Ajala, O. A., & Balogun, O. (2024). Leveraging AI/ML for anomaly detection, threat prediction, and automated response. World Journal of Advanced Research and Reviews, 21(1), 2584–2598. https://doi.org/10.30574/wjarr.2024.21.1.0287
Ajala, O. A., & Balogun, O. (2024). Leveraging AI/ML for anomaly detection, threat prediction, and automated response. World Journal of Advanced Research and Reviews, 21(1), 2584–2598. https://doi.org/10.30574/wjarr.2024.21.1.0287
Ajala, O. A., & Balogun, O. (2024). Leveraging AI/ML for anomaly detection, threat prediction, and automated response. World Journal of Advanced Research and Reviews, 21(1), 2584–2598. https://doi.org/10.30574/wjarr.2024.21.1.0287
Ajala, O. A., & Balogun, O. (2024). Leveraging AI/ML for anomaly detection, threat prediction, and automated response. World Journal of Advanced Research and Reviews, 21(1), 2584–2598. https://doi.org/10.30574/wjarr.2024.21.1.0287
Abstract
The rapid evolution of information and communication technologies, notably the Internet, has yielded substantial benefits while posing challenges to information system security. With an increasing frequency of cyber threats—from unauthorized access to data breaches—the digital landscape's vulnerability is evident. Addressing the financial impact of cybercrime, this study delves into the role of Artificial Intelligence (AI) and Machine Learning (ML) technologies in cybersecurity. Analyzing advancements and outcomes, the research explores practical techniques for anomaly detection, threat prediction, and automated response. By investigating prior research and real-world implementations, the study provides valuable insights into the potential of AI/ML, uncovering current trends, challenges, and prospects in enhancing cybersecurity tactics amid a dynamically changing threat landscape.
Keywords
Information and communication technologies; Communication; networking Knowledge exchange; social interaction; Digital landscape; Information security; Cybercrime; Cybersecurity strategies; Artific
Subject
Computer Science and Mathematics, Security Systems
Copyright:
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.