Evaluating the Effectiveness of AI-Powered Cloud Based Threat Intelligence in Mitigating Phishing Attacks


Authors : Ayomide Oluwaromika Olukoya; Shallon Asiimire; Damilare Refus Adigun

Volume/Issue : Volume 10 - 2025, Issue 1 - January


Google Scholar : https://tinyurl.com/3z8pdm5m

Scribd : https://tinyurl.com/36fdu7h9

DOI : https://doi.org/10.5281/zenodo.14737744


Abstract : Phishing attacks remain a critical cyber security threat, with attackers continually refining their tactics to bypass traditional defense systems. This study evaluates the effectiveness of AI-powered cloud-based threat intelligence in mitigating phishing attacks, focusing on key metrics such as phishing detection accuracy, false positive rates, and incident response times. The research analyzes phishing data from multiple organizations across diverse sectors, including finance, healthcare, and e-commerce, which have deployed AI- driven threat intelligence platforms. The study concludes that AI-powered cloud-based threat intelligence significantly enhances phishing detection and response but requires ongoing improvements in system integration and transparency. This research underscores the potential of AI to transform cyber security and offers a framework for future investigations into the long-term impact of AI solutions in phishing defense.

Keywords : AI-Powered, Cloud-Based, Threat Intelligence, Phishing Detection, False Positives, Incident Response, and Cyber Security.

References :

  1. Aggarwal, S., Gupta, P., & Rathore, S. (2021). Machine learning-based approaches for phishing             detection: A survey. Journal of Information Security and Applications, 57, 102715. https://doi.org/10.1016/j.jisa.2021.102715
  2. Alazab, M., Choo, K.-K. R., Islam, R., & Xu, Z. (2021). An empirical analysis of phishing        blacklists and whitelists for effective detection. Computers & Security, 104, 102143. https://doi.org/10.1016/j.cose.2021.102143
  3. Aleroud, A., & Zhou, L. (2017). Phishing environments, techniques, and countermeasures: A  survey. Computers & Security, 68, 160–196. https://doi.org/10.1016/j.cose.2017.04.006
  4. Akinwande, O. T., & Abdullahi, M. B. (2018). Performance Evaluation of Artificial Immune  System Algorithms for Intrusion Detection using NSL-KDD and CICIDS 2017 Datasets.
  5. Aminu, M., Anawansedo, S., Sodiq, Y. A., & Akinwande, O. T. (2024). Driving Technological Innovation for a Resilient Cybersecurity Landscape. International Journal of LatestTechnology in Engineering, Management & Applied Science13(4), 126-133.
  6. Barros, F. A., Kim, H., Choi, C., & Lee, S. (2022). Enhancing phishing detection through real time threat intelligence. Computers & Security, 118, 102687. https://doi.org/10.1016/j.cose.2022.102687
  7. Bhardwaj, A., Goundar, S., Singh, A., & Rathee, G. (2020). AI-powered threat intelligence for scalable cybersecurity solutions. Journal of Cybersecurity and Privacy, 2(1), 1–21.            https://doi.org/10.3390/jcp2010001
  8. Gupta, B. B., Arachchilage, N. A. G., & Psannis, K. E. (2017). Defending against phishing attacks: Taxonomy of methods, current issues, and future directions. Telecommunication Systems,               67(2), 247–267. https://doi.org/10.1007/s11235-017-0334-z
  9. Kharraz, A., Arshad, S., Mulazzani, M., & Platzer, C. (2022). Understanding phishing-as-a-service platforms: The commoditization of phishing kits. Computers & Security, 118, 102747. https://doi.org/10.1016/j.cose.2022.102747
  10. Mavroeidis, V., & Bromander, S. (2017). Cyber threat intelligence model: An evaluation of    taxonomies, sharing standards, and ontologies within cyber threat intelligence. Computers       & Security, 70, 147–167. https://doi.org/10.1016/j.cose.2017.05.001
  11. Ponemon Institute. (2021). The cost of phishing: Understanding the true cost of cybercrime to business. Retrieved from https://www.ponemon.org
  12. Samtani, S., Chinn, R., Larson, C., & Chen, H. (2020). Exploring emerging hacker assets and key hackers for proactive cyber threat intelligence. Journal of Management Information Systems, 37(2), 683–714. https://doi.org/10.1080/07421222.2020.1759970
  13. Thomas A W., Harriet N., & Shamim B (2024). Artificial Intelligence-Driven Transformation in             Special Education: Optimizing Software for Improved Learning Outcomes. International Journal of Computer Applications Technology and Research. https://doi.org/10.7753/ijcatr1308.1015
  14. Verma, R., & Das, A. (2017). What's in a URL? Machine learning-based phishing detection. Future Generation Computer Systems, 81, 666–678. https://doi.org/10.1016/j.future.2017.05.046
  15. Verizon. (2021). 2021 Data Breach Investigations Report. Retrieved from https://www.verizon.com/dbir
  16. Wang, Y., Liu, X., & Zhang, Y. (2021). AI-based adaptive threat intelligence for cloud             environments. Future Generation Computer Systems, 123, 1–14. https://doi.org/10.1016/j.future.2021.04.014
  17. Zhang, J., Luo, X., Akhtar, Z., & Chen, F. (2020). Deep learning algorithms for phishing detection: A review and evaluation. IEEE Access, 8, 116162–116173. https://doi.org/10.1109/ACCESS.2020.3004651

Phishing attacks remain a critical cyber security threat, with attackers continually refining their tactics to bypass traditional defense systems. This study evaluates the effectiveness of AI-powered cloud-based threat intelligence in mitigating phishing attacks, focusing on key metrics such as phishing detection accuracy, false positive rates, and incident response times. The research analyzes phishing data from multiple organizations across diverse sectors, including finance, healthcare, and e-commerce, which have deployed AI- driven threat intelligence platforms. The study concludes that AI-powered cloud-based threat intelligence significantly enhances phishing detection and response but requires ongoing improvements in system integration and transparency. This research underscores the potential of AI to transform cyber security and offers a framework for future investigations into the long-term impact of AI solutions in phishing defense.

Keywords : AI-Powered, Cloud-Based, Threat Intelligence, Phishing Detection, False Positives, Incident Response, and Cyber Security.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe