AI Revolutionizing Cybersecurity: An Overview

  • Authors

    • Bharathi S Associate Professor, Department of Electronics and Communication Engineering, Dr. Mahalingam College of Engineering and Technology, Pollachi, India
    • Alexandros Konios Assistant Professor, Department of Computer Science, Nottingham Trent University, U.K
    • Nandhakumar Manikandasamy PG scholar, Department of Computer Science, Nottingham Trent University, U.K
    • Sudha V K Professor, Department of Electronics and Communication Engineering, Dr. Mahalingam College of Engineering and Technology, Pollachi. India
    • Chairman M Assistant Professor, Department of Electronics and Communication Engineering, Dr. Mahalingam College of Engineering and Technology, Pollachi, India
    • Senbagam B Assistant Professor, Department of Electronics and Communication Engineering, Dr. Mahalingam College of Engineering and Technology, Pollachi, India
    https://doi.org/10.14419/a3kpw407

    Received date: August 10, 2025

    Accepted date: September 26, 2025

    Published date: November 5, 2025

  • Artificial Intelligence, Attack vectors, Cyber-aware, Cyber strategies, Digital information
  • Abstract

    Data, or digital information, is one of the main engines that drive human society. With ever-evolving digital footprints and human needs, the demand for data protection also increases significantly. Cybersecurity cuts across every nook and corner of the digital world, from physical environments to clouds. With multiple attack vectors evolving day by day, the need for more robust enterprise infrastructure and Threat intelligence also evolves. Artificial Intelligence plays a pivotal role, offering advanced simulation and reasoning capabilities for both offensive and defensive cybersecurity strategies. This work examines the application, ability, advantages, and disadvantages of various cyber strategies. With some limitations around the corner, the recent advancements made it clear that with proper utilization of AI, the human effort involved can be reduced with autonomous threat intelligence and attack capabilities. It also highlights the fact that adversarial training on models makes them more cyber-aware against the effectiveness of the model.

  • References

    1. Ali J, Singh SK, Jiang W, Alenezi AM, Islam M, Daradkeh YI, Mehmood A., A deep dive into cybersecurity solutions for AI-driven IoT-enabled smart cities in advanced communication networks, Computer Communications 229(2024) ,doi:10.1016/j.comcom.2024.108000
    2. Alqudhaibi A, Albarrak M, Jagtap S, Williams N, Salonitis K., Securing industry 4.0: Assessing cybersecurity challenges and proposing strategies for manufacturing management, Cyber Security and Applications. 3(2025), doi.org/10.1016/j.csa.2024.100067.
    3. Ferrag MA, Alwahedi F, Battah A, Cherif B, Mechri A, Tihanyi N, Bisztray T, Debbah M. Generative AI in Cybersecurity: A Comprehensive Re-view of LLM Applications and Vulnerabilities. Internet of Things and Cyber-Physical Systems, 5(2025) 1:46.
    4. Ali S, Wang J, Leung VC., AI-driven fusion with cybersecurity: Exploring current trends, advanced techniques, future directions, and policy impli-cations for evolving paradigms-A comprehensive review, Information Fusion, 118(2025).
    5. Manoharan A, Sarker M., Revolutionizing Cybersecurity: Unleashing the Power of Artificial Intelligence and Machine Learning for Next-Generation Threat Detection,1(2023), doi. org/10.56726/IRJMETS32644..
    6. Nadella GS, Gonaygunta H., Enhancing Cybersecurity with Artificial Intelligence: Predictive Techniques and Challenges in the Age of IoT, Inter-national Journal of Science and Engineering Applications. 2024,13(04):30-33.
    7. Familoni BT., Cybersecurity challenges in the age of AI: theoretical approaches and practical solutions, Computer Science & IT Research Journal, 2024, 5(3), 703-724.
    8. Kumar S, Gupta U, Singh AK, Singh AK., Artificial intelligence: revolutionizing cyber security in the digital era, Journal of Computers, Mechanical and Management, 2023, 2(3), 31-42.
    9. Dunn Cavelty M, Wenger A., Cyber security meets security politics: Complex technology, fragmented politics, and networked science, Contempo-rary Security Policy, 202041(1), 5-32.
    10. Welukar JN, Bajoria GP., Artificial Intelligence in Cyber Security-A Review, International Journal of Scientific Research in Science and Technolo-gy, 488(2021): 488-91.
    11. Kaur R, Gabrijelcic D, Klobucar T. Artificial intelligence for cybersecurity: Literature review and future research directions. Information Fusion. 97(2023), doi.org/10.1016/j.inffus.2023.101804
    12. Salem AH, Azzam SM, Emam OE, Abohany AA., Advancing cybersecurity: a comprehensive review of AI-driven detection techniques, Journal of Big Data, 2024 11(105), doi.org/10.1186/s40537-024-00957-y
    13. Jada I, Mayayise TO., The impact of artificial intelligence on organisational cyber security: An outcome of a systematic literature review, Data and Information Management. 2024, 8(2): doi.org/10.1016/j.dim.2023.100063.
    14. Rampasek M, Mesarcik M, Andrasko J., Evolving cybersecurity of AI-featured digital products and services: Rise of standardisation and certifica-tion?, Computer Law & Security Review, 2025 56:106093.
    15. Parambil MMA, Rustamov J, Ahmed SG, Rustamov Z, Awad AI, Zaki N, Alnajjar F., Integrating AI-based and conventional cybersecurity measures into online higher education settings: Challenges, opportunities, and prospects.,Computers and Education: Artificial Intelligence, 7(2024): doi.org/10.1016/j.caeai.2024.100327
    16. Coppolino L, D’Antonio S, Mazzeo G, Uccello F, The good, the bad, and the algorithm: The impact of generative AI on cybersecurity, Neurocom-puting, 623(2025): doi 10.1016/j.neucom.2025.129406
    17. Zeng H, Yunis M, Khalil A, Mirza N., Towards a conceptual framework for AI-driven anomaly detection in smart city IoT networks for enhanced cybersecurity, Journal of Innovation and Knowledge. 2024, 9(4):100601.
    18. Vasalou A, Benton L, Serta A, Gauthier A, Besevli C, Turner S, Gill R, Payler R, Roesch E, McAreavey K, Bauters K., Doing cybersecurity at home: a human-centred approach for mitigating attacks in AI-enabled home devices, Computers and Security,148(2025):104112.
    19. Sarker IH, Janicke H, Mohsin A, Gill A, Maglaras L., Explainable AI for cybersecurity automation, intelligence and trustworthiness in digital twin: Methods, taxonomy, challenges and prospects, ICT Express, 2024,10(4), 935-958.
    20. Muheidat F, Mallouh MA, Al-Saleh O, Al-Khasawneh O, Loai AT., Applying AI and Machine Learning to Enhance Automated Cybersecurity and Network Threat Identification, Procedia Computer Science, 251(2024):287-94.
    21. Sarker IH, Janicke H, Ferrag MA, Abuadbba A., Multi-aspect rule-based AI: Methods, taxonomy, challenges and directions toward automation, intelligence and transparent cybersecurity modeling for critical infrastructures, Internet of Things. 2024, 25(2), doi:10.1016/j.iot.2024.101110
    22. Ali G, Shah S, ElAffendi M., Enhancing cybersecurity incident response: AI-driven optimization for strengthened advanced persistent threat detec-tion, Results in Engineering, 25(2025):104078.
    23. Filali A, Sallah A, Hajhouj M, Hessane A, Merras M. Towards Transparent Cybersecurity: The Role of Explainable AI in Mitigating Spam Threats. Procedia Computer Science. 236(2024), 394-401.
    24. Karki S, Hasan AM, Sanin C, Use of ML and AI in Cybersecurity-A Survey, Procedia Computer Science. 246(2024):1260-1270.
    25. Kumar R, Aljuhani A, Javeed D, Kumar P, Islam S, Islam AN, Digital twins-enabled zero touch network: A smart contract and explainable AI in-tegrated cybersecurity framework, Future Generation Computer Systems, 156(2024):191-205.
    26. Khan K, Khurshid A, Cifuentes-Faura J., Is artificial intelligence a new battleground for cybersecurity?., Internet of Things, 28(2024):101428.
    27. Maraveas C, Rajarajan M, Arvanitis KD, Vatsanidou A., Cybersecurity threats and mitigation measures in agriculture 4.0 and 5.0., Smart Agricul-tural Technology. 9(2024), doi.org/10.1016/j.atech.2024.100616.
    28. Saleh AM., Blockchain for secure and decentralized artificial intelligence in cybersecurity: A comprehensive review, Blockchain: Research and Ap-plications. 2024 doi:10.1016/j.bcra.2024.100193
    29. Campoverde-Molina M, Luján-Mora S., Cybersecurity in smart agriculture: A systematic literature review, Computers and Security, 150(2024): doi.org/10.1016/j.cose.2024.104284.
    30. Nobles C., The weaponization of artificial intelligence in cybersecurity: A systematic review, Procedia Computer Science. 239(2024):547-555.
    31. Chaudhuri A, Behera RK, Bala PK., Factors impacting cybersecurity transformation: An Industry 5.0 perspective, Computers and Security, 150 (2025):104267.
    32. Michael K, Vogel KM, Pitt J, Zafeirakopoulos M., Artificial intelligence in cybersecurity: A socio-technical framing, IEEE Transactions on Tech-nology and Society. 2025,6(1):15-30.
    33. Alhamdi MJ, Lopez-Guede JM, AlQaryouti J, Rahebi J, Zulueta E, Fernandez-Gamiz U. AI-based Malware Detection in IoT Networks within Smart Cities: A Survey. Computer Communications. 253(2025):108055.
    34. Baghirov E., A comprehensive investigation into robust malware detection with explainable AI. Cyber Security and Applications. 3(2025): doi.org/10.1016/j.csa.2024.100072.
    35. Galli A, La Gatta V, Moscato V, Postiglione M, Sperlì G., Explainability in AI-based behavioral malware detection systems, Computers and Se-curity.141(2024): doi.org/10.1016/j.cose.2024.103842.
    36. Raman R, Calyam P, Achuthan K., ChatGPT or Bard: Who is a better Certified Ethical Hacker?. Computers & Security, 140(2024): doi.org/10.1016/j.cose.2024.103804.
    37. He Y, Zamani E, Yevseyeva I, Luo C. Artificial intelligence–based ethical hacking for health information systems: simulation study. Journal of medical Internet research. 25(2023): doi: 10.2196/41748.
    38. Akhunzada A, Al-Shamayleh AS, Zeadally S, Almogren A, Abu-Shareha AA, Design and performance of an AI-enabled threat intelligence framework for IoT-enabled autonomous vehicles, Computers and Electrical Engineering, 119(2024):109609.
    39. Hassan A, Nizam-Uddin N, Quddus A, Hassan SR, Rehman AU, Bharany S., Navigating IoT Security: Insights into Architecture, Key Security Features, Attacks, Current Challenges and AI-Driven Solutions Shaping the Future of Connectivity, Computers, Materials and Continua. 2024 81(3): 3499-3559
    40. Cyber and infrastructure security centre, department of home affairs, 2023, Australian Government https://www.homeaffairs.gov.au/. (Accessed: 20 July 2024).
    41. Hu, E.J., Shen, Y., Wallis, P., Allen-Zhu, Z., Li, Y., Wang, S. and Chen, W., LoRA: Low-rank adaptation of large language models, (2021), doi.org/10.48550/arxiv.2106.09685.
  • Downloads

  • How to Cite

    S, B., Konios , A. ., Manikandasamy , N. ., V K , S. ., M, C. ., & B, S. . (2025). AI Revolutionizing Cybersecurity: An Overview. International Journal of Basic and Applied Sciences, 14(7), 139-148. https://doi.org/10.14419/a3kpw407