Opportunities for Applying Artificial Intelligence by Commercial Organizations in Data Security and Cyber Threat Monitoring
-
https://doi.org/10.14419/bh5z5x68
Received date: March 18, 2025
Accepted date: June 19, 2025
Published date: June 20, 2025
-
Information; Machine Learning; Network Traffic; Personnel Training; Protection Systems; Security. -
Abstract
Intelligent information security methods are approaches based on the use of artificial intelligence and machine learning to increase the level of information protection and combat cyber threats. This is especially important for the financial sector and e-commerce since hackers and fraudsters aim at these companies, and any error by their personnel can lead to large expenses and loss of customer trust. The objective is to determine the opportunities for using AI by commercial organizations in the field of data protection and cyber threat monitoring. To attain this end, the authors conducted an experiment, i.e., they selected 100 companies and divided them into two groups, in each of which they applied AI algorithms to monitor cyber threats, and in one of the groups, they held two online classes on increasing the level of literacy in the field of information security. The study results show that the use of AI algorithms increased protection against cyber threats by 54%, while the efficiency of companies with additional employee training grew by another 27%. The main conclusion is that the use of AI in data security requires substantial data volumes and powerful computing resources. Therefore, a proper plan for the use of AI technologies, combined with personnel training, can significantly increase the protection of information systems and optimize implementation costs.
-
References
- Kaur R, Gabrijelčič D & Klobučar T (2023), Artificial intelligence for cybersecurity: Literature review and future research directions. Information Fusion 97, 101804. https://doi.org/10.1016/j.inffus.2023.101804
- Kirillova EA, Zulfugarzade TE, Blinkov OE, Serova OA & Mikhaylova IA (2021), Prospects for developing the legal regulation of digital plat-forms. Jurídicas CUC 18(1), 35-52. https://doi.org/10.17981/juridcuc.18.1.2022.02
- Eskerkhanova LT, Beloglazova LB, Masyutina NM, Romanishina TS & Turishcheva TB (2023), Increasing the competitiveness of future econo-mists for work in Industry 4.0. Perspectives on Science and Education 2, 158-173. https://doi.org/10.32744/pse.2023.2.9
- Bayazitova R, Kaishatayeva A & Vasilyev A (2023), Working from home, telework, equality and the right to privacy: A study in Kazakhstan. So-cial Sciences 12(1), 42. http://dx.doi.org/10.3390/socsci12010042
- Vasyukov VF, Bocharov AV, Kashina E & Singilevich DA (2021), Cyberstalking as a type of cybercrime: Counteraction opportunities in Russian and international legislation. Revista Relações Internacionais do Mundo Atual 2(35), 1-16.
- Akhmetshin E, Fayzullaev N, Klochko E, Shakhov D & Lobanova V (2024), Intelligent data analytics using hybrid gradient optimization algorithm with machine learning model for customer churn prediction. Fusion: Practice and Applications 14(2), 159-171. http://dx.doi.org/10.54216/FPA.140213
- Abdullaev I, Prodanova N, Ahmed MA, Lydia EL, Shrestha B, Joshi GP & Cho W (2023), Leveraging metaheuristics with artificial intelligence for customer churn prediction in telecom industries. Electronic Research Archive 31(8), 4443-4458. http://dx.doi.org/10.3934/era.2023227
- Akhmetshin E, Nemtsev A, Shichiyakh R, Shakhov D & Dedkova I (2024), Evolutionary algorithm with deep learning based fall detection on In-ternet of things environment. Fusion: Practice and Applications 14(2), 132-145. http://dx.doi.org/10.54216/FPA.140211
- Kazakov O, Azarenko N & Kozlova I (2024), Developing a method for building business process models based on graph neural networks in the absence of task identifier data. Qubahan Academic Journal 4(1), 19-25. https://doi.org/10.58429/qaj.v4n1a333
- Chumakova EV, Korneev DG, Gasparian MS, Ponomarev AA & Makhov IS (2023), Building a neural network to assess the level of operational risks of a credit institution. Journal of Theoretical and Applied Information Technology 101(11), 4205-4213, available online: http://www.jatit.org/volumes/Vol101No11/8Vol101No11.pdf
- Angin P, Bhargava B & Ranchal R (2019), Big data analytics for cyber security. Security and Communication Networks 2019, 4109836. https://doi.org/10.1155/2019/4109836
- Dokholyan S, Ermolaeva EO, Verkhovod AS, Dupliy EV, Gorokhova AE, Ivanov VA & Sekerin VD (2022), Influence of management automation on managerial decision-making in the agro-industrial complex. International Journal of Advanced Computer Science and Applications 13(6), 597-603. http://dx.doi.org/10.14569/IJACSA.2022.0130672
- Iskajyan SO, Kiseleva IA, Tramova AM, Timofeev AG, Mambetova FA & Mustaev MM (2022), Importance of the information environment factor in assessing a country's economic security in the digital economy. International Journal of Safety and Security Engineering 12(6), 691-697. https://doi.org/10.18280/ijsse.120604
- Das R & Sandhane R (2021), Artificial intelligence in cyber security. Journal of Physics Conference Series, 1964(4), 042072. https://doi.org/10.1088/1742-6596/1964/4/042072
- Islam MA, Islam R, Chowdhury SA, Nur AH, Sufian MA & Hasan M. (2024), Assessing Cybersecurity Threats: The application of NLP in ad-vanced threat intelligence systems. In Lecture notes in networks and systems (pp. 1–14). https://doi.org/10.1007/978-3-031-70924-1_1
- Rose S, Borchert O, Mitchell S & Connelly S (2020), Zero trust architecture. Stafford, VA, Cybersecurity & Infrastructure Security Agency De-partment of Homeland Security. https://doi.org/10.6028/nist.sp.800-207
- Purchina O, Poluyan A & Fugarov D (2021), Hybrid immune algorithms application for solving unclear optimization problems. In Parinov IA, Chang SH, Kim YH & Noda NA (eds) Physics and mechanics of new materials and their applications. PHENMA 2021. Springer, Cham, pp. 591-596. https://doi.org/10.1007/978-3-030-76481-4_50
- Fugarov DD, Gerasimenko EY & Gerasimenko AN (2021), Modeling of electric mass transfer process in controlled electrochemical resistance. Journal of Physics: Conference Series 2131, 042050. https://doi.org/10.1088/1742-6596/2131/4/042050
- Purchina O, Poluyan A & Fugarov D (2023), An algorithm based on artificial intelligence for solving information security tasks. E3S Web of Con-ferences 371, 03066. http://dx.doi.org/10.1051/e3sconf/202337103066
- Khan MI, Arif A & Khan ARA (2024), The most recent advances and uses of AI in cybersecurity. BULLET: Jurnal Multidisiplin Ilmu, 3–3(04), 566–578.
- De Azambuja AJG, Plesker C, Schützer K, Anderl R, Schleich B & Almeida VR (2023), Artificial Intelligence-Based Cyber Security in the context of Industry 4.0 – A survey. Electronics, 12(8), 1920. https://doi.org/10.3390/electronics12081920
- Vaslavskaya I, Aboimova I, Aleksandrova I, Nekrasov K & Karshalova A (2023), Achieving the principles of sustainable development: Implemen-tation of smart solutions in the infrastructure of modern megacities. E3S Web of Conferences 449, 05001. https://doi.org/10.1051/e3sconf/202344905001
- Rakhimgalieva P, Serikbayeva N, Seiitkazy P, Kaishatayeva A & Suleimenova Z (2021), Adaptation of students to professional activity through innovative technologies. World Journal on Educational Technology: Current Issues 13(4), 1102-1123. http://dx.doi.org/10.18844/wjet.v13i4.6312
- Auganbai A, Kalymbek B, Shulanbekova GK, Urisbaeva AA & Yerezhepkyzy R (2020), Protection of objects of historical and cultural heritage: Legal problems and the application of information technologies. Environmental Policy and Law 49(6), 379-388. https://doi.org/10.3233/epl-190191
- Ydyrys S, Ibrayeva N, Abugaliyeva F, Zhaskairat M & Uvaliyeva A (2023), Regulatory and legal support for the development of digital infrastruc-ture in rural areas as a factor in improving the level of sustainable development and quality of life of the rural population. Journal of Environmental Management and Tourism 14(5), 2271-2280. https://doi.org/10.14505/jemt.v14.5(69).08
- Bezpalov V, Goncharenko L, Fedyunin D, Lochan S & Avtonomova S (2023), Developing a model of work duration under the influence of risk events in the implementation of life cycle contracts for large energy construction projects. Journal of Infrastructure, Policy and Development 7(3), 1946. http://dx.doi.org/10.24294/jipd.v7i3.1946
- Borodina M, Idrisov H, Kapustina DA, Zhildikbayeva A, Fedorov D, Gerasimova E & Solovyanenko N (2023), State regulation of digital technol-ogies for sustainable development and territorial planning. International Journal of Sustainable Development and Planning 18(5), 1615-1624. http://dx.doi.org/10.18280/ijsdp.180533
- Guembe B, Azeta A, Misra S, Osamor VC, Fernandez-Sanz L & Pospelova V (2022), The emerging threat of AI-driven cyber-attacks: a review. Applied Artificial Intelligence, 36(1). https://doi.org/10.1080/08839514.2022.2037254
- Mohammed A (2023), AI and Machine Learning in Cybersecurity: Strategies, Threats, and Exploits. Innovative Computer Science Journal, 9(1), 1–4. https://innovatesci-publishers.com/index.php/ICSJ
- Syed SA (2025), Adversarial AI and Cybersecurity: Defending Against AI-Powered Cyber Threats. IRE Journals, 8(9), 1030–1031. https://www.researchgate.net/publication/390555579
- Deitel P & Deitel H (2019), Python for artificial intelligence, big data, and cloud computing. Pearson, 600 p.
- Burkov A (2018), The hundred-page machine learning book. MIT Press, London, 500 p.
- Purchina O, Poluyan A & Fugarov D (2022), Securing an information system via the SSL protocol. International Journal of Safety and Security Engineering 12(5), 563-568. https://doi.org/10.18280/ijsse.120503
- Poluyan AYu, Fugarov DD, Purchina OA, Nesterchuk VV, Smirnova OV & Petrenkova SB (2018), Adaptive algorithm of selecting optimal vari-ant of errors detection system for digital means of automation facility of oil and gas complex. Journal of Physics: Conference Series 1015, 022013. http://dx.doi.org/10.1088/1742-6596/1015/2/022013
- Kirillova EA, Zenin SS, Parshin IA, Predbannikova OI & Rubakova II (2022), Cyberbullying among students in an educational institution: Oppor-tunities for counteraction. International Journal of Computer Science and Network Security 22(5), 602–606. https://doi.org/10.22937/IJCSNS.2022.22.5.83
- Purchina O, Poluyan A & Fugarov D (2021), The algorithm development based on the immune search for solving unclear problems to detect the optical flow with minimal cost. E3S Web of Conferences 258, 06052. https://doi.org/10.1051/e3sconf/202125806052
- Kirillova E (2023), Developing methods for assessing the introduction of smart technologies into the socio-economic sphere within the framework of open innovation. International Journal of Sustainable Development and Planning 18(3), 693-702. https://doi.org/10.18280/ijsdp.180305
- Francois C (2017), Deep learning with Python. Manning Publications, New York, NY, 384 p.
- Fugarov D (2023), Technological control of the granulometric composition of active materials of chemical current sources. In Guda A (ed) Net-worked control systems for connected and automated vehicles. NN 2022. Springer, Cham, pp. 1417-1423. https://doi.org/10.1007/978-3-031-11051-1_145
- Poluyan AYu, Purchina OA, Fugarov DD, Golovanov AA & Smirnova OV (2019), Solution of task on the minimum cost data flow based on bion-ic algorithm. Journal of Physics: Conference Series 1333(3), 032056. http://dx.doi.org/10.1088/1742-6596/1333/3/032056
- Khlynin E, Korovkina N, Zhukov R, Kozlova N & Myasnikova E (2023), Effect of information and communications technology on the efficient operation of the organizational and economic mechanism of enterprise fixed assets management. Relações Internacionais do Mundo Atual 2(4), e-063076б available online: https://revista.unicuritiba.edu.br/index.php/RIMA/article/view/6376
- Bagratuni K, Kashina E, Kletskova E, Kapustina D, Ivashkin M, Sinyukov V, Karshalova A, Hajiyev H & Hajiyev E (2023), Impact of socially re-sponsible business behavior on implementing the principles of sustainable development (experience of large business). International Journal of Sus-tainable Development and Planning 18(8), 2481-2488. https://doi.org/10.18280/ijsdp.180819
- Kozinkina AI (2020), A magneto dielectric AC measuring transducer for refinery automation systems. Journal of Machinery Manufacture and Reli-ability 49(11), 963-970.
- Fugarov DD, Purchina OA, Poluyan AYu, Gerasimenko AN & Rasteryaev NV (2019), Magnetodielectric AC measuring transducer for automation systems in oil refineries. Journal of Physics: Conference Series 1333(6), 062020. http://dx.doi.org/10.1088/1742-6596/1333/6/062020
- Cherckesova L, Revyakina E, Safaryan O, Porksheyan V & Kazaryan M (2024), Analysis of the possibilities of carrying out attacks on the func-tions of transferring control to operating system console using active intelligence methods. International Research Journal of Multidisciplinary Scope 5(2), 516-534. http://dx.doi.org/10.47857/irjms.2024.v05i02.0558
- Gerasimenko Y, Gerasimenko A, Gerasimenko Y, Fugarov D, Purchina O & Poluyan A (2021), Mathematical modeling and synthesis of an electri-cal equivalent circuit of an electrochemical device. In Murgul V & Pukhkal V (eds) International scientific conference energy management of mu-nicipal facilities and sustainable energy technologies EMMFT 2019. Springer, Cham, pp. 471-480. http://dx.doi.org/10.1007/978-3-030-57453-6_45
- Goodfellow I, Bengio Y & Courville A (2016), Deep Learning Network. MIT Press, London, 800 p.m.
- Aggarwal C (2018), Neural networks and deep learning. Springer, Cham, 360 p.
- Fugarov DD, Gerasimenko YY, Nesterchuk VV, Gerasimenko AN & Onyshko DA (2018), Methods for revealing hidden failures of automation system for technological processes in the oil and gas sector. Journal of Physics: Conference Series 1118, 012055. http://dx.doi.org/10.1088/1742-6596/1118/1/012055
- Purchina O, Poluyan A & Fugarov D (2023), Improving the security level of the information system using the SSL protocol. E3S Web of Confer-ences 371, 30-67. http://dx.doi.org/10.1051/e3sconf/202337103067
- Akhmetshin E, Kirillova E, Abdullayev I, Fedorov A, Tretyak E & Kochetkov E (2024), Legal status and the issues of legal personhood of artificial intelligence. Relacoes Internacionais no Mundo Atual 1(43), 356-366, available online: https://revista.unicuritiba.edu.br/index.php/RIMA/article/view/6722
- Fugarov D (2022), Development and mathematical modeling of the AC sensor for refinery automation systems smart innovation. Systems and Technologies 247, 271-281.
- Geron A (2018), Hands-on machine learning with Scikit-Learn, Keras, and TensorFlow. O'Reilly Media, Incorporated, Sebastopol, CA, 800 p.
- Purchina O, Poluyan A & Fugarov D (2023), Building algorithms based on artificial intelligence for solving problems to ensure information security. In Parinov IA, Chang SH & Soloviev AN (eds) Physics and mechanics of new materials and their applications. Springer, Cham, pp. 568-573. https://doi.org/10.1007/978-3-031-21572-8_50
- Fugarov D & Gerasimenko Y (2023), Mathematical modeling of electrolyte concentration field in the controlled electrochemical resistance. In Beskopylny A, Shamtsyan M & Artiukh V (eds) XV International scientific conference “INTERAGROMASH 2022”. Springer, Cham, pp. 1688-1695. https://doi.org/10.1007/978-3-031-21432-5_181
- Sutton RS & Barto AG (2018), Reinforcement learning: An introduction. 2nd ed. MIT Press, London, 552 p.
-
Downloads
-
How to Cite
Poluyan, A., Purchina, O., & Fugarov, D. . (2025). Opportunities for Applying Artificial Intelligence by Commercial Organizations in Data Security and Cyber Threat Monitoring. International Journal of Basic and Applied Sciences, 14(2), 281-287. https://doi.org/10.14419/bh5z5x68
