Implementasi Artificial Intelligence dalam Meningkatkan Cyber Security: Analisis ancaman dan Pencegahan

Authors

  • Lim Jong Su Universitas Esa Unggul
  • Binastya Anggara Sekti Universitas Esa Unggul

Keywords:

artificial intelligence, threats, cyber security, information systems, threat intelligence

Abstract

In today's digital age, cyber threats are becoming more complex and sophisticated.The aim of this study is to analyze the role of artificial intelligence (AI) in improving cybersecurity through threat detection and prevention. By integrating AI techniques such as machine learning and deep learning, cybersecurity systems can detect suspicious behavior patterns and identify threats in real-time.A comprehensive literature review was conducted to explore different AI approaches applied in this field, including anomaly detection analytics, threat intelligence, and automated response. The use of artificial intelligence can significantly improve the accuracy of threat detection and cyber incident response. Moreover, case studies of several organizations that have used AI for cybersecurity have shown increased effectiveness and efficiency in dealing with cyberattacks. However, there are still challenges to overcome, such as: B. Limited training data, interpretability of AI models, and the need for qualified experts. Although AI has great potential to improve cybersecurity, collaboration between technology and human expertise remains crucial to address growing threats.Thus, not only is cybersecurity improving, but there is also an increasing need to develop artificial intelligence (AI) systems that take cybersecurity threats into account in order to attack the security of information systems.

References

D. Septasari, “The Cyber Security and The Challenge of Society 5.0 Era in Indonesia,” Aisyah Journal Of Informatics and Electrical Engineering (A.J.I.E.E), vol. 5, no. 2, 2023, doi: 10.30604/jti.v5i2.231.

Z. Zhang, H. Al Hamadi, E. Damiani, C. Y. Yeun, and F. Taher, “Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research,” IEEE Access, vol. 10, 2022, doi: 10.1109/ACCESS.2022.3204051.

Syed Khurram Hassan and Asif Ibrahim, “The role of Artificial Intelligence in Cyber Security and Incident Response,” International Journal for Electronic Crime Investigation, vol. 7, no. 2, 2023, doi: 10.54692/ijeci.2023.0702154.

M. Alowaidi, S. K. Sharma, A. AlEnizi, and S. Bhardwaj, “Integrating artificial intelligence in cyber security for cyber-physical systems,” Electronic Research Archive, vol. 31, no. 4, 2023, doi: 10.3934/era.2023097.

A. J. G. de Azambuja, C. Plesker, K. Schützer, =R. Anderl, B. Schleich, and V. R. Almeida, “Artificial Intelligence-Based Cyber Security in the Context of Industry 4.0—A Survey,” Electronics (Switzerland), vol. 12, no. 8, 2023, doi: 10.3390/electronics12081920.

R. Maurya, “Analyzing the Role of AI in Cyber Security Threat Detection & Prevention,” Int J Res Appl Sci Eng Technol, vol. 11, no. 11, 2023, doi: 10.22214/ijraset.2023.56510.

“ARTIFICIAL INTELLIGENCE BASED CYBER- SECURITY PROGRAM,” International Research Journal of Modernization in Engineering Technology and Science, 2022, doi: 10.56726/irjmets30115.

Dr. P. KALARANI, “Empowering Artificial Intelligence and Cyber Security Challenges in Smart Manufacturing,” Turkish Journal of Computer and Mathematics Education (TURCOMAT), vol. 12, no. 6, 2021, doi: 10.17762/turcomat.v12i6.1280.

S. G. Naqvi, S. Sheraz, I. Mehmood, and M. Yasin, “Cyber-physical Systems and Artificial Intelligence: The Role of Cyber Security, Machine Learning, Threats and benefits to Modern Economies and Industries,” Pakistan Journal of Humanities and Social Sciences, vol. 11, no. 2, 2023, doi: 10.52131/pjhss.2023.1102.0454.

W. S. Admass, Y. Y. Munaye, and A. A. Diro, “Cyber security: State of the art, challenges and future directions,”n 2024. doi: 10.1016/j.csa.2023.100031.

Y. Zeng, “AI Empowers Security Threats and Strategies for Cyber Attacks,” in Procedia Computer Science, 2022. doi: 10.1016/j.procs.2022.10.025.

M. Tetaly and P. Kulkarni, “Artificial intelligence in cyber security - A threat or a solution,” in AIP Conference Proceedings, 2022. doi: 10.1063/5.0109664.

P. R. J. Trim and Y. I. Lee, “Combining Sociocultural Intelligence with Artificial Intelligence to Increase Organizational Cyber Security Provision through Enhanced Resilience,” Big Data and Cognitive Computing, vol. 6, no. 4, 2022, doi: 10.3390/bdcc6040110.

I. Jada and T. O. Mayayise, “The impact of artificial intelligence on organisational cyber security: An outcome of a systematic literature review,” Data Inf Manag, vol. 8, no. 2, 2024, doi: 10.1016/j.dim.2023.100063.

S. HURZHII, “The special features of using the artificial intelligence in the matters of cybersecurity,” INFORMATION AND LAW, no. 4(47), 2023, doi: 10.37750/2616-6798.2023.4(47).291669.

P. S. Dandge, U. I. Dawre, and R. F. Shirshikar, “Journal of Advanced Zoology Artificial Intelligence In Cyber Security,” vol. 44, pp. 69– 72, 2023.

S. K. Das - and P. P. -, “Use of Artificial Intelligence on Cyber Security and the New- generation Cyber-attacks,” International Journal For Multidisciplinary Research, vol. 6, no. 2, 2024, doi: 10.36948/ijfmr.2024.v06i02.14521.

Syed Khurram Hassan and Asif Ibrahim, “The role of Artificial Intelligence in Cyber Security and Incident Response,” International Journal for Electronic Crime Investigation, vol. 7, no. 2, 2023, doi: 10.54692/ijeci.2023.0702154.

N. N. Abbas, T. Ahmed, S. H. U. Shah, M. Omar, and H. W. Park, “Investigating the applications of artificial intelligence in cyber security,” Scientometrics, vol. 121, no. 2, 2019, doi: 10.1007/s11192-019-03222-9.

D. Nyale and S. M. Angolo, “A Survey of Artificial Intelligence in Cyber Security,” International Journal of Computer Applications Technology and Research, 2022, doi: 10.7753/ijcatr1112.1014.

Downloads

Published

2024-10-23

How to Cite

Lim Jong Su, & Binastya Anggara Sekti. (2024). Implementasi Artificial Intelligence dalam Meningkatkan Cyber Security: Analisis ancaman dan Pencegahan. Prosiding SISFOTEK, 8(1), 199 - 203. Retrieved from https://seminar.iaii.or.id/index.php/SISFOTEK/article/view/482

Issue

Section

Sistem Informasi dan Teknologi
bk8