USE OF AI TO SECURE NETWORK

Authors

  • Muhammad Obaid Ullah Obaid Superior University Author
  • Muhammad Azam Superior University Author
  • Zeeshan Ahmad Superior University Author
  • Shumaila Iqbal Superior University Author

DOI:

https://doi.org/10.71146/kjmr166

Keywords:

artificial intelligence, cyber security, machine and deep learning, cyber attacks

Abstract

In today's world, protecting our digital systems and data from cyber threats is a big concern. These threats are getting more advanced, with attackers using artificial intelligence (AI) to make their attacks even more effective. This means that we need to keep improving our defenses to stay safe. One of the main problems is that more and more devices are connected to the internet, like machines in factories. These connections create new opportunities for cyber attackers. This research looks at different types of cyber attacks and how we defend against them, especially in industries. We're also exploring how AI can help us with this, but there are pros and cons to using AI in security. While AI can be a powerful tool for enhancing our security, it's not a silver bullet. It needs constant training and human oversight because it has its limitations. Many companies are using AI for security, but it's important to make sure it's in the hands of ethical and knowledgeable people. AI is playing a growing role in monitoring and dealing with cyber risks. It can help detect and prevent different types of cyber threats, like viruses and phishing attacks. Although AI has its challenges, its advantages are greater. All in all, AI is changing the way we approach cyber security and helping us stay safe in our increasingly digital world.

Downloads

Download data is not yet available.

Author Biography

  • Muhammad Azam , Superior University

    HOD of CS Department 

Downloads

Published

2024-12-26

Issue

Section

Engineering and Technology

How to Cite

USE OF AI TO SECURE NETWORK. (2024). Kashf Journal of Multidisciplinary Research, 1(12), 202-219. https://doi.org/10.71146/kjmr166

Most read articles by the same author(s)

Similar Articles

31-40 of 64

You may also start an advanced similarity search for this article.