Opportunities for Applying Artificial Intelligence by Commercial Organizations in Data Security and Cyber Threat Monitoring

  • Authors

    • Anna Poluyan Department of Computer Systems and Information Security, Faculty of Computer Science and Computer Engineering, Don State Technical University, 1 Gagarin Square, Rostov-on-Don, 344003, Russia https://orcid.org/0000-0002-7172-4351
    • Olga Purchina Department of Automation and Mathematical Modeling in the Oil and Gas Industry, Energy and Oil and Gas Industry Faculty, Don State Technical University, 1 Gagarin Square, Rostov-on-Don, 344003, Russia https://orcid.org/0000-0003-3782-5498
    • Dmitry Fugarov Department of Automation and Mathematical Modeling in the Oil and Gas Industry, Energy and Oil and Gas Industry Faculty, Don State Technical University, 1 Gagarin Square, Rostov-on-Don, 344003, Russia https://orcid.org/0000-0002-5741-2466
    https://doi.org/10.14419/bh5z5x68

    Received date: March 18, 2025

    Accepted date: June 19, 2025

    Published date: June 20, 2025

  • Information; Machine Learning; Network Traffic; Personnel Training; Protection Systems; Security.
  • Abstract

    Intelligent information security methods are approaches based on the use of artificial intelligence and machine learning to increase the level of information protection and combat cyber threats. This is especially important for the financial sector and e-commerce since hackers and fraudsters aim at these companies, and any error by their personnel can lead to large expenses and loss of customer trust. The objective is to determine the opportunities for using AI by commercial organizations in the field of data protection and cyber threat monitoring. To attain this end, the authors conducted an experiment, i.e., they selected 100 companies and divided them into two groups, in each of which they applied AI algorithms to monitor cyber threats, and in one of the groups, they held two online classes on increasing the level of literacy in the field of information security. The study results show that the use of AI algorithms increased protection against cyber threats by 54%, while the efficiency of companies with additional employee training grew by another 27%. The main conclusion is that the use of AI in data security requires substantial data volumes and powerful computing resources. Therefore, a proper plan for the use of AI technologies, combined with personnel training, can significantly increase the protection of information systems and optimize implementation costs.

  • References

    1. Kaur R, Gabrijelčič D & Klobučar T (2023), Artificial intelligence for cybersecurity: Literature review and future research directions. Information Fusion 97, 101804. https://doi.org/10.1016/j.inffus.2023.101804
    2. Kirillova EA, Zulfugarzade TE, Blinkov OE, Serova OA & Mikhaylova IA (2021), Prospects for developing the legal regulation of digital plat-forms. Jurídicas CUC 18(1), 35-52. https://doi.org/10.17981/juridcuc.18.1.2022.02
    3. Eskerkhanova LT, Beloglazova LB, Masyutina NM, Romanishina TS & Turishcheva TB (2023), Increasing the competitiveness of future econo-mists for work in Industry 4.0. Perspectives on Science and Education 2, 158-173. https://doi.org/10.32744/pse.2023.2.9
    4. Bayazitova R, Kaishatayeva A & Vasilyev A (2023), Working from home, telework, equality and the right to privacy: A study in Kazakhstan. So-cial Sciences 12(1), 42. http://dx.doi.org/10.3390/socsci12010042
    5. Vasyukov VF, Bocharov AV, Kashina E & Singilevich DA (2021), Cyberstalking as a type of cybercrime: Counteraction opportunities in Russian and international legislation. Revista Relações Internacionais do Mundo Atual 2(35), 1-16.
    6. Akhmetshin E, Fayzullaev N, Klochko E, Shakhov D & Lobanova V (2024), Intelligent data analytics using hybrid gradient optimization algorithm with machine learning model for customer churn prediction. Fusion: Practice and Applications 14(2), 159-171. http://dx.doi.org/10.54216/FPA.140213
    7. Abdullaev I, Prodanova N, Ahmed MA, Lydia EL, Shrestha B, Joshi GP & Cho W (2023), Leveraging metaheuristics with artificial intelligence for customer churn prediction in telecom industries. Electronic Research Archive 31(8), 4443-4458. http://dx.doi.org/10.3934/era.2023227
    8. Akhmetshin E, Nemtsev A, Shichiyakh R, Shakhov D & Dedkova I (2024), Evolutionary algorithm with deep learning based fall detection on In-ternet of things environment. Fusion: Practice and Applications 14(2), 132-145. http://dx.doi.org/10.54216/FPA.140211
    9. Kazakov O, Azarenko N & Kozlova I (2024), Developing a method for building business process models based on graph neural networks in the absence of task identifier data. Qubahan Academic Journal 4(1), 19-25. https://doi.org/10.58429/qaj.v4n1a333
    10. Chumakova EV, Korneev DG, Gasparian MS, Ponomarev AA & Makhov IS (2023), Building a neural network to assess the level of operational risks of a credit institution. Journal of Theoretical and Applied Information Technology 101(11), 4205-4213, available online: http://www.jatit.org/volumes/Vol101No11/8Vol101No11.pdf
    11. Angin P, Bhargava B & Ranchal R (2019), Big data analytics for cyber security. Security and Communication Networks 2019, 4109836. https://doi.org/10.1155/2019/4109836
    12. Dokholyan S, Ermolaeva EO, Verkhovod AS, Dupliy EV, Gorokhova AE, Ivanov VA & Sekerin VD (2022), Influence of management automation on managerial decision-making in the agro-industrial complex. International Journal of Advanced Computer Science and Applications 13(6), 597-603. http://dx.doi.org/10.14569/IJACSA.2022.0130672
    13. Iskajyan SO, Kiseleva IA, Tramova AM, Timofeev AG, Mambetova FA & Mustaev MM (2022), Importance of the information environment factor in assessing a country's economic security in the digital economy. International Journal of Safety and Security Engineering 12(6), 691-697. https://doi.org/10.18280/ijsse.120604
    14. Das R & Sandhane R (2021), Artificial intelligence in cyber security. Journal of Physics Conference Series, 1964(4), 042072. https://doi.org/10.1088/1742-6596/1964/4/042072
    15. Islam MA, Islam R, Chowdhury SA, Nur AH, Sufian MA & Hasan M. (2024), Assessing Cybersecurity Threats: The application of NLP in ad-vanced threat intelligence systems. In Lecture notes in networks and systems (pp. 1–14). https://doi.org/10.1007/978-3-031-70924-1_1
    16. Rose S, Borchert O, Mitchell S & Connelly S (2020), Zero trust architecture. Stafford, VA, Cybersecurity & Infrastructure Security Agency De-partment of Homeland Security. https://doi.org/10.6028/nist.sp.800-207
    17. Purchina O, Poluyan A & Fugarov D (2021), Hybrid immune algorithms application for solving unclear optimization problems. In Parinov IA, Chang SH, Kim YH & Noda NA (eds) Physics and mechanics of new materials and their applications. PHENMA 2021. Springer, Cham, pp. 591-596. https://doi.org/10.1007/978-3-030-76481-4_50
    18. Fugarov DD, Gerasimenko EY & Gerasimenko AN (2021), Modeling of electric mass transfer process in controlled electrochemical resistance. Journal of Physics: Conference Series 2131, 042050. https://doi.org/10.1088/1742-6596/2131/4/042050
    19. Purchina O, Poluyan A & Fugarov D (2023), An algorithm based on artificial intelligence for solving information security tasks. E3S Web of Con-ferences 371, 03066. http://dx.doi.org/10.1051/e3sconf/202337103066
    20. Khan MI, Arif A & Khan ARA (2024), The most recent advances and uses of AI in cybersecurity. BULLET: Jurnal Multidisiplin Ilmu, 3–3(04), 566–578.
    21. De Azambuja AJG, Plesker C, Schützer K, Anderl R, Schleich B & Almeida VR (2023), Artificial Intelligence-Based Cyber Security in the context of Industry 4.0 – A survey. Electronics, 12(8), 1920. https://doi.org/10.3390/electronics12081920
    22. Vaslavskaya I, Aboimova I, Aleksandrova I, Nekrasov K & Karshalova A (2023), Achieving the principles of sustainable development: Implemen-tation of smart solutions in the infrastructure of modern megacities. E3S Web of Conferences 449, 05001. https://doi.org/10.1051/e3sconf/202344905001
    23. Rakhimgalieva P, Serikbayeva N, Seiitkazy P, Kaishatayeva A & Suleimenova Z (2021), Adaptation of students to professional activity through innovative technologies. World Journal on Educational Technology: Current Issues 13(4), 1102-1123. http://dx.doi.org/10.18844/wjet.v13i4.6312
    24. Auganbai A, Kalymbek B, Shulanbekova GK, Urisbaeva AA & Yerezhepkyzy R (2020), Protection of objects of historical and cultural heritage: Legal problems and the application of information technologies. Environmental Policy and Law 49(6), 379-388. https://doi.org/10.3233/epl-190191
    25. Ydyrys S, Ibrayeva N, Abugaliyeva F, Zhaskairat M & Uvaliyeva A (2023), Regulatory and legal support for the development of digital infrastruc-ture in rural areas as a factor in improving the level of sustainable development and quality of life of the rural population. Journal of Environmental Management and Tourism 14(5), 2271-2280. https://doi.org/10.14505/jemt.v14.5(69).08
    26. Bezpalov V, Goncharenko L, Fedyunin D, Lochan S & Avtonomova S (2023), Developing a model of work duration under the influence of risk events in the implementation of life cycle contracts for large energy construction projects. Journal of Infrastructure, Policy and Development 7(3), 1946. http://dx.doi.org/10.24294/jipd.v7i3.1946
    27. Borodina M, Idrisov H, Kapustina DA, Zhildikbayeva A, Fedorov D, Gerasimova E & Solovyanenko N (2023), State regulation of digital technol-ogies for sustainable development and territorial planning. International Journal of Sustainable Development and Planning 18(5), 1615-1624. http://dx.doi.org/10.18280/ijsdp.180533
    28. Guembe B, Azeta A, Misra S, Osamor VC, Fernandez-Sanz L & Pospelova V (2022), The emerging threat of AI-driven cyber-attacks: a review. Applied Artificial Intelligence, 36(1). https://doi.org/10.1080/08839514.2022.2037254
    29. Mohammed A (2023), AI and Machine Learning in Cybersecurity: Strategies, Threats, and Exploits. Innovative Computer Science Journal, 9(1), 1–4. https://innovatesci-publishers.com/index.php/ICSJ
    30. Syed SA (2025), Adversarial AI and Cybersecurity: Defending Against AI-Powered Cyber Threats. IRE Journals, 8(9), 1030–1031. https://www.researchgate.net/publication/390555579
    31. Deitel P & Deitel H (2019), Python for artificial intelligence, big data, and cloud computing. Pearson, 600 p.
    32. Burkov A (2018), The hundred-page machine learning book. MIT Press, London, 500 p.
    33. Purchina O, Poluyan A & Fugarov D (2022), Securing an information system via the SSL protocol. International Journal of Safety and Security Engineering 12(5), 563-568. https://doi.org/10.18280/ijsse.120503
    34. Poluyan AYu, Fugarov DD, Purchina OA, Nesterchuk VV, Smirnova OV & Petrenkova SB (2018), Adaptive algorithm of selecting optimal vari-ant of errors detection system for digital means of automation facility of oil and gas complex. Journal of Physics: Conference Series 1015, 022013. http://dx.doi.org/10.1088/1742-6596/1015/2/022013
    35. Kirillova EA, Zenin SS, Parshin IA, Predbannikova OI & Rubakova II (2022), Cyberbullying among students in an educational institution: Oppor-tunities for counteraction. International Journal of Computer Science and Network Security 22(5), 602–606. https://doi.org/10.22937/IJCSNS.2022.22.5.83
    36. Purchina O, Poluyan A & Fugarov D (2021), The algorithm development based on the immune search for solving unclear problems to detect the optical flow with minimal cost. E3S Web of Conferences 258, 06052. https://doi.org/10.1051/e3sconf/202125806052
    37. Kirillova E (2023), Developing methods for assessing the introduction of smart technologies into the socio-economic sphere within the framework of open innovation. International Journal of Sustainable Development and Planning 18(3), 693-702. https://doi.org/10.18280/ijsdp.180305
    38. Francois C (2017), Deep learning with Python. Manning Publications, New York, NY, 384 p.
    39. Fugarov D (2023), Technological control of the granulometric composition of active materials of chemical current sources. In Guda A (ed) Net-worked control systems for connected and automated vehicles. NN 2022. Springer, Cham, pp. 1417-1423. https://doi.org/10.1007/978-3-031-11051-1_145
    40. Poluyan AYu, Purchina OA, Fugarov DD, Golovanov AA & Smirnova OV (2019), Solution of task on the minimum cost data flow based on bion-ic algorithm. Journal of Physics: Conference Series 1333(3), 032056. http://dx.doi.org/10.1088/1742-6596/1333/3/032056
    41. Khlynin E, Korovkina N, Zhukov R, Kozlova N & Myasnikova E (2023), Effect of information and communications technology on the efficient operation of the organizational and economic mechanism of enterprise fixed assets management. Relações Internacionais do Mundo Atual 2(4), e-063076б available online: https://revista.unicuritiba.edu.br/index.php/RIMA/article/view/6376
    42. Bagratuni K, Kashina E, Kletskova E, Kapustina D, Ivashkin M, Sinyukov V, Karshalova A, Hajiyev H & Hajiyev E (2023), Impact of socially re-sponsible business behavior on implementing the principles of sustainable development (experience of large business). International Journal of Sus-tainable Development and Planning 18(8), 2481-2488. https://doi.org/10.18280/ijsdp.180819
    43. Kozinkina AI (2020), A magneto dielectric AC measuring transducer for refinery automation systems. Journal of Machinery Manufacture and Reli-ability 49(11), 963-970.
    44. Fugarov DD, Purchina OA, Poluyan AYu, Gerasimenko AN & Rasteryaev NV (2019), Magnetodielectric AC measuring transducer for automation systems in oil refineries. Journal of Physics: Conference Series 1333(6), 062020. http://dx.doi.org/10.1088/1742-6596/1333/6/062020
    45. Cherckesova L, Revyakina E, Safaryan O, Porksheyan V & Kazaryan M (2024), Analysis of the possibilities of carrying out attacks on the func-tions of transferring control to operating system console using active intelligence methods. International Research Journal of Multidisciplinary Scope 5(2), 516-534. http://dx.doi.org/10.47857/irjms.2024.v05i02.0558
    46. Gerasimenko Y, Gerasimenko A, Gerasimenko Y, Fugarov D, Purchina O & Poluyan A (2021), Mathematical modeling and synthesis of an electri-cal equivalent circuit of an electrochemical device. In Murgul V & Pukhkal V (eds) International scientific conference energy management of mu-nicipal facilities and sustainable energy technologies EMMFT 2019. Springer, Cham, pp. 471-480. http://dx.doi.org/10.1007/978-3-030-57453-6_45
    47. Goodfellow I, Bengio Y & Courville A (2016), Deep Learning Network. MIT Press, London, 800 p.m.
    48. Aggarwal C (2018), Neural networks and deep learning. Springer, Cham, 360 p.
    49. Fugarov DD, Gerasimenko YY, Nesterchuk VV, Gerasimenko AN & Onyshko DA (2018), Methods for revealing hidden failures of automation system for technological processes in the oil and gas sector. Journal of Physics: Conference Series 1118, 012055. http://dx.doi.org/10.1088/1742-6596/1118/1/012055
    50. Purchina O, Poluyan A & Fugarov D (2023), Improving the security level of the information system using the SSL protocol. E3S Web of Confer-ences 371, 30-67. http://dx.doi.org/10.1051/e3sconf/202337103067
    51. Akhmetshin E, Kirillova E, Abdullayev I, Fedorov A, Tretyak E & Kochetkov E (2024), Legal status and the issues of legal personhood of artificial intelligence. Relacoes Internacionais no Mundo Atual 1(43), 356-366, available online: https://revista.unicuritiba.edu.br/index.php/RIMA/article/view/6722
    52. Fugarov D (2022), Development and mathematical modeling of the AC sensor for refinery automation systems smart innovation. Systems and Technologies 247, 271-281.
    53. Geron A (2018), Hands-on machine learning with Scikit-Learn, Keras, and TensorFlow. O'Reilly Media, Incorporated, Sebastopol, CA, 800 p.
    54. Purchina O, Poluyan A & Fugarov D (2023), Building algorithms based on artificial intelligence for solving problems to ensure information security. In Parinov IA, Chang SH & Soloviev AN (eds) Physics and mechanics of new materials and their applications. Springer, Cham, pp. 568-573. https://doi.org/10.1007/978-3-031-21572-8_50
    55. Fugarov D & Gerasimenko Y (2023), Mathematical modeling of electrolyte concentration field in the controlled electrochemical resistance. In Beskopylny A, Shamtsyan M & Artiukh V (eds) XV International scientific conference “INTERAGROMASH 2022”. Springer, Cham, pp. 1688-1695. https://doi.org/10.1007/978-3-031-21432-5_181
    56. Sutton RS & Barto AG (2018), Reinforcement learning: An introduction. 2nd ed. MIT Press, London, 552 p.
  • Downloads

  • How to Cite

    Poluyan, A., Purchina, O., & Fugarov, D. . (2025). Opportunities for Applying Artificial Intelligence by Commercial Organizations in Data Security and Cyber Threat Monitoring. International Journal of Basic and Applied Sciences, 14(2), 281-287. https://doi.org/10.14419/bh5z5x68