Authors :
Ayomide Oluwaromika Olukoya; Shallon Asiimire; Damilare Refus Adigun
Volume/Issue :
Volume 10 - 2025, Issue 1 - January
Google Scholar :
https://tinyurl.com/3z8pdm5m
Scribd :
https://tinyurl.com/36fdu7h9
DOI :
https://doi.org/10.5281/zenodo.14737744
Abstract :
Phishing attacks remain a critical cyber security threat, with attackers continually refining their tactics to bypass traditional defense
systems. This study evaluates the effectiveness of AI-powered cloud-based threat intelligence in mitigating phishing attacks, focusing
on key metrics such as phishing detection accuracy, false positive rates, and incident response times. The research analyzes phishing
data from multiple organizations across diverse sectors, including finance, healthcare, and e-commerce, which have deployed AI-
driven threat intelligence platforms. The study concludes that AI-powered cloud-based threat intelligence significantly enhances
phishing detection and response but requires ongoing improvements in system integration and transparency. This research underscores
the potential of AI to transform cyber security and offers a framework for future investigations into the long-term impact of AI
solutions in phishing defense.
Keywords :
AI-Powered, Cloud-Based, Threat Intelligence, Phishing Detection, False Positives, Incident Response, and Cyber Security.
References :
- Aggarwal, S., Gupta, P., & Rathore, S. (2021). Machine learning-based approaches for phishing detection: A survey. Journal of Information Security and Applications, 57, 102715. https://doi.org/10.1016/j.jisa.2021.102715
- Alazab, M., Choo, K.-K. R., Islam, R., & Xu, Z. (2021). An empirical analysis of phishing blacklists and whitelists for effective detection. Computers & Security, 104, 102143. https://doi.org/10.1016/j.cose.2021.102143
- Aleroud, A., & Zhou, L. (2017). Phishing environments, techniques, and countermeasures: A survey. Computers & Security, 68, 160–196. https://doi.org/10.1016/j.cose.2017.04.006
- Akinwande, O. T., & Abdullahi, M. B. (2018). Performance Evaluation of Artificial Immune System Algorithms for Intrusion Detection using NSL-KDD and CICIDS 2017 Datasets.
- Aminu, M., Anawansedo, S., Sodiq, Y. A., & Akinwande, O. T. (2024). Driving Technological Innovation for a Resilient Cybersecurity Landscape. International Journal of LatestTechnology in Engineering, Management & Applied Science, 13(4), 126-133.
- Barros, F. A., Kim, H., Choi, C., & Lee, S. (2022). Enhancing phishing detection through real time threat intelligence. Computers & Security, 118, 102687. https://doi.org/10.1016/j.cose.2022.102687
- Bhardwaj, A., Goundar, S., Singh, A., & Rathee, G. (2020). AI-powered threat intelligence for scalable cybersecurity solutions. Journal of Cybersecurity and Privacy, 2(1), 1–21. https://doi.org/10.3390/jcp2010001
- Gupta, B. B., Arachchilage, N. A. G., & Psannis, K. E. (2017). Defending against phishing attacks: Taxonomy of methods, current issues, and future directions. Telecommunication Systems, 67(2), 247–267. https://doi.org/10.1007/s11235-017-0334-z
- Kharraz, A., Arshad, S., Mulazzani, M., & Platzer, C. (2022). Understanding phishing-as-a-service platforms: The commoditization of phishing kits. Computers & Security, 118, 102747. https://doi.org/10.1016/j.cose.2022.102747
- Mavroeidis, V., & Bromander, S. (2017). Cyber threat intelligence model: An evaluation of taxonomies, sharing standards, and ontologies within cyber threat intelligence. Computers & Security, 70, 147–167. https://doi.org/10.1016/j.cose.2017.05.001
- Ponemon Institute. (2021). The cost of phishing: Understanding the true cost of cybercrime to business. Retrieved from https://www.ponemon.org
- Samtani, S., Chinn, R., Larson, C., & Chen, H. (2020). Exploring emerging hacker assets and key hackers for proactive cyber threat intelligence. Journal of Management Information Systems, 37(2), 683–714. https://doi.org/10.1080/07421222.2020.1759970
- Thomas A W., Harriet N., & Shamim B (2024). Artificial Intelligence-Driven Transformation in Special Education: Optimizing Software for Improved Learning Outcomes. International Journal of Computer Applications Technology and Research. https://doi.org/10.7753/ijcatr1308.1015
- Verma, R., & Das, A. (2017). What's in a URL? Machine learning-based phishing detection. Future Generation Computer Systems, 81, 666–678. https://doi.org/10.1016/j.future.2017.05.046
- Verizon. (2021). 2021 Data Breach Investigations Report. Retrieved from https://www.verizon.com/dbir
- Wang, Y., Liu, X., & Zhang, Y. (2021). AI-based adaptive threat intelligence for cloud environments. Future Generation Computer Systems, 123, 1–14. https://doi.org/10.1016/j.future.2021.04.014
- Zhang, J., Luo, X., Akhtar, Z., & Chen, F. (2020). Deep learning algorithms for phishing detection: A review and evaluation. IEEE Access, 8, 116162–116173. https://doi.org/10.1109/ACCESS.2020.3004651
Phishing attacks remain a critical cyber security threat, with attackers continually refining their tactics to bypass traditional defense
systems. This study evaluates the effectiveness of AI-powered cloud-based threat intelligence in mitigating phishing attacks, focusing
on key metrics such as phishing detection accuracy, false positive rates, and incident response times. The research analyzes phishing
data from multiple organizations across diverse sectors, including finance, healthcare, and e-commerce, which have deployed AI-
driven threat intelligence platforms. The study concludes that AI-powered cloud-based threat intelligence significantly enhances
phishing detection and response but requires ongoing improvements in system integration and transparency. This research underscores
the potential of AI to transform cyber security and offers a framework for future investigations into the long-term impact of AI
solutions in phishing defense.
Keywords :
AI-Powered, Cloud-Based, Threat Intelligence, Phishing Detection, False Positives, Incident Response, and Cyber Security.