Authors :
Adeeth Seth
Volume/Issue :
Volume 10 - 2025, Issue 10 - October
Google Scholar :
https://tinyurl.com/mwdv7shw
Scribd :
https://tinyurl.com/bdeepzvy
DOI :
https://doi.org/10.38124/ijisrt/25oct603
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Note : Google Scholar may take 30 to 40 days to display the article.
Abstract :
Artificial intelligence (AI) is transforming cybersecurity by enabling systems to identify, anticipate, and respond
to online threats more effectively than traditional methods.This article examines key AI applications, including threat
prediction, anomaly detection, fraud and phishing prevention, and chatbot-based user support. By analyzing network
behavior with machine learning models, AI detects threats in real time and reduces human error. The study shows how
businesses can implement AI-driven protections to strengthen risk management and ensure data integrity. As digital threats
evolve, AI provides a more adaptive and resilient cybersecurity strategy.
Keywords :
Artificial Intelligence; Cyber Security; Threat Detection; Machine Learning; Phishing.
References :
- https://cybercrime.gov.in/
- https://appinventiv.com/
- https://www.forbes.com/
- https://aibusiness.com/
- https://www.datamation.com/
Artificial intelligence (AI) is transforming cybersecurity by enabling systems to identify, anticipate, and respond
to online threats more effectively than traditional methods.This article examines key AI applications, including threat
prediction, anomaly detection, fraud and phishing prevention, and chatbot-based user support. By analyzing network
behavior with machine learning models, AI detects threats in real time and reduces human error. The study shows how
businesses can implement AI-driven protections to strengthen risk management and ensure data integrity. As digital threats
evolve, AI provides a more adaptive and resilient cybersecurity strategy.
Keywords :
Artificial Intelligence; Cyber Security; Threat Detection; Machine Learning; Phishing.