TEJAS Journal of Technologies and Humanitarian Science

ISSN : 2583-5599

Open Access | Quarterly | Peer Reviewed Journal


Role of Artificial Intelligence in Enhancing Threat Detection and Response in Cybersecurity


Dr. Shalini Sharma

Author

Dr. Rekha Sharma

Author

Er. Akshay Sharma

Author


πŸ“Œ DOI: https://doi.org/10.63920/ICFCSAI2025.008

πŸ”‘ Keywords: Artificial Intelligence, Cybersecurity, Threat Detection, Threat Response, Learning, Learning, Threat Machine Deep Cyber Intelligence, Ethical AI, Human-AI Collaboration.

πŸ“… Publication Date: 02 January 2026

πŸ“œ License:

  • Share β€” Copy and Redistribute the material
  • Adapt β€” Remix, Transform, and build upon the material
  • The licensor cannot revoke these freedoms as long as you follow the license terms.

Abstract:

The rapid evolution of cyber threats demands sophisticated and adaptive defence mechanisms. Artificial Intelligence (AI) has emerged as a transformative technology in enhancing threat detection and response capabilities in cybersecurity. This paper explores the integration of AI techniques such as machine learning, deep learning, and natural language processing in identifying and mitigating cyber threats. We analyse a detailed case study demonstrating the practical application of AI in a real-world financial institution’s cybersecurity operation. The findings highlight AI’s efficacy in improving detection accuracy, reducing false positives, shortening response times, and enabling proactive threat management. Additionally, the paper discusses challenges, ethical considerations, and future directions for AI in cybersecurity.

Download Full PDF Paper


πŸ“– How to Cite

Dr. Shalini Sharma, Dr. Rekha Sharma, and Er. Akshay Sharma (2026). Role of Artificial Intelligence in Enhancing Threat Detection and Response in Cybersecurity . TEJAS J. Technol. Humanit. Sci.,, Vol. 05, Issue 01. https://doi.org/10.63920/ICFCSAI2025.008

πŸ“Š Article Metrics

πŸ‘οΈ Views: 12
πŸ“₯ Downloads: 8

References

[1]. Sommer, R., & Paxson, V. (2010). Outside the Closed World: On Using Machine Learning for Network Intrusion Detection. IEEE Symposium on Security and Privacy, 305- 316.
[2]. Buczak, A. L., & Guven, E. (2016). A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection. IEEE Communications Surveys & Tutorials, 18(2), 1153-1176.
[3]. Shone, N., Ngoc, T. N., Phai, V. D., & Shi, Q. (2018). A Deep Learning Approach to Network Intrusion Detection. IEEE Transactions on Emerging Topics in Computational Intelligence, 2(1), 41-50.
[4]. Sethi, P., & Kant, K. (2020). Machine Learning-Based Cybersecurity: A Systematic Review. Journal of Network and Computer Applications, 167, 102693.
[5]. Zhang, Y., & Chen, X. (2021). AI in Cybersecurity: Threat Detection and Prevention. Journal of Cybersecurity and Privacy, 1(2), 125-139.
[6]. Bayer, U., Kruegel, C., & Kirda, E. (2009). Scalable, Behavior-Based Malware Clustering. Proceedings of NDSS.
[7]. Goodfellow, I., Shlens, J., & Szegedy, C. (2015). Explaining and Harnessing Adversarial Examples. International Conference on Learning Representations (ICLR).
[8]. Eckert, C., & Stolfo, S. J. (2020). Machine Learning in Cybersecurity. ACM Computing Surveys.
[9]. Sarker, I. H. (2022). Machine Learning for Cybersecurity: A Comprehensive Survey. arXiv preprint arXiv:2207.08686.
[10]. Gartner. (2023). Market Guide for AI in Security Operations.