Artificial Intelligence for Cybersecurity: A Systematic Mapping of Literature
Open Access
- 30 July 2020
- journal article
- research article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Access
- Vol. 8, 146598-146612
- https://doi.org/10.1109/access.2020.3013145
Abstract
Due to the ever-increasing complexities in cybercrimes, there is the need for cybersecurity methods to be more robust and intelligent. This will make defense mechanisms to be capable of making real-time decisions that can effectively respond to sophisticated attacks. To support this, both researchers and practitioners need to be familiar with current methods of ensuring cybersecurity (CyberSec). In particular, the use of artificial intelligence for combating cybercrimes. However, there is lack of summaries on artificial intelligent methods for combating cybercrimes. To address this knowledge gap, this study sampled 131 articles from two main scholarly databases (ACM digital library and IEEE Xplore). Using a systematic mapping, the articles were analyzed using quantitative and qualitative methods. It was observed that artificial intelligent methods have made remarkable contributions to combating cybercrimes with significant improvement in intrusion detection systems. It was also observed that there is a reduction in computational complexity, model training times and false alarms. However, there is a significant skewness within the domain. Most studies have focused on intrusion detection and prevention systems, and the most dominant technique used was support vector machines. The findings also revealed that majority of the studies were published in two journal outlets. It is therefore suggested that to enhance research in artificial intelligence for CyberSec, researchers need to adopt newer techniques and also publish in other related outlets.This publication has 141 references indexed in Scilit:
- Motivating IS security compliance: Insights from Habit and Protection Motivation TheoryInformation & Management, 2012
- CANTINA+ACM Transactions on Information and System Security, 2011
- Detecting and resolving policy misconfigurations in access-control systemsACM Transactions on Information and System Security, 2011
- “Andromaly”: a behavioral malware detection framework for android devicesJournal of Intelligent Information Systems, 2011
- Artificial neural networks in hardware: A survey of two decades of progressNeurocomputing, 2010
- Intrusion detection by machine learning: A reviewExpert Systems with Applications, 2009
- On lattices, learning with errors, random linear codes, and cryptographyJournal of the ACM, 2009
- Improving malware detection by applying multi-inducer ensembleComputational Statistics & Data Analysis, 2009
- Intrusion detection in computer networks by a modular ensemble of one-class classifiersInformation Fusion, 2008
- Lessons from applying the systematic literature review process within the software engineering domainJournal of Systems and Software, 2006