Enhancing Cybersecurity with AI: A New Era in Threat Detection

Authors

  • Dr Priyanka Tikekar Assistant Professor Author
  • SANDHYA DAHAKE G. H. Raisoni Institute of Engineering & Technology Nagpur, Maharashtra India Author
  • DIPTI D. ATHAWALE Asian International University Manipur, India Author

Keywords:

Artificial Intelligence, Cybersecurity, Machine Learning, Optimization, Threat Detection

Abstract

Cybersecurity is practice to protect the system, network & digital assets from hacker or unauthorized access. There are different cyber threats like viruses, worms, Trojan horse, malware, phishing etc. efficient & effective strategies involve different technologies, policies & user education for protecting from these types of threats. In this decade, importance of cyber security is increasing as most of the firms & organization is relying on digital systems to process the useful or sensitive data. A cyberattack can have an expensive cost, involving possible legal costs, reputational damage, and financial losses. AI has changed the field of cyber security & enables the organization to identify & solve the problem of cyber threats with higher efficiency & accuracy. To find pattern & to analyses the large amount of data artificial intelligent plays very important role in cybersecurity by using machine learning algorithms, NLP & other advanced technologies.  AI based cybersecurity solutions helps the different organization to improve their risk of cyber breaches. In this chapter, it starts with the introduction, literature survey, threat detection technique, features and their percentage of various attacks like bot, DDoS & also aims to developed a threat detection system using machine learning algorithm also different steps are including that contributes to the overall goal to enhanced cyber security.

Downloads

Download data is not yet available.

Downloads

Published

30.06.2025

How to Cite

Enhancing Cybersecurity with AI: A New Era in Threat Detection. (2025). International Journal of Emerging Global Innovations in Science, Engineering, and Technology, 1(2), 12-25. https://ijegiset.igrf.co.in/index.php/ijegiset/article/view/15

Similar Articles

You may also start an advanced similarity search for this article.