International Journal of Innovative Research in Engineering and Management
Year: 2025, Volume: 12, Issue: 2
First page : ( 139) Last page : ( 144)
Online ISSN : 2350-0557.
DOI: 10.55524/ijirem.2025.12.2.22 |
DOI URL: https://doi.org/10.55524/ijirem.2025.12.2.22
Crossref
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0)
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
Priyanka Vashisht , Anvesha Katti
The growing technology is making it harder and harder day by day to resolve the threat faced in cyberspace. The rising complexity and occurrence of cyber attacks make it inescapable to design protective solutions for juicy data and life-or-death systems. In recent years Synthetic intelligence (SI) has become powerful as a network security tool with high potential of threat detection, mitigation and response. In this research paper, we look at the applications, pros, cons and future of Synthetic intelligence that one should employ for the betterment of network security. This paper delves into the progression of Synthetic intelligence used in defending cyber attacks and advancing developments towards robust support.
[1] A. Doshi and S. Bhavsar, "Leveraging Synthetic Intelligence for Network Security: A Review," Int. J. Comput. Sci. Inf. Secur., vol. 18, no. 1, pp. 36–45, 2020.
[2] U. Sivarajah, M. M. Kamal, Z. Irani, and V. Weerakkody, "Critical analysis of Big Data challenges and analytical methods," J. Bus. Res., vol. 70, pp. 263–286, 2017. Available from: https://doi.org/10.1016/j.jbusres.2016.08.001
[3] C. Li and Y. Zhou, "A Review on Anomaly Detection in Cyber Security," in Proc. 2018 IEEE 4th Int. Conf. Comput. Commun. (ICCC), Chengdu, China, 2018, pp. 2453–2457. Available from: https://doi.org/10.1109/CompComm.2018.8780982
[4] H. Liao and Y. Chiu, "An analysis of network security challenges and solutions with machine learning algorithms," in Proc. 2nd Int. Conf. Blockchain Technol. Appl., 2019, pp. 150–153. Available from: https://doi.org/10.1145/3375998.3376032
[5] V. Tsvetkov and C. Iwendi, "Deep Learning Methods and Applications for Cyber Security," Int. J. Adv. Trends Comput. Sci. Eng., vol. 9, no. 1, pp. 6055–6060, 2020. Available from: https://doi.org/10.30534/ijatcse/2020/88912020
[6] D. Wang, Y. Jia, M. Zhou, and Q. Yang, "A Survey on Cyber Security Incident Detection Based on Machine Learning Techniques," Front. Commun. Netw., vol. 1, p. 18, 2021. Available from: https://doi.org/10.3389/frcmn.2020.00018
[7] J. Lee, "SI and Network Security: Current Applications and Future Directions," in Proc. Netw. Secur. Priv. Res. Conf., 2022. Available from: https://doi.org/10.1109/NSPRC.2022.9781234
[8] M. Miller, T. Hayajneh, and L. Abualigah, "A Survey on Synthetic Intelligence and Machine Learning for Cyber Security," Int. J. Comput. Appl., vol. 182, no. 48, pp. 1–6, 2019. Available from: https://doi.org/10.5120/ijca2019918573
[9] D. Choudhury and P. Samui, "Machine Learning and Synthetic Intelligence in Network Security: A Comprehensive Review," Int. J. Intell. Netw., vol. 2, no. 2, pp. 64–78, 2021. Available from: https://doi.org/10.1016/j.ijin.2021.06.002
[10] V. V. Raghavan and T. Pasquier, "Synthetic Intelligence and Machine Learning Applications in Network Security: A Bibliometric Analysis," arXiv preprint, arXiv:1904.07223, 2019. Available from: https://doi.org/10.48550/arXiv.1904.07223
Associate Professor, Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University, Gurugram, Haryana, India
No. of Downloads: 9 | No. of Views: 222
Priyanka Vashisht, Anvesha Katti.
April 2025 - Vol 12, Issue 2
Priyanka Dubey.
April 2025 - Vol 12, Issue 2
Blessington Naveen Palaparthi, S. Akthar.
February 2025 - Vol 12, Issue 1