Journal of Intelligent Communication

Review

An Intelligence-Based Cybersecurity Approach: A Review

Advance IDPSs algorithms

Downloads

Mohammed, Y. B., Badara, M. S., & Dan’azumi, H. (2024). An Intelligence-Based Cybersecurity Approach: A Review. Journal of Intelligent Communication, 3(2), 32–43. https://doi.org/10.54963/jic.v4i1.232

Authors

  • Yakubu Bala Mohammed
    Department of Computer Science, Abubakar Tatari Ali Polytechnic, Bauchi-State 740211, Nigeria
  • Mahmood Saidu Badara Department of Computer Science, Abubakar Tatari Ali Polytechnic, Bauchi-State 740211, Nigeria
  • Hussaini Dan’azumi Department of Computer Science, Abubakar Tatari Ali Polytechnic, Bauchi-State 740211, Nigeria

Nowadays, cybersecurity stands out as a prominent topic frequently discussed by companies aiming to safeguard their data from hacking attempts. The rise of cyberspace has fuelled the expansion of electronic systems, creating a virtual digital realm that links computers and smartphones within the Internet of Things framework. Thus, the purpose of this study is to present the progress made thus far in applying AI-based intrusion detection systems (IDSs) to address cybercrimes, demonstrating their efficacy in detecting and preventing cyberattacks. The review utilized 4 scholarly databases; ScienceDirect, IEEE-Explore, Web of science, and Springer. 437 studies were extracted from the 4 chosen databases out of which only 54 studies were found to be relevant, thus included. The review found AI-based intrusion detection systems (IDSs) to be more robust and flexible compared to other conventional IDSs. Interestingly, the study results highlight how AI-based intrusion detection systems such as; ANN-based intrusion detection systems, agent-based intrusion detection systems, and Genetic-fuzzy intrusion detection systems, and other machine learning detection systems can be used to assist security experts in analyzing, designing, and developing security frameworks for combating cybercrimes. Lastly, the study proposed some areas for future studies.

Keywords:

cybersecurity cybercrimes AI-based applications intrusion detection systems

References

  1. Applications of Artificial Intelligence Techniques to Combating Cyber Crimes: A Review. Available online: https://arxiv.org/abs/1502.03552 (accessed on 14 January 2024).
  2. Singh, B.; Choudhary, R.; Sharma, A.; Sharma, P. Artificial Intelligence a Human Mind Tool Saving from Cybercrimes and Cyber Threats. Int. J. Med. Toxicol. Legal Med. 2022, 25, 37–46.
  3. Cavus, N.; Mohammed, Y.B.; Bulama, M.; Isah, M.L. Examining User Verification Schemes, Safety and Secrecy Issues Affecting M-Banking: Systematic Literature Review. SAGE Open 2023, 13.
  4. Cavus, N.; Mohammed, Y.B.; Gital, A.Y.; Bulama, M.; Tukur, A.M.; Mohammed, D.; Isah, M.L.; Hassan, A. Emotional Artificial Neural Networks and Gaussian Process-Regression-Based Hybrid Machine-Learning Model for Prediction of Security and Privacy Effects on M-Banking Attractiveness. Sustainability 2022, 14, 5826.
  5. Soni, V.D. Role of Artificial Intelligence in Combating Cyber Threats in Banking. Int. Eng. J. Res. Dev. 2019, 4, 7.
  6. Mohammed, Y.B.; Cavus, N.; Ya’u Gital, A.; Bulama, M.; Hassan, A. A Hybrid Soft Computing Approach for Prediction of Cloud-Based Learning Management Systems Determinants. Int. J. Human–Computer Interact. 2024, 1–11.
  7. Wiafe, I.; Koranteng, F.N.; Obeng, E.N.; Assyne, N.; Wiafe, A.; Gulliver, S.R. Artificial Intelligence for Cybersecurity: A Systematic Mapping of Literature. IEEE Access 2020, 8, 146598–146612.
  8. Sarre, R.; Lau, L.Y.; Chang, L.Y. Responding to cybercrime: current trends. Police Pract. Res. 2018, 19, 515–518.
  9. Cyber crime: A review of the evidence. Available online: https://www.gov.uk/government/publications/cyber-crime-a-review-of-the-evidence (accessed on 14 January 2024).
  10. Zaytsev, O.A.; Pastukhov, P.S.; Fadeeva, M.Y.; Perekrestov, V.N. Artificial Intelligence as a New IT Means of Solving and Investigating Crimes. In Proceedings of the Institute of Scientific Communications Conference, Volgograd, Russia, 19–March 2020.
  11. Saponara, S.; Elhanashi, A.; Gagliardi, A. Reconstruct fingerprint images using deep learning and sparse autoencoder algorithms. In Proceedings of the Real-Time Image Processing and Deep Learning 2021, Florida, USA, 12–17 April 2021.
  12. Folds, C.L. How Hackers and Malicious Actors Are Using Artificial Intelligence to Commit Cybercrimes in the Banking Industry. PhD Thesis, Colorado Technical University, Colorado Springs, CO, USA, August 2022.
  13. Taddeo, M. Three ethical challenges of applications of artificial intelligence in cybersecurity. Minds Mach. 2019, 29, 187–191.
  14. Kushwaha, N.S. Application of Artificial Intelligence Methods to the Prevention of Cybercrime. Karnavati J. Multi. Stud. 2023, 1, 1–32.
  15. Chinedu, P.U.; Nwankwo, W.; Masajuwa, F.U.; Imoisi, S. Cybercrime Detection and Prevention Efforts in the Last Decade: An Overview of the Possibilities of Machine Learning Models. Rev. Int. Geog. Educ. Online 2021, 11, 956–974.
  16. Yeoh, P. Artificial Intelligence: Accelerator or Panacea for Financial Crime? J. Financial Crime 2019, 26, 634–646.
  17. Pasha, S.A.; Ali, S.; Jeljeli, R. Artificial Intelligence Implementation to Counteract Cybercrimes Against Children in Pakistan. Hum. Arenas 2022, 1–19.
  18. Mohammed, Y.B.; Karagozlu, D. A Review of Human-Computer Interaction Design Approaches towards Information Systems Development. BRAIN. Broad Res. Artif. Intell. Neurosci. 2021, 12, 229–250.
  19. Herath, T.B.; Khanna, P.; Ahmed, M. Cybersecurity Practices for Social Media Users: A Systematic Literature Review. J. Cybersecur. Priv. 2022, 2, 1–18.
  20. Kabanda, S.; Tanner, M.; Kent, C. Exploring SME Cybersecurity Practices in Developing Countries. J. Organiz. Comput. Electron. Commerce 2018, 28, 269–282.
  21. Taddeo, M.; McCutcheon, T.; Floridi, L. Trusting Artificial Intelligence in Cybersecurity is a Double-Edged Sword. Nat. Mach. Intell. 2019, 1, 557–560.
  22. Wirkuttis, N.; Klein, H. Artificial Intelligence in Cybersecurity. Cyber Intell. Secur. 2017, 1, 103–119.
  23. Mijwil, M.; Aljanabi, M. Towards Artificial Intelligence-based Cybersecurity: the Practices and ChatGPT Generated Ways to Combat Cybercrime. Iraqi J. Comput. Sci. Math. 2023, 4, 65–70.
  24. Jarrett, A.; Choo, K.K.R. The Impact of Automation and Artificial Intelligence on Digital Forensics. Wiley Interdiscip. Rev.: Forensic Sci. 2021, 3, e1418.
  25. Kumar, S.; Gupta, U.; Singh, A.K.; Singh, A.K. Artificial Intelligence: Revolutionizing Cyber Security in The Digital Era. J. Comput. Mech. Manage. 2023, 2, 31–42.
  26. Elhanashi, A.; Lowe, D.; Saponara, S.; Moshfeghi, Y. Deep Learning Techniques to Identify and Classify COVID-19 Abnormalities on Chest X-Ray Images. In Proceedings of the Real-Time Image Processing and Deep Learning 2022, Orlando, FL, USA, 27 May 2022.
  27. Abdullah, F.M. Using Big Data Analytics to Predict and Reduce Cyber Crimes. Int. J. Mech. Eng. Technol. 2019, 10, 1540–1546.
  28. Mothukuri, R.; Basaveswararao, B.; Bulla, S. Judgement Classification Using Hybrid ANN-Shuffled Frog Leaping Model on Cyber Crime Judgement Database. Rev. d'Intelligence Artif. 2020, 34, 445–456.
  29. Sowjanya, S.M.; Ahmed, S.; Salman, S. ANN Based Cyber Threat Detection Utilising Event Profiles. J. Algebraic Stat. 2022, 13, 2410–2414.
  30. Sungkur, R.K.; Maharaj, M.S. Design and Implementation of a SMART Learning Environment for the Upskilling of Cybersecurity Professionals in Mauritius. Educ. Inf. Technol. 2021, 26, 3175–3201.
  31. Al-Janabi, S.T.F.; Saeed, H.A. A Neural Network Based Anomaly Intrusion Detection System. In Proceedings of the 2011 Developments in E-systems Engineering, Dubai, United Arab Emirates, 6–8 December 2011.
  32. Ahmad, F.; Abbasi, A.; Li, J.; Dobolyi, D.G.; Netemeyer, R.G.; Clifford, G.D.; Chen, H. A Deep Learning Architecture for Psychometric Natural Language Processing. ACM Trans. Inf. Syst. (TOIS) 2020, 38, 1–29.
  33. Oravec, J.A. Kill Switches, Remote Deletion, and Intelligent Agents: Framing Everyday Household Cybersecurity in the Internet of Things. Technol. Soc. 2017, 51, 189–198.
  34. Kott, A.; Theron, P. Doers, not Watchers: Intelligent Autonomous Agents are a Path to Cyber Resilience. IEEE Secur. Privacy 2020, 18, 62–66.
  35. Heinl, C.H. Artificial (Intelligent) Agents and Active Cyber Defence: Policy Implications. In Proceedings of the 2014 6th International Conference on Cyber Conflict (CyCon 2014), Tallinn, Estonia, 3–6 June 2014.
  36. Zhang, A.; Rau, P.-L.P. Tools or Peers? Impacts of Anthropomorphism Level and Social Role on Emotional Attachment and Disclosure Tendency Towards Intelligent Agents. Comput. Hum. Behav. 2023, 138, 107415.
  37. Kotenko, I. Agent-Based Modeling and Simulation of Network Infrastructure Cyber-Attacks and Cooperative Defense Mechanisms. In Discrete Event Simulations; Goti, A.; Publications: Verlag Österreich, Austria, 2010; 1, pp. 83–95.
  38. Madhok, E.; Gupta, A.; Grover, N. Artificial Intelligence Impact on Cyber Security. IITM J. Manage. IT 2019, 7, 100–107.
  39. Abdiyeva-Aliyeva, G.; Hematyar, M.; Bakan, S. Development of System for Detection and Prevention of Cyber Attacks Using Artifıcial Intelligence Methods. Isighn Proceedings of the 2021 2nd Global Conference for Advancement in Technology (GCAT), Bangalore, India, 1–3 October 2021.
  40. De Mello, R.R.P.; de Santiago, R.; Silveira, R.A.; Gelaim, T.Â. Neural-symbolic BDI-Agent as a Multi-Context System: A Case Study with Negotiating Agent. Expert Syst. Appl. 2023, 238, 121656.
  41. Herrero, Á.; Corchado, E.; Wozniak, M.; Bae-Cho, S.; Petrović, S. Cybersecurity Applications of Computational Intelligence. Neural Comput. Appl. 2022, 34, 20447–20448.
  42. Liu, X.M. The Cyber Acumen: An Integrative Framework to Understand Average Users’ Decision-Making Processes in Cybersecurity. In Analyzing Human Behavior in Cyberspace; Yan, Z.; IGI Global: Hershey, PA, USA, 2015; 1, pp. 192–208.
  43. Kotenko, I.; Konovalov, A.; Shorov, A. Agent-based Modeling and Simulation of Botnets and Botnet Defense. In Proceedings of the Conference on Cyber Conflict, Tallinn, Estonia, 15–18 June 2010.
  44. Cavus, N.; Mohammed, Y.B.; Yakubu, M.N. An Artificial Intelligence-Based Model for Prediction of Parameters Affecting Sustainable Growth of Mobile Banking Apps. Sustainability 2021, 13, 6206.
  45. Khurana, K.; Sajja, P.S.; Bhatt, M.Z. Fuzzy Based Research Techniques for Intrusion Detection and Analysis: A Survey. Int. Res. J. Eng. Technol. 2016, 3, 1223–1227.
  46. Masdari, M.; Khezri, H. A Survey and Taxonomy of the Fuzzy Signature-Based Intrusion Detection Systems. Appl. Soft Comput. 2022, 92, 106301.
  47. Abadeh, M.S.; Mohamadi, H.; Habibi, J. Design and Analysis of Genetic Fuzzy Systems for Intrusion Detection in Computer Networks. Expert Syst. Appl. 2011, 38, 7067–7075.
  48. Balan, E.V.; Priyan, M.; Gokulnath, C.; Devi, G.U. Fuzzy Based Intrusion Detection Systems in MANET. Procedia Comput. Sci. 2015, 50, 109–114.
  49. Alawida, M.; Mejri, S.; Mehmood, A.; Chikhaoui, B.; Isaac Abiodun, O. A Comprehensive Study of ChatGPT: Advancements, Limitations, and Ethical Considerations in Natural Language Processing and Cybersecurity. Information 2023, 14, 462.
  50. Fujima, H.; Kumamoto, T.; Yoshida, Y. Using Chatgpt to Analyze Ransomware Messages and to Predict Ransomware Threats. Available online: https://doi.org/10.21203/rs.3.rs-3645967/v1 (accessed on 14 January 2024).
  51. Al-Hawawreh, M.; Aljuhani, A.; Jararweh, Y. Chatgpt for Cybersecurity: Practical Applications, Challenges, and Future Directions. Cluster Comput. 2023, 26, 3421–3436.
  52. Gupta, M.; Akiri, C.; Aryal, K.; Parker, E.; Praharaj, L. From Chatgpt to Threatgpt: Impact of Generative Ai in Cybersecurity and Privacy. IEEE Access 2023, 2, 11–20.
  53. Dash, B.; Sharma, P. Are ChatGPT and Deepfake Algorithms Endangering the Cybersecurity Industry? A Review. Int. J. Eng. Appl. Sci. 2023, 10, 21–39.
  54. Scanlon, M.; Breitinger, F.; Hargreaves, C.; Hilgert, J.-N.; Sheppard, J. ChatGPT for Digital Forensic Investigation: the Good, the Bad, and the Unknown. Forensic Sci. Int.: Digital Invest. 2023, 46, 301609.
  55. Okoli, C.; Schabram, K. A Guide to conducting a systematic literature review of information systems research. SSRN Electron. J. 2015, 3, 211–219.
  56. Keele, S. Performing systematic literature review in software engineering. In Proceedings of the 28th International Conference on Software Engineering, Shanghai, China, 20–26 May 2006.