Authors :
Mukul Mangla
Volume/Issue :
Volume 10 - 2025, Issue 8 - August
Google Scholar :
https://tinyurl.com/3favkrw6
Scribd :
https://tinyurl.com/4jbfemtb
DOI :
https://doi.org/10.38124/ijisrt/25aug1503
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Note : Google Scholar may take 30 to 40 days to display the article.
Abstract :
The escalating complexity of cyber threats necessitates the adoption of secure-by-design methodologies in enterprise
systems. This study examines the role of artificial intelligence (AI) in automating threat detection and enhancing de-
identification processes to bolster resilience and privacy in enterprise settings. Grounded in adaptive security and privacy-
preserving computation theories, this study utilises machine learning and deep learning models for intrusion detection,
alongside AI-enhanced pseudonymization and generalisation techniques for de-identification. The findings indicate that AI-
driven detection achieves accuracy rates exceeding 90%, surpassing traditional rule-based systems in identifying novel and
evolving threats. Furthermore, AI-enhanced de-identification effectively balances privacy and utility, enabling enterprises to
comply with regulatory mandates, such as the GDPR and HIPAA, without compromising data usability. Key challenges,
including computational overhead, explainability, and adversarial resilience, were identified however, modular architectures
and GPU acceleration mitigated the integration barriers. The study concludes that AI operationalises the secure-by-design
paradigm by addressing the enduring trade-offs between privacy, security, and efficiency. Future research should investigate
explainable AI, adversarially robust privacy methods, and quantum-safe architectures to ensure sustainable protection in an
evolving threat landscape.
Keywords :
Secure-by-Design; Artificial Intelligence; Threat Detection; Data De-Identification; Privacy-Preserving Computation; Enterprise Security; Explainable AI; Quantum-Safe Security.
References :
- Tallam, K. (2025). Engineering risk-aware, security-by-design frameworks for assurance of large-scale autonomous AI models. arXiv preprint arXiv:2505.06409.
- Fuentes, J., Ortega-Fernandez, I., Villanueva, N. M., & Sestelo, M. (2025). Cybersecurity threat detection based on a UEBA framework using deep autoencoders. arXiv preprint arXiv:2505.11542.
- Zhang, Z., Al Hamadi, H., Damiani, E., Yeun, C. Y., & Taher, F. (2022). Explainable artificial intelligence applications in cyber security: State-of-the-art in research. arXiv preprint arXiv:2208.14937.
- Paracha, M. A., Jamil, S. U., Shahzad, K., Khan, M. A., & Rasheed, A. (2024). Leveraging AI for network threat detection—a conceptual overview. Electronics, 13(23), Article 4611.
- Breier, J., Baldwin, A., Balinsky, H., & Liu, Y. (2020). Risk management framework for machine learning security. arXiv preprint arXiv:2012.04884.
- Souidi, M. A., & Taghezout, N. (2021). Privacy protection in enterprise social networks using a hybrid de-identification system. International Journal of Information Security and Privacy, 15(1), 1–15.
- Razavi, H., Ouaissa, M., Ouaissa, M., Nakouri, H., & Abdelgawad, A. (Eds.). (2026). AI-Driven Cybersecurity: Revolutionizing threat detection and defence systems. Routledge. ISBN: 978-1041050339
- Shaukat, K., Luo, S., Chen, S., & Liu, D. (2020). Cyber threat detection using machine learning techniques: A performance evaluation perspective. In Proceedings of the 1st Annual International Conference on Cyber Warfare and Security (ICCWS). IEEE.
- Prasad, A., & Chandra, S. (2024). BotDefender: A collaborative defense framework against botnet attacks using network traffic analysis and machine learning. Arab Journal of Science and Engineering, 49(3), 3313–3329.
- Wei, Z., Rauf, U., & Mohsen, F. (2024). E-Watcher: Insider threat monitoring and detection for enhanced security. Annals of Telecommunications.
- Mohsen, F., Rauf, U., Lavric, V., et al. (2024). On identification of intrusive applications: Toward heuristics-based adaptive security policy. IEEE Access, 12, 37586–37599.
- Alrowais, F., Althahabi, S., Alotaibi, S. S., Mohamed, A., Hamza, M. A., & Marzouk, R. (2023). AutoML-enabled cybersecurity threat detection in IoT environments. Computers, Systems & Security, 45(1), 687–700.
- Liu, Z., Wang, Y., Feng, F., et al. (2023). A DDoS detection method based on feature engineering and machine learning in software-defined networks. Sensors, 23, 36176.
- Kumar, A., Dutta, S., & Pranav, P. (2023). Supervised learning for attack detection in cloud. International Journal of Experimental Research and Review, 31, 74–84.
- More, S., Idrissi, M., Mahmoud, H., & Asyhari, A. T. (2024). Enhanced intrusion detection systems performance with UNSW-NB15 dataset analysis. Algorithms, 17(2), 64.
- Leece, D. (2023). Security Event Log Deidentification.
- Rannenberg, K., Pape, S., Tronnier, F., & Löbner, S. (2021). Study on the technical evaluation of de-identification procedures for personal data in the automotive sector. Technical report, Goethe University Frankfurt.
- Nadella, G. S., Addula, S. R., Yadulla, A. R., Sajja, G. S., Meesala, M., Maturi, M. H., ... & Gonaygunta, H. (2025). Generative AI-Enhanced Cybersecurity Framework for Enterprise Data Privacy Management. Computers, 14(2), 55.
- Zhang, X., Wang, P., Jia, H., Huang, Z., & Zhao, R. (2024, July). AI-Powered Cybersecurity: Enhancing Threat Detection and Defense in the Digital Age. In 2024 IEEE 7th International Conference on Electronic Information and Communication Technology (ICEICT) (pp. 1026-1031). IEEE.
- Van Bossuyt, D. L., Hale, B., Arlitt, R., & Papakonstantinou, N. (2023). Zero-trust for the system design lifecycle. Journal of Computing and Information Science in Engineering, 23(6), 060812.
- Onwubuche, N. R., & Shallom, K. DESIGNING CYBERSECURITY PROTOCOLS FOR AI SYSTEMS ANALYZING MULTI-OMICS AND RADIOLOGY DATA IN CLINICAL DECISION-MAKING APPLICATIONS.
- De Soete, M. (2025). Derived Key. In Encyclopedia of Cryptography, Security and Privacy (pp. 618-619). Cham: Springer Nature Switzerland.
- Sarkar, A. R., Chuang, Y. S., Mohammed, N., & Jiang, X. (2024). De-identification is not always enough. arXiv preprint arXiv:2402.00179.
- Shahid, A., Bazargani, M. H., Banahan, P., Mac Namee, B., Kechadi, T., Treacy, C., ... & MacMahon, P. (2022, April). A two-stage de-identification process for privacy-preserving medical image analysis. In Healthcare (Vol. 10, No. 5, p. 755). MDPI.
- Subramanyam, S. V. (2025). Cloud-based enterprise systems: Bridging scalability and security in healthcare and finance. IJSAT-International Journal on Science and Technology, 16(1).
- Liu, Z., Huang, Y., Yu, X., Zhang, L., Wu, Z., Cao, C., ... & Li, X. (2023). Deid-gpt: Zero-shot medical text de-identification by gpt-4. arXiv preprint arXiv:2303.11032.
- Radhakrishnan, L., Schenk, G., Muenzen, K., Oskotsky, B., Ashouri Choshali, H., Plunkett, T., ... & Butte, A. J. (2023). A certified de-identification system for all clinical text documents for information extraction at scale. JAMIA open, 6(3), ooad045.
- Li, P., & Zhang, L. (2025). Application of big data technology in enterprise information security management. Scientific Reports, 15(1), 1022.
- Clunie, D. A., Flanders, A., Taylor, A., Erickson, B., Bialecki, B., Brundage, D., ... & Farahani, K. (2025). Report of the Medical Image De-Identification (MIDI) Task Group--Best Practices and Recommendations. Arxiv, arXiv-2303.
- Hwang, M. S., Fatima, K., Wang, Y. S., Wu, N. I., & Lin, I. C. (2025). Research on De-identification Applications of LLMs in Medical Records. International Journal of Network Security, 27(1), 213-222.
The escalating complexity of cyber threats necessitates the adoption of secure-by-design methodologies in enterprise
systems. This study examines the role of artificial intelligence (AI) in automating threat detection and enhancing de-
identification processes to bolster resilience and privacy in enterprise settings. Grounded in adaptive security and privacy-
preserving computation theories, this study utilises machine learning and deep learning models for intrusion detection,
alongside AI-enhanced pseudonymization and generalisation techniques for de-identification. The findings indicate that AI-
driven detection achieves accuracy rates exceeding 90%, surpassing traditional rule-based systems in identifying novel and
evolving threats. Furthermore, AI-enhanced de-identification effectively balances privacy and utility, enabling enterprises to
comply with regulatory mandates, such as the GDPR and HIPAA, without compromising data usability. Key challenges,
including computational overhead, explainability, and adversarial resilience, were identified however, modular architectures
and GPU acceleration mitigated the integration barriers. The study concludes that AI operationalises the secure-by-design
paradigm by addressing the enduring trade-offs between privacy, security, and efficiency. Future research should investigate
explainable AI, adversarially robust privacy methods, and quantum-safe architectures to ensure sustainable protection in an
evolving threat landscape.
Keywords :
Secure-by-Design; Artificial Intelligence; Threat Detection; Data De-Identification; Privacy-Preserving Computation; Enterprise Security; Explainable AI; Quantum-Safe Security.