You are on page 1of 7

Cyber Security's Silver Bullet- A Systematic

Literature Review of AI-Powered Security


Iqra Tabassum Sibghat Ullah Bazai Zubair Zaland
Dept. of Computer Science, Dept. of Computer Engineering, Dept. of Software Engineering,
Balochistan University of Information Balochistan University of Information Balochistan University of Information
Technology, Engineering, and Technology, Engineering, and Technology, Engineering, and
Management Sciences (BUITEMS), Management Sciences (BUITEMS), Management Sciences (BUITEMS),
2022 3rd International Informatics and Software Engineering Conference (IISEC) | 978-1-6654-5995-2/22/$31.00 ©2022 IEEE | DOI: 10.1109/IISEC56263.2022.9998305

Quetta, Pakistan Quetta, Pakistan Quetta, Pakistan


iqra_tabassum47@yahoo.com 0000-0003-3042-5977 zubair.zaland@buitms.edu.pk

Shah Marjan Muhammad Zahid Khan Muhammad Imran Ghafoor


Dept. of Software Engineering, Dept. of Computer Engineering, Dept. of Engineering, Pakistan
Balochistan University of Information Balochistan University of Information Television Corporation
Technology, Engineering, and Technology, Engineering, and Lahore, Pakistan
Management Sciences (BUITEMS), Management Sciences (BUITEMS), 0000-0002-0809-3163
Quetta, Pakistan Quetta, Pakistan
0000-0001-9163-0259 Zahidkhan827@yahoo.com

Abstract— One of the areas that stand to gain the most from Automated Public Turing Test to Tell Computers and
the adoption of Artificial Intelligence (AI) is Cyber Security. Humans Apart), and the application of AI in cyber security
Traditional well-known system approaches may be slow and solutions is currently a hot topic [3]. Gmail uses AI to detect
inadequate despite their virtues for a variety of purposes due to and stop unwanted spam and fraudulent emails [4]. To
their lack of intelligence and dynamism. As a result, they may
be unable to meet the diverse needs of the current cyber sector.
achieve outstanding results against new cyber security
As an alternative, AI approaches may enhance security threats, the Darktrace organization heavily invests in AL and
performance and provide superior defense against a wide range ML. They built their entire business strategy for security
of sophisticated cyber threats. We conducted a Systematic products on top of AI and ML. There is an "Enterprise
Literature Review (SLR) to examine the possibility that AI Immune System" that can protect business operations from
could reduce cyber security assaults. As a result of AI, a infections in a similar manner to how the human body does.
revolution has been triggered. Criminals could not stay away They assert that by utilizing ML approaches for real-time
from this ball of fire. We analyze three areas of analysis: (i) AI detection, they can stop network-based assaults without the
for enhanced cyber security (ii) How AI-powered cyber security usage of rules [5].
works (iii) Applications of AI in cyber security and the analysis
of cyber security attack detection through AI techniques and
Employees are recognized by 52% of businesses as the
methods. Our analysis of the attributes for every area can help most serious cyber security weakness, per a study by
both researchers and practitioners as they carry out their Kaspersky. According to Verizon's yearly report on data
upcoming applications and research. breaches, human error is a factor in 85% of these breaches.
[6]. Adopting AI in cyber security has the benefit of reducing
Keywords—Artificial Intelligence, Machine Learning, Deep human error as these platforms can function more precisely
Learning, Cyber Security, Data Privacy and meticulously. With the assistance of machine learning /
Deep Learning (DL) algorithms, AI can stop any security
I. INTRODUCTION breach by alerting the appropriate authorities to the events in
The study and invention of systems capable of performing a matter of seconds [7]. Certainly, AI holds some promise as
operations that would typically require human intelligence, a cyber security cure. While AI-based solutions can
such as voice recognition, visual perception, decision- significantly cut the time required for threat identification and
making, and language translation, is referred to as Artificial incident response. The transition to ML and DL will be the
Intelligence (AI). As a result, a rise in automation spurs main advancement in the modern generation of cyber security
competition for new skills presents opportunities, and creates as we approach the dawn of a new era: the era of AI.
difficulties for cyber security [1]. Security is a key problem
in the age of the internet's exponential growth and the intense The Systematic Literature Review (SLR) of AI, ML, and
workloads in the fields of Artificial Intelligence, Machine DL in cyber security is presented in this study. The Research
Learning (ML), the Internet of Things (IoT), blockchain method is discussed in the next portion of the study. Section
technology, big data analysis, and data science. II of the paper will outline the procedure for choosing literary
In 2021, the AI market was estimated to be worth USD sources. The study of the literature resources is presented in
93.5 billion, with a projected CAGR of 38.1% from 2022 to Section III and is broken down into major categories. The
2030. The global cyber security industry was estimated by outcomes of the literature review and the research's
Mordor Intelligence to be worth $156.24 billion in 2020 and conclusions are presented in the last parts.
to expand to $352.25 billion with an average annual growth
II. RESEARCH DESIGN
rate of 14.5% by 2026 [2]. These figures illustrate the
synergistic ability of the domains and the necessity of The investigation is built on the SLR technique, a visible,
establishing the right cohesion. thorough, and repeatable process that enables researchers to
The relationship between Artificial Intelligence and Cyber
Security is best illustrated by the CAPTCHA (Completely

978-1-6654-5995-2/22/$31.00 ©2022 IEEE


Authorized licensed use limited to: University of London: Online Library. Downloaded on November 14,2023 at 14:23:28 UTC from IEEE Xplore. Restrictions apply.
govern judgments, procedures, and conclusions, to evaluate Stage 1
the role of AI-Powered cyber security. We concentrate on the
upcoming points to accomplish this goal: (i) The necessity of
AI for enhanced cyber security; (ii) How AI-Powered cyber Filter Document Type
security; (iii) Applications of AI in Cyber security approaches. IEEE = 37
Even though a variety of SLR strategies have been put forth, ResearchGate = 10
the SLR procedure put forward by [8] was chosen for this Springer = 19
work since it was thought to be the most appropriate given the Elsevier = 7
goals of this research paper. Four phases were followed in the MDPI = 8
execution of an SLR: (i) planning the review based on Hindawi = 3 Initial set of
research questions; (ii) search execution process; (iii) Academia =1 #Results
document analysis using inclusion-exclusion criteria; and (iv) Others = 25 127
reporting results. As shown in Fig. 1, each stage involved
particular tasks that were completed in a particular order.
Even though our SLR cannot be regarded as exhaustive, we Stage 2
provide a critical description of the role played by AI in the
context of cyber security as a way of avoiding or minimizing Filter Duplicated
the onset of cyberattacks and organizational security problems Results
as well as making firms resilient to cyber warfare. 110
A. Literature Search
The research process was carried out utilizing electronic
databases that were indexed by the Google search engine, Stage 3
Research Gate, and Science Hub, in accordance with the Selection after
suggested SLR technique once the purpose of the analysis Selection after
reading Title and
was identified. All the sources were accessed between August reading Paper
Abstract
and September 2022. 58
82
The execution process proceeds by the search criteria by
previously defined search strings, keywords: “Artificial
Fig. 1. Results of the filtering and selection process
Intelligence in Cybersecurity”, “Al Powered Cybersecurity”,
“Applications of AI in cyber security”, “AI /ML techniques the articles, which decreased this number to 110 as displayed
threat detection in Cybersecurity”, and “Privacy”. Several in the "Filter duplicate documents". 28 papers were excluded
variants were considered to strengthen the search. from the analysis after the title, abstract, and keywords were
The method of document selection and filtering for each reviewed because they did not meet the study's goals. The
source is quantitatively described in Fig. 1 along with remaining 58 articles' whole contents were subsequently
summary data. The total number of resulting papers was examined. This demonstrated that some of the papers did not
listed in stage 1 under "# Results." The following searches as specifically mention the area. Based on the language and
illustrated in Table I were used to narrow down the research document type, all the papers were manually filtered.
requirements:
III. ANALYSIS OF LITERATURE RESOURCES
TABLE I. INCLUSION AND EXCLUSION CRITERIA
A. Necessity of AI for Enhanced Cyber Security
Inclusion Criteria Exclusion Criteria
Current digital civilization recognizes that personal data is
Study Type Review and original Reports, thesis, and
more susceptible than before. Data is stored on connected
content editorials
computers and devices in our modern society, which covers
Source Peer-reviewed
everything from governmental infrastructure to online
articles, Conference
financial transactions. Data may contain sensitive
proceedings. __
information including financial data, intellectual property,
Year of 2017-2022 Before 2017 and personal information that could have unforeseen effects
Publication if exposed without authorization [8]. Security providers,
Language English Other than English companies, and individuals can gain the upper hand in several
Region Not confined to a __ key areas when it comes to preventing cyber-attacks thanks
specific area to AI prediction powers [9]. Some of the key defensive
Parameters ML and DL Conventional innovations of AI in Cybersecurity are:
methods in cyber techniques • Identifying Emerging Threats [4]
security and other
• Breach Risk Prediction [4]
privacy aspects.
• Better End Point Protection [4]
The use of language and document type filters resulted in • Network Traffic Anomaly Detection [9]
a reduction of the number of publications to 127 from an • Restrict the launch of malicious software and files [9]
initial set of results (as evidenced by the "#Results"). To • Identify attackers and prohibit them from
prevent including the same paper more than once from compromising IoT devices [9]
different sources, a title and author comparison were done on • Quantitative risk [9]

Authorized licensed use limited to: University of London: Online Library. Downloaded on November 14,2023 at 14:23:28 UTC from IEEE Xplore. Restrictions apply.
• Fraud Detection [10] learning uses unlabeled input data. Unsupervised learning is
• Botnet Detection [10] frequently used to estimate density, decrease dimensionality,
• Intrusion Detection and Intrusion Prevention [11] and cluster data. To get a highly accurate clustering, a fuzzy
• Automated surveillance systems [12] Deep Brief Network (DBN) system, which combines the
• Timely and accurate Cyber Threat Intelligence [12] Takagi-Sugeno-Kang (TSK) fuzzy system, can give an adaptive
mechanism to govern the depth of the DBN [16]. To achieve
These are just a few examples of how artificial intelligence these goals, a variety of clustering algorithms can be used,
is being used in cyber security. 85–99% of assaults are including partitioning techniques like K-means [7], K-
successfully located, according to the statistics. Dark Trace, meloids [13, 15], CLARA, distribution-based clustering like
a firm that develops intelligent software, asserts that it has Gaussian mixture models (GMMs), density-based methods like
thousands of clients worldwide and a success record of 99% DBSCAN, agglomerative or divisive techniques like Single
[9]. linkage, Complete linkage, BOTS [13] hierarchical-based
methods, etc.
B. AI-Powered Cyber Security 3. Reinforcement Learning (RL): The foundation of RL
Artificial intelligence is the foundation of intelligent cyber is rewarding a smart agent's action. By acting and interacting
security management, which employs a variety of AI with its surroundings, an agent learns through mistakes and
approaches to ultimately pursue smart decisions in cyber rewards. It is appropriate for jobs that will receive ongoing
services or applications. We have used ML and DL feedback. [17-18], created the deep Q-network, a deep
methodologies, two of the most well-liked AI techniques. The reinforcement learning architecture that can attain human-
actions that make up this AI-based security intelligence
level control, by merging the advancements in deep neural
modeling are briefly scrutinized below and have the potential
network training.
to be used to do cyber security duties with sensible decision-
making [13]. C. Applications of AI in the Context of CyberSecurity
Machine Learning and Deep Learning-based Modeling: a) Intrusion Detection (ID): IDSs are among the most
Using the provided prior cyber security data, ML, crucial parts of the defensive systems for defending against
especially neural network-based DL, can be leveraged to cyberattacks. The IDS mostly use methods of signature
create efficient security modeling [13]. The conventional matching. The IDSs based on signature detection will scan
method of preventing network security is to try to match the the incoming network flow for specified signatures (or
code with the known signatures of the malware to stop it from patterns) to stop the suspect ones. The methods have shown
running. There is frequently little effort that can be done to good performance in identifying recognized dangers. The
try to stop the execution Aiming to identify malware attacks solutions that rely on signature matching, however, are
in real-time, the machine learning method combines network unable to counter new or zero-day attacks [19].
isolation technology with artificial intelligence to isolate b) Botnet Detection: A network of computers and other
compromised PCs or entire network segments in devices known as "bots" is referred to as a "botnet." A botnet
milliseconds, preventing the propagation of dangerous code is a collection of connected computers that have been infected
[9]. The classification of ML and DL is based on how it with malware. A "botmaster" utilizes a network channel to
learns. The three main learning processes are supervised instruct the bots after the infection has started. The botmaster
learning, unsupervised learning, and reinforcement learning. typically encrypts the channel to prevent detection. The
Numerous well-known ML and DL algorithms exist [7, 14, botmaster uses a Command and Control (C&C) server to push
15], that can be put to use for a variety of reasons in the commands and patches. DDoS attacks rely largely on botnets.
security field, including the exploitation of malware and the The bigger the botnet, the more effective the DDoS assault
identification of risky behavior that might result in phishing will be. Botnets are also used to steal data and steal people's
attacks or malicious code. identities [20]. In a short period in 2017, the Necurs botnet
transmitted over 40,000 malicious emails. Taking 2.047 BTC
1. Supervised Learning: The use of supervised learning (Bitcoin Currency) from a large number of people. 30 million
as a classification or regression technique typically systems were infiltrated by the Monero mining botnet
necessitates the use of labeled input data. An example of a mominru in 2018, and 500,000 crypto mining equipment
were destroyed as a result [21].
binary classification scenario is malware detection (malicious
or benign). As opposed to classification, regression learning c) Phishing Detection: Phishing attacks use
sophisticated strategies and technologies to collect sensitive
generates a prediction value which is one or more continuous-
data, including social engineering, content injection phishing,
valued integers depending on the data input. [16]. Spam and
mobile applications, and online social networks [22].
malicious behavior can be classified using supervised Phishing attacks peaked in 2021, according to APWG's
learning methods. Naïve Bayes (NB) [7], K-Nearest Neighbors Phishing Activity Trends Report. These occurrences are now
(KNN) and Decision Tree (DT) [7, 16], Support Vector more than three times as frequent as they were less than two
Machines (SVM) [7, 14, 16], Logistic Regression and Linear years ago, with more than 300,000 attacks documented in
Regression [7] and Random Forest [7, 14], etc. are prominent December. The 2021 research also emphasizes a rising
classification methods in this field. tendency for phishing attempts targeted at cryptocurrency
2. Unsupervised Learning: As opposed to supervised organizations. These represent 6.5 percent of attacks as of
learning, which employs labeled input data, unsupervised late.

Authorized licensed use limited to: University of London: Online Library. Downloaded on November 14,2023 at 14:23:28 UTC from IEEE Xplore. Restrictions apply.
d) Malware Detection: As malware damages systems classification and LIME for
directly or takes their sensitive data, it is regarded as the extract explanations.
biggest danger to cyber security. Malware includes rootkits, [30] 2021 Springer Proposed a framework
worms, viruses, ransomware, and trojans. Malicious software FAIXID to leverage the XAI
is now more prevalent than it was a few years ago, up 22.9%, and data cleaning methods for
signaling an alarming surge in risks to computer users. IDS alerts to eliminate false
According to the authors, in January 2021 there were roughly positives.
one billion infected files [23]. [31] 2021 TechRxiv Proposed an IDS framework
powered that integrates with ML-based
by IEEE RFC and XAI SHAP model
for a global explanation.
56
[32] 2021 IEEE Proposed a novel Reliable-
Intrusion Detection NIDS (RNIDS) that enables
104
ML models to operate on
Botnet Detection integrated datasets.
72 [33] 2020 IEEE Explains the idea behind the
Phishing Detection
Hybrid Oracle-Explainer for
64 Malware Detection achieving XIDS.
64 [34] 2019 ACM An anomaly-based IDS was
Privacy Aspects presented to detect network
anomalies and generate SDN
flow rules to enable dynamic
Fig. 2. Distribution of studies in terms of security areas network access control.
[35] 2018 IEEE Presents a Deep Auto Encoder
Fig. 2 depicts the traits of the chosen studies that looked at (DAE) DL model for IDS by
the application of various AI algorithms in detecting and utilizing the KDD-CUP’99
eliminating threats in the context of cyber security and dataset.
privacy issues. [36] 2017 IEEE Proposed a DL approach for
ID using RNN-IDS and check
TABLE II. STUDIES FOCUS ON AI AND XAI INTRUSION DETECTION
the effectiveness for binary
Ref Year Publisher Focused Area and multiclass classification.
[24] 2022 Springer Proposed an interpretable and
explainable hybrid IDS in TABLE III. STUDIES FOCUS ON AI AND XAI BOTNET DETECTION
conjunction with AI rule- Ref Year Publisher Entity Detected
based DT algorithm for long- [37] 2022 IEEE Network traffic
lasting security. [38] 2022 IEEE DGA-based botnets
[25] 2022 MDPI Proposed an IDS for IIoT [39] 2022 IEEE -----
imbalanced datasets by
[40] 2021 IEEE IoT Botnet detection on Mirai
utilizing the XGBoost model
and Bashlite Malware
to address the problem of
[41] 2019 IEEE ------
multiclass output with
[42] 2019 Elsevier AI-enabled malware traffic
imbalanced distributions.
[43] 2018 IEEE Malware traffic
[26] 2022 Arxiv Develop a SOMs XAI
algorithm based on X-IDS [44] 2018 Springer Botnet Zero-day attack in real
that can generate explanatory time
visualizations.
TABLE IV. STUDIES FOCUS ON PHISHING DETECTION
[27] 2022 MDPI Proposed a Classification for
IDS based on ensemble trees, Ref Year Publisher Validation Domain
incorporating DT and RF [45] 2021 IEEE Phishing URLs
classifiers with two IoT-based [46] 2020 IEEE Websites
datasets and the SHAP
method to explain and [47] 2020 Journal of Websites URL
interpret results. Critical
[28] 2022 MJBAS ANN was proposed for Reviews
network security and data [48] 2019 IEEE Classify emails as phishing or
confidentiality using the non-phishing
CICIDS 2017 dataset. [49] 2019 IEEE Adaptive Real-time anti-
[29] 2021 HCIS Proposed an adversarial attack phishing website system
detection in ML-based XAI [50] 2018 IWSPA Detecting Phishing emails
IDS using SVM for

Authorized licensed use limited to: University of London: Online Library. Downloaded on November 14,2023 at 14:23:28 UTC from IEEE Xplore. Restrictions apply.
[51] 2018 IEEE Extract Statistical and lexical TABLE VI. STUDIES FOCUS ON PRIVACY ASPECTS
features from URLs and Ref Year Publisher Focused Area
webpage links [62] 2021 ACM Compared to earlier
[52] 2018 IEEE Websites Transactions methodologies, produced a
on Privacy lot less RDDs and smaller
TABLE V. STUDIES FOCUS ON MALWARE DETECTION
and Security size partitions connected to
Ref Year Publisher Focused Area each RDD, lowering the
[53] 2021 Springer Designed a malware classifier essential operating costs in
based on a graph terms of re-computation
convolutional network that costs, shuffle operations,
can adjust to diverse malware cache management and
traits. message exchange. So, for
[54] 2021 Elsevier Proposed a novel approach Apache Spark, a novel
utilizing LIME to emphasize hybrid solution to multi-
features for CNN model dimensional data
explainability in Android anonymization was
malware detection. developed.
[55] 2021 ACM Proposed a novel technique [63] 2021 MDPI The generalized Subtree
“XMAL” that uses a Data Anonymization
specialized attention Technique for Apache
mechanism and an MLP Spark is proposed as an
model to analyze the harmful RDD-based
behavior of Android apps. implementation to solve the
[56] 2021 USENIX CADE is designed to detect drawbacks of its
drifting instances that depart MapReduce-based
from the initial training equivalents. Therefore,
distribution in order to combat anonymization
concept drift in security texts. strategies guarantee
[57] 2020 Elsevier Engine-specific patterns privacy levels.
based on co-opcode graphs [64] 2021 IEEE Introduced an innovative
are used to detect technique that incorporates
metamorphic malware. SQLi protection,
[58] 2019 IEEE The proposed method encryption, salting, and
investigated the malicious hashing the passwords to
payloads in various files based create a three-tier password
on binary visualization security algorithm.
and incremental NNs. [65] 2020 MDPI Proposed “SparkDA” a
[59] 2019 Hindawi To locate malware in an IoT novel anonymization
environment, a Behavior- technique to generate
Based DL framework was privacy-preserving
proposed. anonymized datasets for
[60] 2018 Springer Two distinct models ResNet iterative operations.
and GoogleNet models [66] 2019 Springer Proposed Data
utilized to identify hidden or Anonymization Algorithm
new malware. that provides great data
[61] 2018 IEEE Generalize the Black-box ML utility with privacy using
model by strengthening a Spark Resilient Distributed
Gradient-Based approach to Dataset.
recognize influential local [67] 2019 Springer Delivering big data Issues
features with privacy encountered
while processing data in a
MapReduce cluster.
The SLR is concentrating on how AI-powered cyber security
[68] 2018 Springer Proposed a k-NN
works in terms of ML and DL approaches, as well as a study
Classification to run on a
focus on various data privacy and security issues in big data
MapReduce platform with
analytics. Data privacy has been a problem as it sometimes
an anonymized dataset.
encompasses sensitive personal information that, if revealed,
leaves the user's data open to unwanted access and raises IV. DISCUSSION
serious privacy concerns.
The results presented above show that to develop an
advanced and automated cyber security system, cyber
security must be integrated with AI, ML, and DL techniques.

Authorized licensed use limited to: University of London: Online Library. Downloaded on November 14,2023 at 14:23:28 UTC from IEEE Xplore. Restrictions apply.
TABLE II displays a tabular analysis of the literature on AI Issue on Cybersecurity Management in the Era of AI,” J. Netw. Syst.
Manag., vol. 30, no. 3, pp. 1–7, 2022, doi: 10.1007/s10922-022-09659-
and XAI intrusion detection. TABLE III provides a summary
3.
of the AI and XAI Botnet Detection techniques. TABLE IV [13] I. H. Sarker, M. H. Furhad, and R. Nowrozy, “AI-Driven
and V provide a tabular summary of the literature on phishing Cybersecurity: An Overview, Security Intelligence Modeling and
detection and malware detection, respectively and the tabular Research Directions,” SN Comput. Sci., vol. 2, no. 3, pp. 1–18, 2021,
doi: 10.1007/s42979-021-00557-0.
summary of Privacy sensitivity domains is provided in
[14] M. Chakraborty and M. Singh, Introduction to Network Security
TABLE VI. For each of these topics, information is provided Technologies, vol. 163. 2021. doi: 10.1007/978-981-15-9317-8_1.
on the focused subject, AI/ML models/techniques, key traits, [15] I. H. Sarker, A. S. M. Kayes, S. Badsha, H. Alqahtani, P. Watters, and
and performance assessment of each study. This research A. Ng, “Cybersecurity data science: an overview from machine
learning perspective,” J. Big Data, vol. 7, no. 1, 2020, doi:
may also act as a foundation for the creation of novel
10.1186/s40537-020-00318-5.
conceptual frameworks. Studies show that AI systems are [16] J. hua Li, “Cyber security meets artificial intelligence: a survey,” Front.
more flexible, resilient, and versatile, which improves Inf. Technol. Electron. Eng., vol. 19, no. 12, pp. 1462–1474, 2018, doi:
security performance and better protects systems from ever- 10.1631/FITEE.1800573.
[17] C. Li, “Deep Reinforcement Learning,” Reinf. Learn. Cyber-Physical
more sophisticated threats. The AI techniques built on deep
Syst., no. November, pp. 125–154, 2019, doi:
learning may be the most effective and promising. The paper 10.1201/9781351006620-6.
claims that businesses will soon be required to incorporate [18] V. Mnih et al., “Human-level control through deep reinforcement
AI, ML, and DL into their cybersecurity policies and move learning,” Nature, vol. 518, no. 7540, pp. 529–533, 2015, doi:
10.1038/nature14236.
swiftly to improve their proficiency in these fields.
[19] Q.-V. Dang, “Using Machine Learning for Intrusion Detection
Systems,” Comput. Informatics, vol. 41, no. 1, pp. 12–33, 2022.
V. CONCLUSION [20] R. Calderon, “The benefits of artificial intelligence in cybersecurity,”
This article is aimed at how AI can be used to address 2019.
[21] X. Yang, Z. Guo, and Z. Mai, “Botnet Detection Based on Machine
cyber security concerns. According to a report, AI is Learning,” pp. 213–217, 2022, doi: 10.1109/icbctis55569.2022.00056.
becoming an indispensable component for enhancing the [22] C. Catal, G. Giray, B. Tekinerdogan, S. Kumar, and S. Shukla,
productivity of information security organizations. As Applications of deep learning for phishing detection: a systematic
humans aren’t any longer able to properly secure corporate- literature review, vol. 64, no. 6. Springer London, 2022. doi:
10.1007/s10115-022-01672-x.
level attack vectors, artificial intelligence provides the vital [23] F. A. Aboaoja, A. Zainal, F. A. Ghaleb, B. A. S. Al-rimy, T. A. E. Eisa,
analysis and threat detection that security specialists may and A. A. H. Elnour, “Malware Detection Issues, Challenges, and
utilize to minimize the likelihood of a violation and boost Future Directions: A Survey,” Appl. Sci., vol. 12, no. 17, p. 8482, 2022,
their organization's defense capabilities. The most effective doi: 10.3390/app12178482.
[24] T. Dias, N. Oliveira, N. Sousa, I. Praça, and O. Sousa, “A Hybrid
anomaly detection systems currently in use are based on Approach for an Interpretable and Explainable Intrusion Detection
artificial intelligence, and as these systems develop, more System,” Lect. Notes Networks Syst., vol. 418 LNNS, pp. 1035–1045,
cyber-security applications will incorporate them. 2022, doi: 10.1007/978-3-030-96308-8_96.
[25] T.-T.-H. Le, Y. E. Oktian, and H. Kim, “XGBoost for Imbalanced
REFERENCES Multiclass Classification-Based Industrial Internet of Things Intrusion
Detection Systems,” Sustainability, vol. 14, no. 14, p. 8707, 2022, doi:
[1] J. A. Kroll, J. B. Michael, and D. B. Thaw, “Enhancing cybersecurity 10.3390/su14148707.
via artificial intelligence: Risks, rewards, and frameworks,” Computer [26] J. Ables et al., “Creating an Explainable Intrusion Detection System
(Long. Beach. Calif)., vol. 54, no. 6, pp. 64–71, 2021. Using Self Organizing Maps”.
[2] N. Capuano, G. Fenza, V. Loia, and C. Stanzione, “Explainable [27] T. T. H. Le, H. Kim, H. Kang, and H. Kim, “Classification and
Artificial Intelligence in Cybersecurity: A Survey,” IEEE Access, vol. Explanation for Intrusion Detection System Based on Ensemble Trees
10, no. August, pp. 93575–93600, 2022, doi: and SHAP Method,” Sensors, vol. 22, no. 3, pp. 1–28, 2022, doi:
10.1109/ACCESS.2022.3204171. 10.3390/s22031154.
[3] K. R. Bhatele, H. Shrivastava, and N. Kumari, “The Role of Artificial [28] Y. M. Malgwi, I. Goni, and B. M. Ahmad, “Artificial Neural Network
Intelligence in Cyber Security,” no. January, pp. 170–192, 2019, doi: Model for Intrusion Detection System,” Mediterr. J. Basic Appl. Sci.,
10.4018/978-1-5225-8241-0.ch009. vol. 06, no. 01, pp. 20–26, 2022, doi: 10.46382/mjbas.2022.6103.
[4] I. Azhar and M. Sr, “Novateur Publications International Journal of [29] E. Tcydenova, T. W. Kim, C. Lee, and J. H. Park, “Detection of
Innovations in Engineering Research and Technology [Ijiert] Artificial Adversarial Attacks in AI-Based Intrusion Detection Systems Using
Intelligence for Cybersecurity: a Systematic Mapping of Literature,” Explainable AI,” Human-centric Comput. Inf. Sci., vol. 11, 2021, doi:
Website ijiert.org Vol., vol. 7, no. 9, pp. 172–176, 2020. 10.22967/HCIS.2021.11.035.
[5] A. P. Veiga, “Applications of Artificial Intelligence to Network [30] H. Liu, C. Zhong, A. Alnusair, and S. R. Islam, “FAIXID: A
Security,” no. March, 2018. Framework for Enhancing AI Explainability of Intrusion Detection
[6] A. Corallo, M. Lazoi, M. Lezzi, and A. Luperto, “Cybersecurity Results Using Data Cleaning Techniques,” J. Netw. Syst. Manag., vol.
awareness in the context of the Industrial Internet of Things: A 29, no. 4, pp. 1–30, 2021, doi: 10.1007/s10922-021-09606-8.
systematic literature review,” Comput. Ind., vol. 137, 2022, doi: [31] S. Wali, I. A. Khan, and S. Member, “Explainable AI and Random
10.1016/j.compind.2022.103614. Forest Based Reliable Intrusion Detection system,” techarXiv, 2021,
[7] R. Prasad and V. Rohokale, Cyber Threats and Attack Overview. 2020. doi: 10.36227/techrxiv.17169080.v1.
doi: 10.1007/978-3-030-31703-4_2. [32] R. Magan-Carrion, D. Urda, I. Diaz-Cano, and B. Dorronsoro,
[8] D. Y. Perwej, S. Qamar Abbas, J. Pratap Dixit, D. N. Akhtar, and A. “Improving the Reliability of Network Intrusion Detection Systems
Kumar Jaiswal, “A Systematic Literature Review on the Cyber through Dataset Aggregation,” IEEE Trans. Emerg. Top. Comput., pp.
Security,” Int. J. Sci. Res. Manag., vol. 9, no. 12, pp. 669–710, 2021, 1–15, 2022, doi: 10.1109/TETC.2022.3178283.
doi: 10.18535/ijsrm/v9i12.ec04. [33] M. Szczepanski, M. Choras, M. Pawlicki, and R. Kozik, “Achieving
[9] G. Wang and Z. Liu, Android malware detection model based on Explainability of Intrusion Detection System by Hybrid Oracle-
lightGBM, vol. 1031 AISC. 2020. doi: 10.1007/978-981-13-9406- Explainer Approach,” Proc. Int. Jt. Conf. Neural Networks, 2020, doi:
5_29. 10.1109/IJCNN48605.2020.9207199.
[10] R. Das and R. Sandhane, “Artificial Intelligence in Cyber Security,” J. [34] H. Li, F. Wei, and H. Hu, “Enabling dynamic network access control
Phys. Conf. Ser., vol. 1964, no. 4, pp. 488–491, 2021, doi: with anomaly-based IDS and SDN,” SDN-NFV 2019 - Proc. ACM Int.
10.1088/1742-6596/1964/4/042072. Work. Secur. Softw. Defin. Networks Netw. Funct. Virtualization, co-
[11] D. Richards, “The Benefits of Artificial Intelligence on Workplace located with CODASPY 2019, pp. 13–16, 2019, doi:
Productivity,” Mavinlink, 2017. 10.1145/3309194.3309199.
[12] M. Aloqaily, S. Kanhere, P. Bellavista, and M. Nogueira, “Special

Authorized licensed use limited to: University of London: Online Library. Downloaded on November 14,2023 at 14:23:28 UTC from IEEE Xplore. Restrictions apply.
[35] F. Farahnakian and J. Heikkonen, “A deep auto-encoder based [50] A. V. Vidyapeetham, M. City, P. Poornachandran, and A. V.
approach for intrusion detection system,” Int. Conf. Adv. Commun. Vidyapeetham, “DeepAnti-PhishNet : Applying Deep Neural
Technol. ICACT, vol. 2018-Febru, pp. 178–183, 2018, doi: Networks for Phishing Email Detection,” 2018.
10.23919/ICACT.2018.8323688. [51] H. Yuan, X. Chen, Y. Li, Z. Yang, and W. Liu, “Detecting Phishing
[36] C. Yin, Y. Zhu, J. Fei, and X. He, “A Deep Learning Approach for Websites and Targets Based on URLs and Webpage Links,” pp. 2–7,
Intrusion Detection Using Recurrent Neural Networks,” IEEE Access, 2018.
vol. 5, pp. 21954–21961, 2017, doi: 10.1109/ACCESS.2017.2762418. [52] X. Zhang, D. Shi, H. Zhang, W. Liu, and R. Li, “Efficient Detection of
[37] P. P. Kundu, T. Truong-Huu, L. Chen, L. Zhou, and S. G. Teo, Phishing Attacks with Hybrid Neural Networks,” pp. 844–848, 2018.
“Detection and Classification of Botnet Traffic using Deep Learning [53] S. Li, Q. Zhou, R. Zhou, and Q. Lv, “Intelligent malware detection
with Model Explanation,” IEEE Trans. Dependable Secur. Comput., based on graph convolutional network,” J. Supercomput., vol. 78, no.
pp. 1–15, 2022, doi: 10.1109/TDSC.2022.3183361. 3, pp. 4182–4198, 2022, doi: 10.1007/s11227-021-04020-y.
[38] H. Suryotrisongko, Y. Musashi, A. Tsuneda, and K. Sugitani, “Robust [54] M. Kinkead et al., “ScienceDirect Towards Towards Explainable
Botnet DGA Detection: Blending XAI and OSINT for Cyber Threat Explainable CNNs CNNs for for Android Android Malware Malware
Intelligence Sharing,” IEEE Access, vol. 10, pp. 34613–34624, 2022, Detection Detection,” Procedia Comput. Sci., vol. 184, no. 2019, pp.
doi: 10.1109/ACCESS.2022.3162588. 959–965, 2021, doi: 10.1016/j.procs.2021.03.118.
[39] X. Zhu, Y. Zhang, Z. Zhang, D. Guo, Q. Li, and Z. Li, “Interpretability [55] B. Wu et al., “Why an Android App is Classified as Malware ?
Evaluation of Botnet Detection Model based on Graph Neural Towards Malware Classification Interpretation arXiv : 2004 . 11516v2
Network,” INFOCOM WKSHPS 2022 - IEEE Conf. Comput. Commun. [ cs . CR ] 4 Sep 2020,” vol. 1, no. 1, pp. 1–29, 2020.
Work., pp. 0–5, 2022, doi: [56] L. Yang, W. Guo, A. Ciptadi, A. Ahmadzadeh, B. Hexagon, and U. S.
10.1109/INFOCOMWKSHPS54753.2022.9798287. Symposium, “CADE : Detecting and Explaining Concept Drift
[40] N. Ben Rabah, B. Le Grand, and M. K. Pinheiro, “IoT Botnet Detection Samples for Security Applications,” 2021.
using Black-box Machine Learning Models: The Trade-off between [57] A. G. Kakisim, M. Nar, and I. Sogukpinar, “Computer Standards &
Performance and Interpretability,” Proc. Work. Enabling Technol. Interfaces Metamorphic malware identi fi cation using engine-speci fi
Infrastruct. Collab. Enterp. WETICE, vol. 2021-Octob, pp. 101–106, c patterns based on co-opcode graphs,” vol. 71, no. April, 2020, doi:
2021, doi: 10.1109/WETICE53228.2021.00030. 10.1016/j.csi.2020.103443.
[41] S. Nomm, A. Guerra-Manzanares, and H. Bahsi, “Towards the [58] I. Baptista, S. Shiaeles, and N. Kolokotronis, “A Novel Malware
integration of a post-hoc interpretation step into the machine learning Detection System Based On Machine Learning and Binary
workflow for IoT botnet detection,” Proc. - 18th IEEE Int. Conf. Mach. Visualization,” no. May, pp. 20–24, 2019.
Learn. Appl. ICMLA 2019, pp. 1162–1169, 2019, doi: [59] F. Xiao, Z. Lin, and Y. Sun, “Malware Detection Based on Deep
10.1109/ICMLA.2019.00193. Learning of Behavior Graphs,” vol. 2019, 2019.
[42] D. Arivudainambi, V. K. Varun, S. C. S., and P. Visu, “Malware traffic [60] R. Ullah, K. Xiaosong, and Z. Rajesh, “Analysis of ResNet and
classification using principal component analysis and artificial neural GoogleNet models for malware detection,” J. Comput. Virol. Hacking
network for extreme surveillance,” Comput. Commun., vol. 147, no. Tech., 2018, doi: 10.1007/s11416-018-0324-z.
July, pp. 50–57, 2019, doi: 10.1016/j.comcom.2019.08.003. [61] M. Melis, D. Maiorca, B. Biggio, G. Giacinto, and F. Roli, “Explaining
[43] S. C. Chen, Y. R. Chen, and W. G. Tzeng, “Effective Botnet Detection Black-box Android Malware Detection”.
Through Neural Networks on Convolutional Features,” Proc. - 17th [62] S. U. Bazai, J. Jang-Jaccard, and H. Alavizadeh, “A novel hybrid
IEEE Int. Conf. Trust. Secur. Priv. Comput. Commun. 12th IEEE Int. approach for multi-dimensional data anonymization for apache spark,”
Conf. Big Data Sci. Eng. Trust. 2018, pp. 372–378, 2018, doi: ACM Trans. Priv. Secur., vol. 25, no. 1, pp. 1–25, 2021.
10.1109/TrustCom/BigDataSE.2018.00062. [63] S. U. Bazai, J. Jang-Jaccard, and H. Alavizadeh, “Scalable, high-
[44] A. A. Ahmed, Botnet detection using a feed-forward backpropagation performance, and generalized subtree data anonymization approach for
artificial neural network, vol. 888. Springer International Publishing, apache spark,” Electron., vol. 10, no. 5, pp. 1–28, 2021, doi:
2019. doi: 10.1007/978-3-030-03302-6_3. 10.3390/electronics10050589.
[45] A. Ghimire, A. K. Jha, S. Thapa, S. Mishra, and A. M. Jha, “Machine [64] Z. Zaland, S. U. Bazai, S. Marjan, and M. Ashraf, “Three-Tier
learning approach based on hybrid features for detection of phishing Password Security Algorithm for Online Databases,” in 2021 2nd
URLs,” Proc. Conflu. 2021 11th Int. Conf. Cloud Comput. Data Sci. International Informatics and Software Engineering Conference
Eng., no. January, pp. 954–959, 2021, doi: (IISEC), 2021, pp. 1–6.
10.1109/Confluence51648.2021.9377113. [65] S. U. Bazai and J. Jang-Jaccard, “In-memory data anonymization using
[46] A. Basit, M. Zafar, A. R. Javed, and Z. Jalil, “A Novel Ensemble scalable and high performance rdd design,” Electron., vol. 9, no. 10,
Machine Learning Method to Detect Phishing Attack,” Proc. - 2020 pp. 1–26, 2020, doi: 10.3390/electronics9101732.
23rd IEEE Int. Multi-Topic Conf. INMIC 2020, no. November, 2020, [66] S. U. Bazai and J. Jang-Jaccard, “SparkDA: RDD-based high-
doi: 10.1109/INMIC50486.2020.9318210. performance data anonymization technique for Spark platform,” in
[47] J. M. Reddy and K. V. Rao, “An Approach for Detecting Phishing International Conference on Network and System Security, 2019, pp.
Attacks Using Machine Learning AN APPROACH FOR 646–662.
DETECTING PHISHING ATTACKS,” no. June, 2020. [67] S. U. Bazai, J. Jang-Jaccard, and X. Zhang, “Scalable Big Data Privacy
[48] S. Bagui and R. J. White, “Classifying Phishing Email Using Machine with MapReduce,” Encycl. Big Data Technol., pp. 1454–1462, 2019,
Learning and Deep Learning,” no. Ml. doi: 10.1007/978-3-319-77525-8_243.
[49] M. M. Yadollahi, F. Shoeleh, E. Serkani, A. Madani, and H. Gharaee, [68] S. U. Bazai, J. Jang-jaccard, and R. Wang, “Anonymizing k -NN Classi
“An Adaptive Machine Learning Based Approach for Phishing fi cation on MapReduce,” pp. 364–377, 2018, doi: 10.1007/978-3-319-
Detection Using Hybrid Features,” 2019 5th Int. Conf. Web Res., pp. 90775-8.
281–286, 2019.

Authorized licensed use limited to: University of London: Online Library. Downloaded on November 14,2023 at 14:23:28 UTC from IEEE Xplore. Restrictions apply.

You might also like