Leveraging Artificial Intelligence for Advanced Threat Detection and Response in Modern Cybersecurity Frameworks

Authors

  • Sufia Zareen
  • Al Bagiro
  • Syed Riazul Islam Karim
  • Khalid Bin Abdullah
  • Mohammad Zahidul Alam
  • Md Mahmudul Hasan

DOI:

https://doi.org/10.22399/ijcesen.4131

Keywords:

Artificial Intelligence, Cybersecurity Frameworks, Threat Detection, Machine Learning, Cyber Threat Intelligence, Adversarial Attacks

Abstract

     The study investigates the role of artificial intelligence technologies including machine learning  deep learning  and natural language processing  in transforming the threat detection and response procedures within the current cybersecurity model. The fast-changing nature of cyberattacks, traditional security systems are being found incapable of identifying and countering advanced attacks. Artificial intelligence  has led to the emergence of disruptive technologies in the cybersecurity sector. It is now possible to use proactive, adaptive and intelligent defense strategies. The research is the study of mixed research, using a literature review and empirical study. The literature review relates to the present state of AI techniques and tools that have already been introduced to cybersecurity systems and include anomaly detection, behavior analysis and threat intelligence. The qualitative data will be achieved through expert online interview questionnaires about cybersecurity specialists. The ability of AI-enhanced systems to perform according to specific measurement parameters is measured by using such performance parameters as detection accuracy, false positive rate and response time. It is evident that AI proves to be very effective in detecting and containing the advanced threats owing to its capabilities of detecting the complicated patterns as well as its recent real-time impact response action. AI into the cybersecurity systems, not only is the resilience of the system boosted, but also the response time and human error. There are some issues with model interpretability, data privacy. It is adversarial AI that are to be resolved to achieve AI potential. The research has arrived at the conclusion that humans and AI must work in their cybersecurity roles and establish sturdy and future-proof cybersecurity infrastructures.

References

[1] Oloyede, J. (2024). Leveraging Artificial Intelligence for Advanced Cybersecurity Threat Detection and Prevention. Available at SSRN 4976072. DOI: https://doi.org/10.2139/ssrn.4976072

[2] Fischer, E. A. (2014, December). Cybersecurity issues and challenges: In brief.

[3] Khalid, H., Hashim, S. J., Ahmad, S., Hashim, F., & Chaudary, M. A. (2020). Cybersecurity in Industry 4.0 context: Background, issues, and future directions. The nine pillars of technologies for industry, 4, 263-307.

[4] Espinha Gasiba, T., Lechner, U., & Pinto-Albuquerque, M. (2020). Cybersecurity challenges in industry: Measuring the challenge solve time to inform future challenges. Information, 11(11), 533. DOI: https://doi.org/10.3390/info11110533

[5] Raj, R. K., Anand, V., Gibson, D., Kaza, S., & Phillips, A. (2019, February). Cybersecurity program accreditation: Benefits and challenges. In Proceedings of the 50th ACM technical symposium on computer science education (pp. 173-174). DOI: https://doi.org/10.1145/3287324.3287325

[6] Chingoriwo, T. (2022). Cybersecurity challenges and needs in the context of digital development in Zimbabwe. British Journal of Multidisciplinary and Advanced Studies, 3(2), 77-104. DOI: https://doi.org/10.37745/bjmas.2022.0046

[7] Liu, L., Sajid, Z., Kravaris, C., & Khan, F. (2024). Detection and analysis of cybersecurity challenges for processing systems. Process Safety and Environmental Protection, 185, 1061-1071. DOI: https://doi.org/10.1016/j.psep.2024.03.088

[8] Bridges, R. A., Huffer, K. M., Jones, C. L., Iannacone, M. D., & Goodall, J. R. (2017, December). Cybersecurity automated information extraction techniques: Drawbacks of current methods, and enhanced extractors. In 2017 16th IEEE international conference on machine learning and applications (ICMLA) (pp. 437-442). IEEE. DOI: https://doi.org/10.1109/ICMLA.2017.0-122

[9] Shaukat, K., Luo, S., Varadharajan, V., Hameed, I. A., Chen, S., Liu, D., & Li, J. (2020). Performance comparison and current challenges of using machine learning techniques in cybersecurity. Energies, 13(10), 2509. DOI: https://doi.org/10.3390/en13102509

[10] Fischer, E. A. (2014, December). Cybersecurity issues and challenges: In brief.

[11] Khalid, H., Hashim, S. J., Ahmad, S., Hashim, F., & Chaudary, M. A. (2020). Cybersecurity in Industry 4.0 context: Background, issues, and future directions. The nine pillars of technologies for industry, 4, 263-307. DOI: https://doi.org/10.1049/PBTE088E_ch14

[12] Hasan, M. K., Habib, A. A., Shukur, Z., Ibrahim, F., Islam, S., & Razzaque, M. A. (2023). Review on cyber-physical and cyber-security system in smart grid: Standards, protocols, constraints, and recommendations. Journal of network and computer applications, 209, 103540. DOI: https://doi.org/10.1016/j.jnca.2022.103540

[13] Lezzi, M., Lazoi, M., & Corallo, A. (2018). Cybersecurity for Industry 4.0 in the current literature: A reference framework. Computers in Industry, 103, 97-110. DOI: https://doi.org/10.1016/j.compind.2018.09.004

[14] Camacho, N. G. (2024). The role of AI in cybersecurity: Addressing threats in the digital age. Journal of Artificial Intelligence General science (JAIGS) ISSN: 3006-4023, 3(1), 143-154. DOI: https://doi.org/10.60087/jaigs.v3i1.75

[15] Abbas, N. N., Ahmed, T., Shah, S. H. U., Omar, M., & Park, H. W. (2019). Investigating the applications of artificial intelligence in cyber security. Scientometrics, 121, 1189-1211. DOI: https://doi.org/10.1007/s11192-019-03222-9

[16] Aslam, M. (2024). Ai and cybersecurity: an ever-evolving landscape. International Journal of Advanced Engineering Technologies and Innovations, 1.

[17] Wirkuttis, N., & Klein, H. (2017). Artificial intelligence in cybersecurity. Cyber, Intelligence, and Security, 1(1), 103-119.

[18] Carlo, A., Mantı, N. P., WAM, B. A. S., Casamassima, F., Boschetti, N., Breda, P., & Rahloff, T. (2023). The importance of cybersecurity frameworks to regulate emergent AI technologies for space applications. Journal of Space Safety Engineering, 10(4), 474-482. DOI: https://doi.org/10.1016/j.jsse.2023.08.002

[19] Zahra, Y., & Sanmorino, A. (2024). Exploring the Evolving Role of AI in Cybersecurity. European Journal of Privacy Law & Technologies.

[20] Jun, Y., Craig, A., Shafik, W., & Sharif, L. (2021). Artificial intelligence application in cybersecurity and cyberdefense. Wireless communications and mobile computing, 2021(1), 3329581. DOI: https://doi.org/10.1155/2021/3329581

[21] Zhang, Z., Al Hamadi, H., Damiani, E., Yeun, C. Y., & Taher, F. (2022). Explainable artificial intelligence applications in cyber security: State-of-the-art in research. IEEe Access, 10, 93104-93139. DOI: https://doi.org/10.1109/ACCESS.2022.3204051

[22] Patil, P. (2016). Artificial intelligence in cybersecurity. International journal of research in computer applications and robotics, 4(5), 1-5.

[23] Akhtar, M. S., & Feng, T. (2021). An overview of the applications of Artificial Intelligence in Cybersecurity. EAI endorsed transactions on creative technologies, 8(29). DOI: https://doi.org/10.4108/eai.23-11-2021.172218

[24] Kaur, R., Gabrijelčič, D., & Klobučar, T. (2023). Artificial intelligence for cybersecurity: Literature review and future research directions. Information Fusion, 97, 101804. DOI: https://doi.org/10.1016/j.inffus.2023.101804

[25] LAZIĆ, L. (2019, January). Benefit from Ai in cybersecurity. In Proc. 11th Int. Conf. Bus. Inf. Secur.(BISEC) (pp. 103-119).

[26] Sharifani, K., & Amini, M. (2023). Machine learning and deep learning: A review of methods and applications. World Information Technology and Engineering Journal, 10(07), 3897-3904.

[27] Kumari, J., Kumar, E., & Kumar, D. (2023). A structured analysis to study the role of machine learning and deep learning in the healthcare sector with big data analytics. Archives of Computational Methods in Engineering, 30(6), 3673-3701. DOI: https://doi.org/10.1007/s11831-023-09915-y

[28] Sharma, N., Sharma, R., & Jindal, N. (2021). Machine learning and deep learning applications-a vision. Global Transitions Proceedings, 2(1), 24-28. DOI: https://doi.org/10.1016/j.gltp.2021.01.004

[29] Pramod, A., Naicker, H. S., & Tyagi, A. K. (2021). Machine learning and deep learning: Open issues and future research directions for the next 10 years. Computational analysis and deep learning for medical care: Principles, methods, and applications, 463-490. DOI: https://doi.org/10.1002/9781119785750.ch18

[30] Geluvaraj, B., Satwik, P. M., & Ashok Kumar, T. A. (2019). The future of cybersecurity: Major role of artificial intelligence, machine learning, and deep learning in cyberspace. In International Conference on Computer Networks and Communication Technologies: ICCNCT 2018 (pp. 739-747). Springer Singapore. DOI: https://doi.org/10.1007/978-981-10-8681-6_67

[31] Taye, M. M. (2023). Understanding of machine learning with deep learning: architectures, workflow, applications and future directions. Computers, 12(5), 91. DOI: https://doi.org/10.3390/computers12050091

[32] Mijwil, M. M., Salem, I. E., & Ismaeel, M. M. (2023). The significance of machine learning and deep learning techniques in cybersecurity: A comprehensive review. Iraqi Journal For Computer Science and Mathematics, 4(1), 10.

[33] Salih, A., Zeebaree, S. T., Ameen, S., Alkhyyat, A., & Shukur, H. M. (2021, February). A survey on the role of artificial intelligence, machine learning and deep learning for cybersecurity attack detection. In 2021 7th International Engineering Conference “Research & Innovation amid Global Pandemic"(IEC) (pp. 61-66). IEEE. DOI: https://doi.org/10.1109/IEC52205.2021.9476132

[34] Gupta, R., Srivastava, D., Sahu, M., Tiwari, S., Ambasta, R. K., & Kumar, P. (2021). Artificial intelligence to deep learning: machine intelligence approach for drug discovery. Molecular diversity, 25, 1315-1360. DOI: https://doi.org/10.1007/s11030-021-10217-3

[35] Goodfellow, I., Bengio, Y., Courville, A., & Bengio, Y. (2016). Deep learning (Vol. 1, No. 2). Cambridge: MIT press.

[36] Abisoye, A., Akerele, J. I., Odio, P. E., Collins, A., Babatunde, G. O., & Mustapha, S. D. (2020). A data-driven approach to strengthening cybersecurity policies in government agencies: Best practices and case studies. International Journal of Cybersecurity and Policy Studies.(pending publication).

[37] Abisoye, A., Akerele, J. I., Odio, P. E., Collins, A., Babatunde, G. O., & Mustapha, S. D. (2025). Using AI and machine learning to predict and mitigate cybersecurity risks in critical infrastructure. International Journal of Engineering Research and Development, 21(2), 205-224.

[38] Gilbert, C., Gilbert, M. A., Dorgbefu, M., Leakpor, D. J., Gaylah, K. D., & Adetunde, I. A. (2025). Enhancing detection and response using artificial intelligence in cybersecurity. International Journal of Multidisciplinary Research and Publications (IJMRAP), 7(10), 87-104.

[39] Danish, M., & Siraj, M. M. (2025). AI and Cybersecurity: Defending Data and Privacy in the Digital Age. Journal of Engineering and Computational Intelligence Review, 3(1), 25-35.

[40] Radanliev, P. (2025). Cyber diplomacy: defining the opportunities for cybersecurity and risks from Artificial Intelligence, IoT, Blockchains, and Quantum Computing. Journal of Cyber Security Technology, 9(1), 28-78. DOI: https://doi.org/10.1080/23742917.2024.2312671

[41] Elkhodr, M., & Gide, E. (2025). Integrating Generative AI in Cybersecurity Education: Case Study Insights on Pedagogical Strategies, Critical Thinking, and Responsible AI Use. arXiv preprint arXiv:2502.15357.

[42] Graham, C. M. (2025). AI skills in cybersecurity: global job trends analysis. Information & Computer Security. DOI: https://doi.org/10.1108/ICS-09-2024-0235

[43] Bran, E., Rughiniș, R., Țurcanu, D., & Radovici, A. (2024). AI Leads, Cybersecurity Follows: Unveiling Research Priorities in Sustainable Development Goal-Relevant Technologies across Nations. Sustainability, 16(20), 8886. DOI: https://doi.org/10.3390/su16208886

[44] Wada, I. U., Izibili, G. O., Babayemi, T., Abdulkareem, A., Macaulay, O. M., & Emadoye, A. (2025). AI-driven cybersecurity in higher education: A systematic review and model evaluation for enhanced threat detection and incident response. World Journal of Advanced Research and Reviews, 25(3), 89-90. DOI: https://doi.org/10.30574/wjarr.2025.25.3.0989

[45] Denis, A., Thomas, A., Robert, W., Samuel, A., Kabiito, S. P., Morish, Z., ... & Mijwil, M. M. (2025). A Survey on Artificial Intelligence and Blockchain Applications in Cybersecurity for Smart Cities. SHIFRA, 2025, 1-45. DOI: https://doi.org/10.70470/SHIFRA/2025/001

[46] Zangana, H. M., Omar, M., & Mohammed, D. (2025). Introduction to Artificial Intelligence in Cybersecurity and Forensic Science. In Integrating Artificial Intelligence in Cybersecurity and Forensic Practices (pp. 1-24). IGI Global Scientific Publishing. DOI: https://doi.org/10.4018/979-8-3373-0588-2.ch001

[47] Ajayi, A. J., Joseph, S., Metibemu, O. C., Olutimehin, A. T., Balogun, A. Y., & Olaniyi, O. O. (2025). The impact of artificial intelligence on cyber security in digital currency transactions. Available at SSRN 5137847. DOI: https://doi.org/10.2139/ssrn.5137847

[48] Radanliev, P., & De Roure, D. (2022). Advancing the cybersecurity of the healthcare system with self-optimizing and self-adaptative artificial intelligence (part 2). Health and Technology, 12(5), 923-929. DOI: https://doi.org/10.1007/s12553-022-00691-6

[49] Mohamed, S. (2025). AI and Blockchain in Cybersecurity: A Sustainable Approach to Protecting Digital Assets. Jurnal Ilmiah Informatika dan Komputer, 2(1), 1-8. DOI: https://doi.org/10.69533/1hh4he43

[50] Thakur, A. S., Alex, T. L., & Nighojkar, A. (2025). Artificial Intelligence in Maritime Anomaly Detection: A Decadal Bibliometric Analysis (2014–2024). Journal of The Institution of Engineers (India): Series C, 1-25. DOI: https://doi.org/10.1007/s40032-025-01169-w

[51] Neoaz, N., Bacha, A., Khan, M., Sherani, A. M. K., Shah, H. H., Abid, N., & Amin, M. H. (2025). AI in Motion: Securing the Future of Healthcare and Mobility through Cybersecurity. Asian Journal of Engineering, Social and Health, 4(1), 176-192. DOI: https://doi.org/10.46799/ajesh.v4i1.525

[52] Mahmud, F., Barikdar, C. R., Hassan, J., Goffer, M. A., Das, N., Orthi, S. M., ... & Hasan, R. (2025). AI-Driven Cybersecurity in IT Project Management: Enhancing Threat Detection and Risk Mitigation. Journal of Posthumanism, 5(4), 23-44. DOI: https://doi.org/10.63332/joph.v5i4.974

[53] Schreiber, A., & Schreiber, I. (2025). AI for cyber-security risk: harnessing AI for automatic generation of company-specific cybersecurity risk profiles. Information & Computer Security. DOI: https://doi.org/10.1108/ICS-08-2024-0177

Downloads

Published

2025-10-01

How to Cite

Zareen, S., Al Bagiro, Syed Riazul Islam Karim, Khalid Bin Abdullah, Mohammad Zahidul Alam, & Md Mahmudul Hasan. (2025). Leveraging Artificial Intelligence for Advanced Threat Detection and Response in Modern Cybersecurity Frameworks. International Journal of Computational and Experimental Science and Engineering, 11(4). https://doi.org/10.22399/ijcesen.4131

Issue

Section

Research Article

Similar Articles

You may also start an advanced similarity search for this article.