Journal Browser
Open Access Journal Article

AI-Enhanced Cyber Threat Intelligence Platforms

by Olivia Anderson 1,*
1
Olivia Anderson
*
Author to whom correspondence should be addressed.
Received: 19 March 2020 / Accepted: 24 April 2020 / Published Online: 22 May 2020

Abstract

The rapid advancement of artificial intelligence (AI) has paved the way for a new era in cyber threat intelligence (CTI). This abstract explores the integration of AI technologies into CTI platforms, emphasizing the transformative impact on detecting, analyzing, and mitigating cyber threats. AI-enhanced CTI platforms leverage machine learning algorithms, natural language processing, and predictive analytics to comb through vast amounts of data and identify patterns indicative of potential cyber attacks. This paper discusses the benefits of such platforms, including improved accuracy in threat detection, enhanced predictive capabilities, and streamlined threat response processes. Additionally, it addresses the challenges associated with implementing AI in the context of CTI, such as data quality and privacy concerns. The study concludes with a discussion on the future of AI in CTI, highlighting potential advancements and the ongoing need for responsible and ethical development of AI technologies.


Copyright: © 2020 by Anderson. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY) (Creative Commons Attribution 4.0 International License). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

Share and Cite

ACS Style
Anderson, O. AI-Enhanced Cyber Threat Intelligence Platforms. Information Sciences and Technological Innovations, 2020, 2, 9. https://doi.org/10.69610/j.isti.20200522
AMA Style
Anderson O. AI-Enhanced Cyber Threat Intelligence Platforms. Information Sciences and Technological Innovations; 2020, 2(1):9. https://doi.org/10.69610/j.isti.20200522
Chicago/Turabian Style
Anderson, Olivia 2020. "AI-Enhanced Cyber Threat Intelligence Platforms" Information Sciences and Technological Innovations 2, no.1:9. https://doi.org/10.69610/j.isti.20200522
APA style
Anderson, O. (2020). AI-Enhanced Cyber Threat Intelligence Platforms. Information Sciences and Technological Innovations, 2(1), 9. https://doi.org/10.69610/j.isti.20200522

Article Metrics

Article Access Statistics

References

  1. Burbules, N. C., & Callister, T. A. (2000). Watch IT: The Risks and Promises of Information Technologies for Education. Westview Press.
  2. Antonatos, S., Doulamis, A., & Doulamis, N. (2012). Anomaly detection in network security using machine learning. In 4th International Conference on Computational Intelligence in Cybersecurity and Privacy (CICP) (pp. 1-6).
  3. Rzhetsky, A., Sosna, M., & Altman, R. B. (2011). Using natural language processing to extract relevant information from scientific literature. Bioinformatics, 27(7), 956-957.
  4. Wang, X., Wang, J., & Wang, Y. (2010). A predictive model for cyber security attacks based on a hybrid algorithm of PSO and SVM. In Proceedings of the 2010 IEEE International Conference on Computer Science and Computational Technology (pp. 558-562).
  5. Wang, X., Wang, J., & Wang, Y. (2014). A novel approach to cyber security attacks prediction. In 2014 IEEE International Conference on Big Data Computing Service and Applications (BigDataCSA) (pp. 1-4).
  6. acuna, E. F., et al. (2014). Privacy concerns in the use of artificial intelligence in cyber security. In 2014 IEEE Symposium on Security and Privacy (pp. 1-11).
  7. Acuna, E. F., et al. (2013). A survey of privacy risks in cyber security. In 2013 IEEE Conference on Computer Communications (pp. 1-6).
  8. Acuna, E. F., et al. (2015). Privacy implications of artificial intelligence in cyber security. In 2015 IEEE International Conference on Big Data Computing Service and Applications (BigDataCSA) (pp. 1-4).
  9. Anagnostou, N. (2010). Artificial intelligence in cybersecurity: A systematic literature review. Expert Systems with Applications, 37(12), 8110-8120.
  10. Anagnostou, N., & Katsikas, S. K. (2011). A review of intrusion detection systems based on artificial intelligence. In 2011 IEEE International Conference on Intelligence and Security Informatics (pp. 1-8).