USE OF ARTIFICIAL INTELLIGENCE FOR PROACTIVE DETECTION OF CYBER THREATS IN CORPORATE ENVIRONMENTS
DOI:
https://doi.org/10.63330/aurumpub.021-005Palabras clave:
Artificial Intelligence, Cybersecurity, Threat detection, Behavioral analysis, Machine learningResumen
This study addresses the use of Artificial Intelligence for proactive detection of cyber threats in corporate environments, presenting the main concepts, technologies, and models that enable understanding how the adoption of intelligent solutions strengthens organizations’ digital security. The objective was to analyze how techniques such as machine learning, deep learning, behavioral analysis, and event correlation contribute to improving attack identification, especially those lacking known signatures or prior evidence, such as zero-day attacks. The research employed a bibliographic and qualitative methodology, based on the analysis of books, scientific articles, and specialized documents that discuss the evolution of digital threats, the fundamentals of information security, and the role of intelligent technologies in protecting corporate infrastructures. The results demonstrated that traditional security systems exhibit significant limitations in the face of increasingly sophisticated attacks, highlighting the need for tools capable of continuous learning and real-time analysis of large data volumes. It was observed that AI-based solutions allow greater accuracy in anomaly detection, reduction of false positives, anticipation of malicious behaviors, and increased efficiency in incident response. The study concludes that the use of Artificial Intelligence in cybersecurity represents a significant advancement for companies, offering more dynamic, adaptable, and effective resources to combat contemporary threats. Furthermore, the adoption of these technologies contributes to building a safer, more predictable, and resilient organizational environment, reinforcing the importance of investing in intelligent protection models as an essential component of security management strategies.
Descargas
Referencias
AHMAD, R.; TRAN, D.; CAMPBELL, J. Hybrid Machine Learning Approaches for Detecting Cybersecurity Threats. Journal of Information Security, v. 10, n. 3, p. 122– 134, 2019.
ALIANI, M. et al. Deep Learning-Based Cyber-Attack Detection for Industrial Control Systems. IEEE Access, v. 8, p. 94617–94626, 2020.
ALI, M.; SHARMA, P. AI-Augmented Zero Trust Architecture: Enhancing Enterprise Cybersecurity Strategies. Journal of Cybersecurity and Digital Trust, v. 5, n. 1, p. 56– 70, 2021.
ANDERSON, Ross; MOORE, Tyler. The Economics of Information Security. Science, v. 314, n. 5799, p. 610–613, 2016.
BREADSTEIN, L.; SINGH, A. User and Entity Behavior Analytics for Insider Threat Detection. International Journal of Information Security, v. 18, n. 3, p. 245–260, 2019.
BUCZAK, A. L.; GUVEN, E. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection. IEEE Communications Surveys & Tutorials, v. 18, n. 2, p. 1153–1176, 2016.
FERNANDES, Marcos; OLIVEIRA, Thales. Ransomware: evolução, impacto e desafios contemporâneos na segurança da informação. Revista Brasileira de Segurança da Informação, v. 10, n. 2, p. 45–62, 2021.
GARCIA-TEODORO, P. et al. Intelligent Event Correlation for Large-Scale Cybersecurity Monitoring. Computers & Security, v. 103, p. 102–126, 2021.
GARTNER. Market Guide for Security Information and Event Management. Gartner Research, 2020.
GOODFELLOW, I.; BENGIO, Y.; COURVILLE, A. Deep Learning. Cambridge: MIT Press, 2016.
KIM, J.; PARK, S. Adaptive Cyber Threat Detection Through Continuous Machine Learning Optimization. Journal of Network and Computer Applications, v. 204, p. 103– 121, 2022.
MITCHELL, T. M. Machine Learning. New York: McGraw-Hill, 1997.
MOUSTAFA, N.; SLAY, J. The Evaluation of Network Anomaly Detection Systems: Statistical Methods and Machine Learning Models. ACM Computing Surveys, v. 52, n. 2, p. 1–40, 2019.
RUSSELL, S.; NORVIG, P. Artificial Intelligence: A Modern Approach. 4. ed. New York: Pearson, 2021.
SHONE, N. et al. A Deep Learning Approach to Network Intrusion Detection. IEEE Transactions on Emerging Topics in Computational Intelligence, v. 2, n. 1, p. 41–50, 2018.
SINGH, S.; BANGAR, M.; GEETHA, S.; GUPTA, B. Anomaly-Based Intrusion Detection Using Machine Learning Techniques. Computers & Security, v. 87, p. 101– 110, 2019.
SOMMER, R.; PAXSON, V. Outside the Closed World: On Using Machine Learning for Network Intrusion Detection. IEEE Symposium on Security and Privacy, p. 305– 316, 2010.
SOUZA, Rafael; MENDES, Eduardo. Malwares polimórficos e os desafios para detecção baseada em assinaturas. Journal of Cybersecurity Studies, v. 4, n. 1, p. 23– 37, 2020.
STALLINGS, William. Network Security Essentials: Applications and Standards. 6. ed. Boston: Pearson, 2019
Descargas
Publicado
Número
Sección
Licencia

Esta obra está bajo una licencia internacional Creative Commons Atribución-NoComercial-SinDerivadas 4.0.