The Role of Artificial Intelligence in Enhancing Cybersecurity (Challenges, Mechanisms, and Future Prospects)

Authors

  • Sanaa Ahmed Mohamed Al-Sayeh University of Zawiya / Faculty of Economics, Ajilat Author

Keywords:

الذكاء الاصطناعي، الأمن السيبراني، التعلم العميق، الذكاء الاصطناعي القابل للتفسير (XAI)، هجمات اليوم الصفر.

Abstract

This study examines the pivotal role of Artificial Intelligence (AI) in bolstering

cybersecurity frameworks to counter the sophisticated digital threats of 2025 and beyond. The research problem centers on the inadequacy of traditional defense systems in detecting dynamic threats, such as ransomware and zero-day attacks. The paper adopts a technical comparative analysis methodology, evaluating Machine Learning (ML) algorithms against conventional rule-based security systems. Findings indicate that the integration of Deep Learning (DL) techniques contributes to a reduction in incident response time by over 60%, while simultaneously enhancing the accuracy of proactive detection for anomalous behavioral patterns (IBM Security, 2024). The study concludes by emphasizing the critical importance of adopting Explainable AI (XAI) models to mitigate the "black box" phenomenon and ensure the reliability and transparency of automated security decisions.

Downloads

Download data is not yet available.

References

1. الجندي، محمد عبد الله. (2020). دور الذكاء الاصطناعي في تعزيز الأمن السيبراني: الفرص والتحديات. مجلة الدراسات الأمنية، 12(2)، 45–67.

2. الغامدي، أحمد بن سعيد. (2021). التحديات الأمنية لتقنيات الذكاء الاصطناعي في البيئات السيبرانية الحديثة. المجلة العربية لأمن المعلومات، 8(1)، 23–40.

3. بن عيسى، خالد محمد. (2023). تطبيقات الذكاء الاصطناعي في حماية المعاملات الإلكترونية والبيانات الرقمية. مجلة الاقتصاد الرقمي، 5(3)، 77–95.

4. عبد الرحمن، علي حسن. (2024). أثر الذكاء الاصطناعي في تطور استراتيجيات الحروب السيبرانية. مجلة العلوم الاستراتيجية، 10(1)، 101–120.

المراجع الأجنبية

5. Bertalanffy, L. von. (1968). General system theory: Foundations, development, applications. George Braziller.

6. Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cybersecurity intrusion detection IEEE Communications Surveys & Tutorials, 18(2), 1153–1176. https://doi.org/10.1109/COMST.2015.2494502⁠

7. Capgemini Research Institute. (2023). Cybersecurity with AI: Unlocking next-generation defense.

8. Cybersecurity Ventures. (2023). Cybercrime damages will cost the world $10.5 trillion annually by 2025.

9. Gartner. (2024). Market guide for extended detection and response (XDR).

10. Gunning, D., Stefik, M., Choi, J., Miller, T., Stumpf, S., & Yang, G. Z. (2019). XAI—Explainable artificial intelligence. Science Robotics, 4(37). https://doi.org/10.1126/scirobotics.aay7120⁠

11. IBM Security. (2024). Cost of a data breach report 2024.

12. Jordan, M. I., & Mitchell, T. M. (2015). Machine learning: Trends, perspectives, and prospects. Science, 349(6245), 255–260. https://doi.org/10.1126/science.aaa8415⁠

13. Kshetri, N. (2023). Cybersecurity management: An organizational and strategic approach. University of Toronto Press.

14. Laszka, A. (2016). Game theory in cybersecurity. IEEE Security & Privacy, 14(5), 74–77.

15. LeCun, Y., Bengio, Y., & Hinton, G. (2015). Deep learning. Nature, 521(7553), 436–444. https://doi.org/10.1038/nature14539⁠

16. NIST. (2018). Framework for improving critical infrastructure cybersecurity (Version 1.1). National Institute of Standards and Technology.

17. Osborne, M. J. (2004). An introduction to game theory. Oxford University Press.

18. Russell, S., & Norvig, P. (2021). Artificial intelligence: A modern approach (4th ed.). Pearson.

19. Sarker, I. H. (2021). Cyber learning: Effectiveness of machine learning for cybersecurity. Journal of Big Data, 8(1), 1–27. https://doi.org/10.1186/s40537-021-00416-5⁠

20. Stallings, W. (2017). Effective cybersecurity: A guide to using best practices and standards. Addison-Wesley.

Downloads

Published

2026-03-19

How to Cite

The Role of Artificial Intelligence in Enhancing Cybersecurity (Challenges, Mechanisms, and Future Prospects). (2026). Al-Farooq Journal of Sciences, 2(1), 563-574. https://www.afjs.histr.edu.ly/index.php/afjs/article/view/76