Call for Papers
Quick Links
Role of Artificial Intelligence in Enhancing Threat Detection and Response in Cybersecurity
Dr. Shalini Sharma
Author
Dr. Rekha Sharma
Author
Er. Akshay Sharma
Author
π DOI: https://doi.org/10.63920/ICFCSAI2025.008
π Keywords: Artificial Intelligence, Cybersecurity, Threat Detection, Threat Response, Learning, Learning, Threat Machine Deep Cyber Intelligence, Ethical AI, Human-AI Collaboration.
π Publication Date: 02 January 2026
π License:
This work is licensed under a Creative Commons Attribution 4.0 International License
- Share β Copy and Redistribute the material
- Adapt β Remix, Transform, and build upon the material
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Abstract:
The rapid evolution of cyber threats demands sophisticated and adaptive defence mechanisms. Artificial Intelligence (AI) has emerged as a transformative technology in enhancing threat detection and response capabilities in cybersecurity. This paper explores the integration of AI techniques such as machine learning, deep learning, and natural language processing in identifying and mitigating cyber threats. We analyse a detailed case study demonstrating the practical application of AI in a real-world financial institutionβs cybersecurity operation. The findings highlight AIβs efficacy in improving detection accuracy, reducing false positives, shortening response times, and enabling proactive threat management. Additionally, the paper discusses challenges, ethical considerations, and future directions for AI in cybersecurity.
Download Full PDF Paper
π How to Cite
Dr. Shalini Sharma, Dr. Rekha Sharma, and Er. Akshay Sharma (2026). Role of Artificial Intelligence in Enhancing Threat Detection and Response in Cybersecurity . TEJAS J. Technol. Humanit. Sci.,, Vol. 05, Issue 01. https://doi.org/10.63920/ICFCSAI2025.008
π Article Metrics
References
[1]. Sommer, R., & Paxson, V. (2010). Outside the Closed World: On Using Machine Learning for Network Intrusion Detection. IEEE Symposium on Security and Privacy,
305- 316.
[2]. Buczak, A. L., & Guven, E. (2016). A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection. IEEE Communications Surveys & Tutorials, 18(2), 1153-1176.
[3]. Shone, N., Ngoc, T. N., Phai, V. D., & Shi, Q. (2018). A Deep Learning Approach to Network Intrusion Detection. IEEE Transactions on Emerging Topics in Computational
Intelligence, 2(1), 41-50.
[4]. Sethi, P., & Kant, K. (2020). Machine Learning-Based Cybersecurity: A Systematic Review. Journal of Network and Computer Applications, 167, 102693.
[5]. Zhang, Y., & Chen, X. (2021). AI in Cybersecurity: Threat Detection and Prevention. Journal of Cybersecurity and Privacy, 1(2), 125-139.
[6]. Bayer, U., Kruegel, C., & Kirda, E. (2009). Scalable, Behavior-Based Malware Clustering. Proceedings of NDSS.
[7]. Goodfellow, I., Shlens, J., & Szegedy, C. (2015). Explaining and Harnessing Adversarial Examples. International Conference on Learning Representations (ICLR).
[8]. Eckert, C., & Stolfo, S. J. (2020). Machine Learning in Cybersecurity. ACM Computing Surveys.
[9]. Sarker, I. H. (2022). Machine Learning for Cybersecurity: A Comprehensive Survey. arXiv preprint arXiv:2207.08686.
[10]. Gartner. (2023). Market Guide for AI in Security Operations.
