Exploring the Integration of Artificial Intelligence in Detecting Advanced Persistent Threats in Real Time
Keywords:
Artificial Intelligence, Advanced Persistent Threats, Cybersecurity, Real-Time Detection, Machine Learning, Anomaly Detection, Network Security, Threat IntelligenceAbstract
Advanced Persistent Threats (APTs) pose one of the most dangerous challenges to modern cybersecurity systems. Characterized by stealth, persistence, and sophistication, APTs are often orchestrated by state or financially motivated actors targeting sensitive infrastructure. As conventional security tools struggle to provide timely and accurate detection, artificial intelligence (AI) emerges as a transformative solution. This paper explores the integration of AI technologies in detecting APTs in real time, examining architectural frameworks, algorithms, and their performance across various sectors. Through a review of prior literature and recent developments, we highlight how AI-enabled systems are changing the landscape of proactive cybersecurity.
References
Zhang, Buczak, A. L., & Guven, E. "A survey of data mining and machine learning methods for cyber security intrusion detection." IEEE Communications Surveys & Tutorials, 2016.
Chiba, Z., Abghour, N., Moussaid, K., & Rida, M. "Intelligent Approach to Build a Deep Learning-Based IDS for Cloud Environment." Journal of Cloud Computing, 2020.
Sittig, D. F., & Singh, H. "A socio-technical approach to preventing, mitigating, and recovering from ransomware attacks." Applied Clinical Informatics, 2017.
Kumar, S., & Venkatraman, S. "Deep learning based detection of advanced persistent threats." Procedia Computer Science, 2021.
Wang, S., Chen, J., & Tan, Q. "Adversarial Learning for Robust Network Intrusion Detection." Information Sciences, 2022.
Khan, R., McLaughlin, K., & Sezer, S. "STRIDE-Based Threat Modeling for Cyber Physical Systems." IEEE Systems Journal, 2017.
Sommer, R., & Paxson, V. "Outside the Closed World: On Using Machine Learning for Network Intrusion Detection." IEEE Symposium on Security and Privacy, 2010.
Lee, W., & Stolfo, S. J. "Data mining approaches for intrusion detection." USENIX Security Symposium, 2000.
Jain, A. K., & Chandrasekaran, R. "AI-driven defense mechanisms in distributed systems." International Journal of Information Security, 2022.
Gohar, M., & Amin, M. "Deep intrusion detection systems in network security." Security and Communication Networks, 2020.
Xie, Y., & Yu, S. "Real-time detection of APTs using ensemble models." ACM Transactions on Information Systems Security, 2021.
Bedi, H. S., & Sood, S. K. "SIEM optimization using deep neural networks." Computer Networks, 2018.
Bhuyan, M. H., Bhattacharyya, D. K., & Kalita, J. K. "Network anomaly detection." IEEE Communications Surveys & Tutorials, 2014.
Conti, M., Dehghantanha, A., Franke, K., & Watson, S. "Internet of Things security and forensics." Future Generation Computer Systems, 2018.
Le, H., Luh, P. B., & Zhang, X. "Deep Learning Applications in Security Operations Centers." IEEE Access, 2023.