirements of the General Data Protection Regulation in a Big Data Analytics Context: A Systematic Literature Review. Computer Law & Security Review, 44, 105640. https://doi.org/10.1016/j.clsr.2021.105640
Ghiasi, M., Niknam, T., Wang, Z., Mehrandezh, M., Dehghani, M., & Ghadimi, N. (2023). A Comprehensive Review of Cyber-Attacks and Defense Mechanisms for Improving Security in Smart Grid Energy Systems: Past, Present and Future. Electric Power Systems Research, 215, 108975. https://doi.org/10.1016/j.epsr.2022.108975
Hassija, V., Chamola, V., Mahapatra, A., Singal, A., Goel, D., Huang, K., Scardapane, S., Spinelli, I., Mahmud, M., & Hussain, A. (2024). Interpreting Black-Box Models: A Review on Explainable Artificial Intelligence. Cognitive Computation, 16(1), 45–74. https://doi.org/10.1007/s12559-023-10179-8
Himeur, Y., Elnour, M., Fadli, F., Meskin, N., Petri, I., Rezgui, Y., Bensaali, F., & Amira, A. (2023). AI-Big Data Analytics for Building Automation and Management Systems: A Survey, Actual Challenges and Future Perspectives. Artificial Intelligence Review, 56(6), 4929–5021. https://doi.org/10.1007/s10462-022-10286-2
Kaur, J., & Ramkumar, K. R. (2022). The Recent Trends in Cyber Security: A Review. Journal of King Saud University - Computer and Information Sciences, 34(8), 5766–5781. https://doi.org/10.1016/j.jksuci.2021.01.018
Mmango, N., & Gundu, T. (2024). Cybersecurity as a Competitive Advantage for Entrepreneurs. Communications in Computer and Information Science, 2159, 374–387. https://doi.org/10.1007/978-3-031-64881-6_22
N. N. Misra, Manreet Singh Bhullar, Ahmad Al-Mallahi, Yash Dixit, Rohit Upadhyay, & Alex Martynenko. (2022). IoT, Big Data, and Artificial Intelligence in Agriculture and Food Industry. IEEE Internet of Things Journal, 9(9), 6305–6324. https://doi.org/10.1109/jiot.2020.2998584
Santoso, J. T., Raharjo, B., & Wibowo, A. (2024). Combination of Alphanumeric Password and Graphic Authentication for Cyber Security. Journal of Internet Services and Information Security, 14(1), 16–36. https://doi.org/10.58346/jisis.2024.i1.002
Sarker, I. H. (2023). Machine Learning for Intelligent Data Analysis and Automation in Cybersecurity: Current and Future Prospects. Annals of Data Science, 10(6), 1473–1498. https://doi.org/10.1007/s40745-022-00444-2
Sarker, I. H., Furhad, M. H., & Nowrozy, R. (2021). AI-Driven Cybersecurity: An Overview, Security Intelligence Modeling and Research Directions. SN Computer Science, 2(3), 173. https://doi.org/10.1007/s42979-021-00557-0
Shafiq, M., Gu, Z., Cheikhrouhou, O., Alhakami, W., & Hamam, H. (2022). The Rise of “Internet of Things”: Review and Open Research Issues Related to Detection and Prevention of IoT-Based Security Attacks. Wireless Communications and Mobile Computing, 2022(1), 8669348. https://doi.org/10.1155/2022/8669348
Sharma, S. K., Al-Wanain, M. I., Alowaidi, M., & Alsaghier, H. (2024). Mobile Healthcare (m-Health) Based on Artificial Intelligence in Healthcare 4.0. Expert Systems, 41(6), 13025. https://doi.org/10.1111/exsy.13025
Sreedevi, A. G., Nitya Harshitha, T., Sugumaran, V., & Shankar, P. (2022). Application of Cognitive Computing in Healthcare, Cybersecurity, Big Data And IoT: A Literature Review. Information Processing and Management, 59(2), 102888. https://doi.org/10.1016/j.ipm.2022.102888
Wang, J., Xu, C., Zhang, J., & Zhong, R. (2022). Big Data Analytics for Intelligent Manufacturing Systems: A Review. Journal of Manufacturing Systems, 62, 738–752. https://doi.org/10.1016/j.jmsy.2021.03.005
Wehbe, R. M., Sheng, J., Dutta, S., Chai, S., Dravid, A., Barutcu, S., Wu, Y., Cantrell, D. R., Xiao, N., Allen, B. D., MacNealy, G. A., Savas, H., Agrawal, R., Parekh, N., & Katsaggelos, A. K. (2021). DeepCOVID-XR: An Artificial Intelligence Algorithm to Detect COVID-19 on Chest Radiographs Trained and Tested on a Large U.S. Clinical Data Set. Radiology, 299(1), 167–176. https://doi.org/10.1148/radiol.2020203511
Wei, K., Zang, H., Pan, Y., Wang, G., & Shen, Z. (2024). Strategic Application of AI Intelligent Algorithm in Network Threat Detection and Defense. Journal of Theory and Practice of Engineering Science, 4(1), 2024. https://doi.org/10.53469/jtpes.2024.04(01).07
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Journal of Technology Informatics and Engineering
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.