Preprint Review Version 1 Preserved in Portico This version is not peer-reviewed

Leveraging AI/ML for anomaly detection, threat prediction, and automated response.

Version 1 : Received: 1 January 2024 / Approved: 3 January 2024 / Online: 3 January 2024 (10:36:17 CET)

A peer-reviewed article of this Preprint also exists.

Ajala, O. A., & Balogun, O. (2024). Leveraging AI/ML for anomaly detection, threat prediction, and automated response. World Journal of Advanced Research and Reviews, 21(1), 2584–2598. https://doi.org/10.30574/wjarr.2024.21.1.0287 Ajala, O. A., & Balogun, O. (2024). Leveraging AI/ML for anomaly detection, threat prediction, and automated response. World Journal of Advanced Research and Reviews, 21(1), 2584–2598. https://doi.org/10.30574/wjarr.2024.21.1.0287

Abstract

The rapid evolution of information and communication technologies, notably the Internet, has yielded substantial benefits while posing challenges to information system security. With an increasing frequency of cyber threats—from unauthorized access to data breaches—the digital landscape's vulnerability is evident. Addressing the financial impact of cybercrime, this study delves into the role of Artificial Intelligence (AI) and Machine Learning (ML) technologies in cybersecurity. Analyzing advancements and outcomes, the research explores practical techniques for anomaly detection, threat prediction, and automated response. By investigating prior research and real-world implementations, the study provides valuable insights into the potential of AI/ML, uncovering current trends, challenges, and prospects in enhancing cybersecurity tactics amid a dynamically changing threat landscape.

Keywords

Information and communication technologies; Communication; networking Knowledge exchange; social interaction; Digital landscape; Information security; Cybercrime; Cybersecurity strategies;  Artific

Subject

Computer Science and Mathematics, Security Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.