Harnessing AI for Enhanced Identity Management: Addressing Cybersecurity Challenges in the Digital Age
Suman Thapaliya, Sudan Jha
DOI: http://dx.doi.org/10.15439/2024R34
Citation: Proceedings of the 2024 Ninth International Conference on Research in Intelligent Computing in Engineering, Vijender Kumar Solanki, Tran Duc Tan, Pradeep Kumar, Manuel Cardona (eds). ACSIS, Vol. 42, pages 71–77 (2024)
Abstract. The integration of Artificial Intelligence (AI) into cybersecurity has significantly advanced identity management, particularly in combating Account Takeover (ATO) and enhancing digital security. Traditional cybersecurity methods often fail to keep up with the dynamic nature of cyber threats, necessitating advanced AI-driven solutions to effectively protect digital identities. This article explores the transformative impact of AI on identity management within the cybersecurity field, focusing on its benefits, challenges, and future potential. A comprehensive review of current literature and empirical findings was conducted, analyzing the application of AI through machine learning, deep learning, and neural networks. The results highlight AI's capability to enable real-time anomaly detection, proactive defense mechanisms, and enhance the resilience of identity protection systems. AI-powered systems exhibit significant advantages in adapting to evolving security threats by providing real-time analysis and understanding the contextual nuances of user behavior. These systems effectively mitigate risks associated with unauthorized access, thereby strengthening overall cybersecurity posture. Key findings emphasize AI's continuous learning from emerging attack tactics, its role in the interpretability of security incidents, and the importance of collaborative frameworks between AI systems and human experts. Addressing challenges such as ethical considerations, algorithmic biases, and the need for transparency remains critical for the ethical deployment and successful integration of AI in cybersecurity.
References
- Benhadjyoussef, N., Karmani, M., & Machhout, M. (2021). Power-based Side Channel Analysis and Fault Injection: Hacking Techniques and Combined Countermeasure. International Journal of Advanced Computer Science and Applications, 12(5).
- Babu, V. H., & Balaji, K. (2020). Survey on modular multilevel inverter based on various switching modules for harmonic elimination. In Intelligent Computing in Engineering: Select Proceedings of RICE 2019 (pp. 451-458). Springer Singapore.
- Sarker, I. H., Kayes, A. S. M., Badsha, S., Alqahtani, H., Watters, P., & Ng, A. (2020). Cybersecurity data science: an overview from machine learning perspective. Journal of Big data, 7, 1-29.
- Arri, H. S., Singh, R., Jha, S., Prashar, D., Joshi, G. P., & Doo, I. C. (2021). Optimized task group aggregation-based overflow handling on fog computing environment using neural computing. Mathematics, 9(19), 2522. https://doi.org/10.3390/math9192522
- Rosenberg, I., Shabtai, A., Elovici, Y., & Rokach, L. (2021). Adversarial machine learning attacks and defense methods in the cyber security domain. ACM Computing Surveys (CSUR), 54(5), 1-36.
- Wang, Z., Wang, E., & Zhu, Y. (2020). Image segmentation evaluation: a survey of methods. Artificial Intelligence Review, 53(8), 5637-5674.
- Jha, S., Ahmad, S., Arya, A., Alouffi, B., Alharbi, A., Alharbi, M., & Singh, S. (2023). Ensemble learning‐based hybrid segmentation of mammographic images for breast cancer risk prediction using fuzzy C‐means and CNN model. Journal of Healthcare Engineering, 2023(1), 1491955. https://doi.org/10.1155/2023/1491955
- Camacho, N. G. (2024). The role of ai in cybersecurity: Addressing threats in the digital age. Journal of Artificial Intelligence General science (JAIGS) ISSN: 3006-4023, 3(1), 143-154.
- Varney, A. (2019). Analysis of the impact of artificial intelligence to cybersecurity and protected digital ecosystems (Master's thesis, Utica College).
- Chakraborty, A., Biswas, A., & Khan, A. K. (2023). Artificial intelligence for cybersecurity: Threats, attacks and mitigation. In Artificial Intelligence for Societal Issues (pp. 3-25). Cham: Springer International Publishing.
- Mohammed, I. A. (2020). Artificial intelligence for cybersecurity: A systematic mapping of literature. Artif. Intell, 7(9), 1-5.
- Ansari, M. F., Dash, B., Sharma, P., & Yathiraju, N. (2022). The impact and limitations of artificial intelligence in cybersecurity: a literature review. International Journal of Advanced Research in Computer and Communication Engineering.
- Jha, S., Jha, N., Prashar, D., Ahmad, S., Alouffi, B., & Alharbi, A. (2022). Integrated IoT-based secure and efficient key management framework using hashgraphs for autonomous vehicles to ensure road safety. Sensors, 22(7), 2529. https://doi.org/10.3390/s22072529
- Sharma et al., "Artificial Intelligence Techniques for Landslides Prediction Using Satellite Imagery," in IEEE Access, vol. 12, pp. 117318-117334, 2024
- Buczak, A. L., & Guven, E. (2015). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications surveys & tutorials, 18(2), 1153-1176.
- Jha, S., Kumar, R., Hoang Son, L., Abdel-Basset, M., Priyadarshini, I., Sharma, R., & Viet Long, H. (2019). Deep learning approach for software maintainability metrics prediction. IEEE Access, 7, 61840–61855. https://doi.org/10.1109/ACCESS.2019.2913349
- Feng, W., Zhang, Q., Hu, G., & Huang, J. X. (2014). Mining network data for intrusion detection through combining SVMs with ant colony networks. Future Generation Computer Systems, 37, 127-140.
- Jiang, F., Fu, Y., Gupta, B. B., Liang, Y., Rho, S., Lou, F., ... & Tian, Z. (2018). Deep learning based multi-channel intelligent attack detection for data security. IEEE transactions on Sustainable Computing, 5(2), 204-212.
- Ahmad, S., Jha, S., Eljialy, A. E. M., & Khan, S. (2021). A systematic review on e-wastage frameworks. International Journal of Advanced Computer Science and Applications, 12(12). https://doi.org/10.14569/IJACSA.2021.0121287
- Shone, N., Ngoc, T. N., Phai, V. D., & Shi, Q. (2018). A deep learning approach to network intrusion detection. IEEE transactions on emerging topics in computational intelligence, 2(1), 41-50.
- Rajagopal, S. Ahmad, S. Jha, H. A. M. Abdeljaber, and J. Nazeer, "AI Based Secure Analytics of Clinical Data in Cloud Environment: Towards Smart Cities and Healthcare," J. Adv. Inf. Technol., vol. 14, no. 5, pp. 1132-1142, 2023.
- Xin, Y., Kong, L., Liu, Z., Chen, Y., Li, Y., Zhu, H., ... & Wang, C. (2018). Machine learning and deep learning methods for cybersecurity. Ieee access, 6, 35365-35381.
- Jha, S., Nkenyereye, L., Prasad Joshi, G., & Yang, E. (2020). Mitigating and monitoring smart city using internet of things. Computers, Materials & Continua, 65(2), 1059–1079. https://doi.org/10.32604/cmc.2020.011754
- Gu, T., Dolan-Gavitt, B., & Garg, S. (2017). Badnets: Identifying vulnerabilities in the machine learning model supply chain. arXiv preprint https://arxiv.org/abs/1708.06733.
- Soe, Y. N., Feng, Y., Santosa, P. I., Hartanto, R., & Sakurai, K. (2020). Machine learning-based IoT-botnet attack detection with sequential architecture. Sensors, 20(16), 4372.
- Jha, S., Prasad Joshi, G., Nkenyereya, L., Wan Kim, D., & Smarandache, F. (2020). A direct data-cluster analysis method based on neutrosophic set implication. Computers, Materials & Continua, 65(2), 1203–1220. https://doi.org/10.32604/cmc.2020.011618
- Jha, S., Prashar, D., Long, H. V., & Taniar, D. (2020). Recurrent neural network for detecting malware. Computers & Security, 99, 102037. https://doi.org/10.1016/j.cose.2020.102037
- Saad, A., Faddel, S., Youssef, T., & Mohammed, O. A. (2020). On the implementation of IoT-based digital twin for networked microgrids resiliency against cyber-attacks. IEEE transactions on smart grid, 11(6), 5138-5150.
- Jha, S., Seo, C., Yang, E., & Joshi, G. P. (2021). Real-time object detection and tracking system for video surveillance. Multimedia Tools and Applications, 80(3), 3981–3996. https://doi.org/10.1007/s11042-020-09749-x
- Shaukat, K., Luo, S., Varadharajan, V., Hameed, I. A., & Xu, M. (2020). A survey on machine learning techniques for cyber security in the last decade. IEEE access, 8, 222310-222354.
- Usama, M., Qadir, J., Raza, A., Arif, H., Yau, K. L. A., Elkhatib, Y., ... & Al-Fuqaha, A. (2019). Unsupervised machine learning for networking: Techniques, applications and research challenges. IEEE access, 7, 65579-65615.
- S. Jha, S. Routray, H. A. M. Abdeljaber, and S. Ahmad, "A novel approach for decision support system in cricket using machine learning," Int. J. Comput. Appl. Technol., vol. 70, no. 2/3, pp. 86-92, 2022.
- Xiao, L., Wan, X., Dai, C., Du, X., Chen, X., & Guizani, M. (2018). Security in mobile edge caching with reinforcement learning. IEEE Wireless Communications, 25(3), 116-122.
- S. Jha, "Model Selection Procedure in Alleviating Drawbacks of The Electronic Whiteboard," 2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N), Greater Noida, India, 2021, pp. 319-322
- V. Puri et al., "A Hybrid Artificial Intelligence and Internet of Things Model for Generation of Renewable Resource of Energy," in IEEE Access, vol. 7, pp. 111181-111191, 2019