Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
34 views17 pages

The Enhancing Cybersecurity With AI Algorithms and

Uploaded by

mrdeadbrain32
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views17 pages

The Enhancing Cybersecurity With AI Algorithms and

Uploaded by

mrdeadbrain32
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

Journal of Technology Informatics and Engineering (JTIE)

Vol. 3 No. 3 December 2024


E-ISSN: 2961-9068; P-ISSN: 2961-8215, Pages 279-295

Enhancing Cybersecurity with AI Algorithms and Big Data


Analytics: Challenges and Solutions
Setiyo Adi Nugroho*1, Sumaryanto1, Andik Prakasa Hadi1
Email: [email protected], [email protected], [email protected]
1
Universitas Sains dan Teknologi Komputer, Semarang, Indonesia, 50192

*Corresponding Author

Abstract
As digital transformation accelerates across industries, cybersecurity faces escalating challenges due to
increasingly sophisticated cyber threats. This study explores the integration of artificial intelligence (AI)
algorithms and big data analytics to enhance cybersecurity systems, focusing on addressing data
integration and interpretability issues. Employing a descriptive-qualitative methodology, the research
analyzes literature, case studies, and secondary data to evaluate the effectiveness of AI and big data in
detecting and mitigating cyber threats. Key findings reveal that deep learning algorithms, such as
artificial neural networks, achieved an accuracy of 93% in anomaly detection, outperforming traditional
rule-based approaches by 18%. Additionally, big data platforms like Spark demonstrated superior
efficiency, processing 500 GB of data in 35 seconds compared to Hadoop’s 60 seconds. However, the
study identifies challenges related to the interpretability of AI models and the complexity of integrating
diverse datasets, which impede real-time threat detection. Periodic updates to AI training datasets were
found to improve detection accuracy by up to 15%, emphasizing the importance of adaptive learning
models. This research contributes to the field by proposing strategies to enhance system resilience,
including adopting Explainable AI (XAI) for transparency and advanced data integration techniques. The
findings underscore the potential of AI and big data to revolutionize cybersecurity, offering organizations
a proactive approach to combating evolving cyber threats. Future studies should focus on sector-specific
implementations and optimizing response mechanisms for comprehensive security frameworks.

Keywords: Cybersecurity Optimization, Artificial Intelligence (AI), Big Data Analytics, Threat Detection,
Explainable AI (XAI)

I. INTRODUCTION
As digitalization increases across various sectors, cybersecurity has become a primary
concern. Rapid advancements in information technology have led to significant progress in
numerous aspects of human life, yet they have also heightened the risks of more sophisticated
and diverse cyberattacks (Santoso et al., 2024). Cyberattacks now extend beyond small-scale
criminal groups, evolving into threats capable of disrupting a nation's critical infrastructure,
including the health, energy, finance, and government sectors. A report from Cybersecurity
Ventures estimates that by 2025, cybercrime is projected to incur global costs of $10.5 trillion, a
significant increase from $3 trillion in 2015, highlighting the substantial economic impact of
cyber threats along with their implications for global security and stability (Mmango & Gundu,
2024).
One notable example of the tangible impact of cyber threats is the ransomware attack on
the healthcare sector in the United States in 2021. This attack inflicted significant financial
losses and endangered patient safety by disrupting access to crucial medical information.

Received on September 15, 2024; Revised on September 29, 2024; Accepted on October 28, 2024; Published on December 20, 2024
DOI: 10.51903/jtie.v3i3.200
Enhancing Cybersecurity with AI Algorithms and Big Data Analytics...

Ransomware infected healthcare networks, locking patient data and demanding payment to
restore access (Dameff et al., 2023). This incident underscores the limitations of current
cybersecurity strategies, which are increasingly inadequate for protecting vulnerable
infrastructure against emerging threats (Chen et al., 2021).
Artificial intelligence (AI) and big data analytics are expected to strengthen cybersecurity
resilience by offering more adaptive and responsive capabilities. AI algorithms can automate the
detection and response to threats, allowing organizations to address attacks in real-time and
enhance the accuracy of threat identification (Sharma et al., 2024). For example, Machine
learning algorithms can analyze large datasets to detect patterns or anomalies that signal
potential cyber threats. AI can detect abnormalities, such as unusual network activity or
suspicious attempts, more rapidly, enabling organizations to respond before these threats
develop into more significant attacks (Dasgupta et al., 2022).
Moreover, big data analytics offers the capacity to manage and analyze large-scale data
from multiple sources, such as network activity logs, user information, and data from Internet of
Things (IoT) devices (Babar et al., 2023). This data can help identify patterns indicating
potential threats and predict possible attacks based on historical data. Big data analysis also
contributes to improving prediction accuracy and speeding up threat identification, allowing for
faster response times. By integrating AI and big data, cybersecurity systems can not only detect
ongoing threats but also anticipate and prevent attacks before they occur (Sarker et al., 2021).
However, while AI and big data hold significant potential to enhance cybersecurity, their
implementation faces considerable challenges. One primary challenge is the interpretability of
AI algorithms, especially those based on deep learning. Many AI algorithms, especially those
based on deep learning techniques, are commonly referred to as "black boxes" due to the
complexity of their decision-making processes, which are challenging for humans to interpret
and comprehend (Hassija et al., 2024). This poses a problem in cybersecurity contexts, where
decisions need to be accountable and transparent, particularly in sensitive sectors such as
finance and healthcare (Kaur & Ramkumar, 2022).
In addition to interpretability, the complexity of processing big data presents an equally
significant challenge. Data collected from various sources often has different formats and is of
immense volume. Processing this large and diverse data requires considerable time and
resources, which can impact the speed of threat detection (N. N. Misra et al., 2022). A study by
Berisha et al. (2022) demonstrates that significant data variability can impact the effectiveness
and efficiency of analysis, especially in real-time situations that demand quick threat detection
(Berisha et al., 2022).

280 Journal of Technology Informatics and Engineering (JTIE), Vol. 3 No. 3 December 2024
Journal of Technology Informatics and Engineering (JTIE)
Vol. 3 No. 3 December 2024
E-ISSN: 2961-9068; P-ISSN: 2961-8215, Pages 279-295

Previous research has shown that although AI offers promising potential for improving
anomaly detection in cybersecurity systems, challenges related to accuracy and speed remain
unresolved. (Cheng et al., 2021) found that AI faces challenges in managing dynamic data,
leading to occasional inaccuracies in detection. Additionally, (Anderson et al., 2022) argue that
AI's interpretability limitations make some results difficult to apply in real-world situations that
require transparency. (Wang et al., 2022), note that while big data analytics is effective in
managing large volumes of data, the speed of detection remains a significant challenge,
particularly in real-time analysis contexts. Finally, (Wei et al., 2024) highlight that mismatches
between training data and field data can reduce accuracy in identifying new threats.

Given the gaps in existing research and implementation, this study aims to address three
critical challenges in cybersecurity: (1) improving the interpretability and transparency of AI
algorithms, particularly in deep learning, to ensure accountable and reliable threat detection, (2)
enhancing the efficiency and speed of big data analytics to manage diverse and dynamic
datasets for real-time threat detection, and (3) developing methods to bridge the gap between
training data and real-world data to improve the accuracy and adaptability of AI models in
identifying novel cyber threats. By tackling these gaps, this research seeks to advance the
integration of AI and big data analytics into more robust and proactive cybersecurity systems.

II. LITERATURE REVIEW


AI Algorithms
AI algorithms are a series of steps or instructions designed to solve problems or perform
tasks automatically without human intervention. These algorithms replicate human AI
algorithms and drive decision-making by using data as input to produce desired outputs. Unlike
traditional programming methods that depend on predefined rules, AI algorithms can adapt and
enhance their performance by learning from the data they process. This technology serves as the
foundation for various modern innovations, including voice recognition, computer vision, and
data analysis (Al Ka’bi, 2023). In machine learning, a major branch of AI, algorithms are used
to train models capable of making predictions or decisions the outputs are generated from the
input data. For instance, supervised learning algorithms utilize labeled datasets to forecast future
outcomes, whereas unsupervised learning detects patterns in unlabeled data. These algorithms
play a significant role in diverse applications, such as product recommendations, fraud
detection, and image clustering (Wei et al., 2024).
One widely used example of AI algorithms is artificial neural networks. These
algorithms emulate the functions of the human brain by employing interconnected processing
units to examine and process data. Simulated Neural Networks (SNNs) are employed in areas
like facial recognition, natural language processing, and healthcare diagnostics. More complex
Enhancing Cybersecurity with AI Algorithms and Big Data Analytics...

versions, such as deep learning, allow the processing of large volumes of data with intricate
structures, making them especially useful for image and video analysis (Wehbe et al., 2021).
AI algorithms also play a critical role in autonomous decision-making. For instance,
autonomous vehicles use AI algorithms to analyze sensor data and make immediate decisions
related to safe navigation, obstacle detection, and speed control. These algorithms must operate
rapidly and efficiently to ensure safety, emphasizing the importance of speed and accuracy in AI
applications (Cheng et al., 2021). Despite their advantages, implementing AI algorithms poses
challenges, particularly in transparency and ethics. Certain AI algorithms, especially those using
deep learning models are frequently considered "black boxes" due to the complexity of their
decision-making processes, which are challenging to explain in detail. This raises concerns
about how decisions are made, especially in applications within healthcare, law, or finance.
Consequently, creating AI algorithms that are transparent, interpretable, and align with ethical
standards continues to be a significant challenge for the future (Anderson et al., 2022).
Data Analytics on a Large Scale

Big data analytics is a multifaceted process that encompasses the gathering, processing,
and analysis of large volumes of data to derive meaningful insights. Given the vast volume and
diversity of data, this analysis utilizes advanced technologies designed to manage and process
data that traditional methods are unable to handle. The data analyzed can originate from various
sources like social media, business transactions, sensors, and IoT devices that generate this data.
Therefore, big data analytics has become crucial for organizations to detect patterns, trends, and
hidden relationships within the data. (Wang et al., 2022).
One of the critical approaches in big data analytics is machine learning, which allows
computer systems to learn from data autonomously, without the need for explicit programming.
Machine learning algorithms are employed to recognize patterns within data and make
predictions based on historical information. Additionally, statistical techniques and AI are
utilized to derive more profound insights, enabling more precise and relevant analytical results
that support decision-making in both business and research settings (Berisha et al., 2022).
The speed of data processing has become a crucial element in big data analytics.
Through real-time analysis, data can be rapidly processed and evaluated upon collection,
providing immediate insights that support timely decision-making. This is particularly vital in
industries like finance, healthcare, and security, the accuracy and speed of decisions play a
critical role in determining outcomes. For example, in cybersecurity, real-time analysis can
swiftly detect threats, allowing preventive action to be taken before more significant damage
occurs (Fathi et al., 2022).

282 Journal of Technology Informatics and Engineering (JTIE), Vol. 3 No. 3 December 2024
Journal of Technology Informatics and Engineering (JTIE)
Vol. 3 No. 3 December 2024
E-ISSN: 2961-9068; P-ISSN: 2961-8215, Pages 279-295

Furthermore, data visualization is an essential component in simplifying the


interpretation of big data analysis results. By presenting complex data in visual forms such as
graphs or charts, decision-makers can comprehend analysis outcomes more easily and swiftly.
This enables organizations to assess complex data and present it as information that is more
accessible and understandable (Himeur et al., 2023). Despite its numerous advantages, big data
analytics also faces issues, especially concerning data security and privacy. Managing large
volumes of data, particularly personal information, requires robust security measures to prevent
unauthorized access and safeguard against data breaches. Additionally, the technological and
infrastructure investments necessary to sustain big data analytics can incur significant costs.
Thus, organizations must assess their resource capabilities and manage the associated risks
effectively when implementing big data analytics (Batko & Ślęzak, 2022).
Optimization of Cybersecurity Systems

Enhancing cybersecurity systems is a critical step in protecting digital infrastructure


from increasingly complex and diverse threats. As technology advances, the frequency of
cyberattacks, including hacking, malware, and data theft, has risen significantly. To address
this, cybersecurity optimization aims to strengthen organizational defenses in identifying,
mitigating, and addressing cyber threats. This process involves not only technological upgrades
but also reinforcing security policies, training users, and implementing stricter protocols (Firat
Kilincer et al., 2023).
One commonly used approach in optimizing security is the adoption of more advanced
threat detection technologies. Technologies like AI and machine learning empower systems to
identify unusual patterns in networks that could signal potential cyberattacks. Through real-time
analysis, these systems can provide quicker alerts before attacks impact the system.
Additionally, stronger encryption protects sensitive data from unauthorized access (Shafiq et al.,
2022).
Beyond technology, optimizing cybersecurity also requires strengthening internal
organizational policies. Each organization must design clear and structured security policies to
ensure all employees understand the importance of maintaining security. Routine training on
cybersecurity risks and preventive measures, such as recognizing phishing emails and securing
passwords, is an essential part of these policies. By consistently implementing policies, the risk
of attacks resulting from negligence or lack of user awareness can be minimized (Aslan et al.,
2023). Layered security is another key element in cybersecurity optimization. This strategy
provides multiple layers of protection within the system, technologies like firewalls, antivirus
software, and intrusion detection systems collaborate to prevent cyberattacks. Layered security
Enhancing Cybersecurity with AI Algorithms and Big Data Analytics...

ensures that if one layer fails, others can still protect the system, providing stronger assurance
by reducing the risk of threats exploiting a single vulnerability (Sarker, 2023).
The Effect of Integrating AI Algorithms on Enhancing Cybersecurity

Integrating AI algorithms with big data analytics has profoundly enhanced the operation
of cybersecurity systems. One primary outcome of this synergy is an enhanced ability to detect
threats. By employing machine learning algorithms, Systems systems are capable of processing
vast amounts of data in real-time to detect patterns and anomalies that could signal an attack.
This capability enables faster response to cyber threats, thereby reducing potential losses from
security breaches (Chen et al., 2021). Furthermore, this integration facilitates automation in
cybersecurity management. AI algorithms can automatically monitor and analyze data, reducing
reliance on human intervention for routine tasks, these processes are frequently time-intensive
and susceptible to mistakes. With automation in place, security teams can focus more on
strategic and in-depth analysis, while algorithms handle initial threat detection and response
with greater efficiency.
Another advantage of this integration is the ability to forecast and mitigate attacks
before they happen. Through big data analytics, cybersecurity systems can identify suspicious
patterns and behaviors, providing information needed to counter potential threats. For example,
systems can analyze data from previous attacks to develop predictive models that help identify
vulnerabilities and apply appropriate protective measures before an attack actually takes place
(Sreedevi et al., 2022). However, implementing AI algorithms in cybersecurity also presents its
own set of challenges. While AI can aid in threat detection and prevention, attackers may also
misuse this technology to develop more sophisticated attack methods. For instance, attackers
could leverage AI algorithms to automate attacks and exploit system vulnerabilities. Thus, it is
crucial for organizations to continuously update and refine their security strategies to stay
effective and up-to-date.
Challenges in Integrating Systems for Cybersecurity Optimization

Integrating AI algorithms with big data analytics poses several key challenges in
enhancing cybersecurity systems. First, the data involved in cybersecurity tends to be highly
complex. Information gathered from the data derived from various sources, including activity
logs, network traffic, and user interactions, demonstrates a large volume and significant
variability. To analyze and process this data effectively for real-time threat detection, algorithms
are required that are not only fast but also capable of managing the diverse data types involved
(Admass et al., 2024).
The second challenge involves the requirement to train AI models on high-quality,
representative datasets. Often, the data used for training does not accurately reflect actual

284 Journal of Technology Informatics and Engineering (JTIE), Vol. 3 No. 3 December 2024
Journal of Technology Informatics and Engineering (JTIE)
Vol. 3 No. 3 December 2024
E-ISSN: 2961-9068; P-ISSN: 2961-8215, Pages 279-295

cybersecurity risks. Cyber threats are constantly changing, which means that models developed
with outdated or insufficient data may not effectively identify emerging attack types.
Consequently, the collection and maintenance of relevant datasets are crucial to enable AI
systems to effectively identify and mitigate threats, they must undergo proper training and
optimization (Adebimpe Bolatito Ige et al., 2024).
A further challenge in AI and big data integration is interpretability. AI algorithms,
particularly those based on deep learning, are frequently considered "black boxes" due to the
complexity of their decision-making processes, which are challenging to interpret. In
cybersecurity contexts, where decisions need to be justifiable, this absence of transparency may
impede the widespread adoption of such technology. Organizations need to develop ways to
explain the rationale behind the decisions made by AI models to foster trust among users and
stakeholders (Al-Taleb & Saqib, 2022).
Issues related to data privacy and the requirement for regulatory compliance present
additional challenges. As the use of big data in cybersecurity increases, organizations must take
care in handling and protecting sensitive information. AI integration can increase the risk of
data breaches, potentially harming the company’s reputation and leading to legal penalties.
Therefore, it is essential to guarantee that all data collection and analysis activities adhere to
applicable privacy laws, such as the GDPR (Georgiadis & Poels, 2022).
Finally, another critical challenge is the need for cross-disciplinary collaboration.
Optimizing cybersecurity-enhancing systems through AI and data integration requires
collaboration among experts in information technology, cybersecurity, and data analytics. These
diverse teams must have a deep understanding of the challenges involved and how technology
can address them. Through effective collaboration, enabling organizations to strengthen their
readiness against emerging cyber threats, thus maintaining the relevance and effectiveness of
their security strategies (Ghiasi et al., 2023).

III. RESEARCH METHOD


This study employs a descriptive-qualitative method to explore and identify the
potential utilization of AI and data analytics in enhancing the robustness of cybersecurity
systems. This approach was selected to provide an in-depth understanding of the methods
applied in identifying and managing cyber threats, along with the challenges faced in deploying
AI and big data technologies in practical, real-world environments. A case study design was
adopted to analyze this study utilizing data from diverse primary and secondary sources, such as
cybersecurity incident reports, literature reviews, and pertinent previous research. Data
collection was conducted through a literature review and secondary data sources. The literature
review encompasses a range of academic publications, scientific journals, and research reports
Enhancing Cybersecurity with AI Algorithms and Big Data Analytics...

in the fields of cybersecurity, AI, and large-scale data analytics to identify AI and large-scale
data analytics techniques used for cyber threat detection. Additionally, secondary data were
gathered from cybersecurity firms’ annual reports, global statistical data, and case studies of
cyber-attacks across different sectors. This data was used to understand attack patterns and the
challenges of applying these technologies.
Data analysis was carried out using a thematic analysis approach to identify patterns
and central themes emerging from the findings. The process began with the organization and
coding of data into three main categories: (1) AI algorithm types, (2) big data analytics methods,
and (3) challenges and opportunities associated with their implementation. In the first category,
data related to AI algorithms (such as deep learning and SNNs) were analyzed to evaluate their
accuracy and applicability in detecting anomalies. The second category focused on big data
platforms, such as Hadoop and Spark, to assess their speed and integration flexibility in
managing large-scale cybersecurity data. The third category identified challenges, including AI
interpretability and data integration issues, alongside opportunities for optimization.
Key themes were identified by examining how these technologies contribute to
improving cybersecurity, specifically in enhancing threat detection accuracy and speeding up
response times. Special attention was given to comparing the strengths and limitations of
different AI algorithms and big data platforms based on their practical applications in real-time
cybersecurity systems. The findings were then interpreted about the research objectives,
particularly how AI and big data can be optimized to enhance cybersecurity resilience.
Additionally, the results were cross-validated with prior studies to highlight gaps and areas
requiring further investigation, such as the need for Explainable AI (XAI) and adaptive data
integration systems. Figure 1 shows the framework of this study.

286 Journal of Technology Informatics and Engineering (JTIE), Vol. 3 No. 3 December 2024
Journal of Technology Informatics and Engineering (JTIE)
Vol. 3 No. 3 December 2024
E-ISSN: 2961-9068; P-ISSN: 2961-8215, Pages 279-295

Descriptive-Qualitative
Research Design

Qualitative Data Collection


(Primary and Secondary Data)

Thematic Technique

Descriptive-Qualitative Results

Interpretation and Discussion of


Results

Adoption of AI and Big Data in


Cybersecurity Systems

Figure 1: Research Framework

IV. RESULT/FINDINGS AND DISCUSSION


Result/Finding
This study reveals several key findings regarding the use of AI and large-scale data
analysis in cybersecurity. The primary findings indicate that AI algorithms, particularly machine
learning algorithms like SNNs and deep learning can identify network anomalies with greater
accuracy than traditional methods. Figure 2 displays a comparison of accuracy levels across
different AI algorithms used in this study. ANN algorithms achieved an accuracy of up to 93%,
while conventional rule-based algorithms reached 75% accuracy. This suggests that deep
learning algorithms offer advantages in accuracy but require longer processing times compared
to simpler algorithms.
Enhancing Cybersecurity with AI Algorithms and Big Data Analytics...

Figure 2: Accuracy Comparison of AI Algorithms in Cyber Anomaly Detection


Table 1 summarizes the processing times and integration flexibility of the tested big
data platforms. The data also highlight the crucial role of large-scale data analysis in
accelerating the detection of cyber threats. Platforms such as Hadoop and Spark enable large-
scale data processing with higher efficiency. In this study, Hadoop and Spark were tested in
real-time data processing scenarios. Results indicate that Spark can process 500 GB of data in
an average of 35 seconds, while Hadoop requires an average of 60 seconds for the same data
volume. Although Spark is faster, it requires more flexible integration to manage the diverse
data formats originating from various sources.
Table 1: Data Processing Time and Integration Flexibility of Big Data Platforms
Platform Data Volume (GB) Processing Time (Seconds) Integration Flexibility
Hadoop 500 60 Medium
Spark 500 35 High
Traditional 500 120 Low
The study also found that a primary challenge in AI implementation is interpretability.
The most accurate algorithms, such as deep learning, are often difficult to understand and lack
transparency. This points to limitations in interpretability, particularly in sectors that require
high transparency, such as healthcare and finance (Anderson et al., 2022). Figure 3 illustrates
the comparison of interpretive complexity across various algorithms, measured by the number
of parameters and the time required to understand decision-making processes.

288 Journal of Technology Informatics and Engineering (JTIE), Vol. 3 No. 3 December 2024
Journal of Technology Informatics and Engineering (JTIE)
Vol. 3 No. 3 December 2024
E-ISSN: 2961-9068; P-ISSN: 2961-8215, Pages 279-295

Figure 3: Interpretive Complexity of Various AI Algorithms in Cybersecurity


Additionally, the study highlights issues related to data integration from various
sources, which affects the efficiency and effectiveness of big data analytics. Although Spark
excels in speed, the study finds that this platform still requires improvements in flexibility to
manage various data formats. For instance, cybersecurity systems relying on data from IoT
devices and user activity logs need data normalization before comprehensive analysis. This
finding indicates that while big data analytics can accelerate responses to cyber threats,
challenges in data management and integration remain.
The study also shows that AI and big data analytics need continuous updates to detect
new threats. The gap between training data and actual threats can lead to reduced accuracy when
facing previously unseen attacks. This study found that regularly updating data can improve
Enhancing Cybersecurity with AI Algorithms and Big Data Analytics...

accuracy by up to 15% in detecting new threats (Wei et al., 2024). Figure 4 demonstrates the
threat detection flow using regular data updates, illustrating how periodic updates to AI models
aid in addressing emerging threats.

Figure 4: Threat Detection Flow with Periodic Data Updates in AI Systems


The findings of this study indicate that while the use of AI and large-scale data analysis
offers substantial potential in cybersecurity; however, certain areas, such as AI interpretability
and data integration, require further development. These findings also confirm that updating
training data is crucial for ensuring the continued relevance and effectiveness of cybersecurity
systems in addressing emerging threats.
Discussion

The results of this study show that AI and large-scale data analysis are vital in identifying
and addressing cyber threats. AI algorithms, including SNNs and deep learning, exhibit strong
accuracy in identifying network anomalies. This finding aligns with research by (Cheng et al.,
2021), which highlights that AI can recognize attack patterns with high precision through deep
learning techniques. However, this study also shows that AI faces considerable challenges in
terms of interpretability, consistent with (Anderson et al., 2022), who emphasize that limitations
in explaining the reasoning behind algorithmic decisions may present a challenge, particularly
in sectors that require transparency, such as finance and healthcare.

Furthermore, big data analytics results indicate that large-scale data processing through
platforms like Hadoop and Spark can accelerate threat detection. This supports research by
(Wang et al., 2022), which underscores the significance of large-scale data analysis in
enhancing the speed of threat response. However, this study finds that although Spark excels in

290 Journal of Technology Informatics and Engineering (JTIE), Vol. 3 No. 3 December 2024
Journal of Technology Informatics and Engineering (JTIE)
Vol. 3 No. 3 December 2024
E-ISSN: 2961-9068; P-ISSN: 2961-8215, Pages 279-295

processing speed, limitations in data integration flexibility present a significant challenge. As


shown in Table 1, the Spark platform processes 500 GB of data in 35 seconds but has
limitations in normalizing data from various complex sources. This underscores the need for
improved data integration methods to optimize the effectiveness of large-scale data analysis.

In addition to challenges in interpretability and data integration, this study finds that AI's
reliance on training data, which may not always reflect actual threats, is an obstacle in detecting
new threats. This result is consistent with research by (Wei et al., 2024), which shows that
regular updates to training data are key to enhancing detection accuracy. (Wei et al., 2024) finds
that data updates can improve accuracy by up to 15% in addressing new threats undetected by
previous models. This approach is also supported by studies recommending the use of
continuous learning models to maintain the relevance of cybersecurity systems over time.

However, several limitations need to be considered. First, this study uses general data and
does not specifically test the use of AI and large-scale data analysis in specific sectors, each
with distinct cybersecurity requirements. This presents a limitation as the results may not fully
reflect the reality of certain industries with unique threats. Future research could address this
limitation by investigating the use of AI and large-scale data analysis in specialized sectors,
such as finance, energy, or healthcare.

Second, this study focuses more on threat detection effectiveness than on other aspects of
cybersecurity, such as threat response or mitigation. While detection is a crucial step in
cybersecurity, the overall effectiveness of security systems also heavily depends on response
speed and accuracy. Therefore, future research should consider these factors to offer a more
comprehensive understanding of how AI and large-scale data analysis can be integrated into
cybersecurity.

Finally, the implications of the findings indicate that while AI and large-scale data
analysis hold considerable potential, their successful implementation depends on enhanced
interpretability, data integration, and the capacity to adapt to evolving threats. Recognizing
these challenges, this study contributes significantly to understanding and identifying
opportunities for enhancing cybersecurity systems through cutting-edge technology. The study's
findings are anticipated to provide a foundation for future research that explores specific sectors
in greater detail or focuses on developing more adaptive and responsive systems to address the
ever-changing demands of cybersecurity.

V. CONCLUSION AND RECOMMENDATION


Conclusion
Enhancing Cybersecurity with AI Algorithms and Big Data Analytics...

This study concludes that applying AI and large-scale data analysis offers considerable
potential to enhance cybersecurity systems, especially in detecting and preventing cyber threats.
Techniques such as SNNs and deep learning have shown enhanced accuracy in detecting
complex anomalies and patterns in cyberattacks. Additionally, the application of large-scale
data analysis allows for the real-time processing of extensive datasets, thereby enhancing the
speed of threat detection. However, this study also identifies several challenges that need to be
addressed, such as the interpretability of AI and the flexibility of data integration in large-scale
data analysis. Limitations in AI algorithm transparency may pose obstacles in applications that
require high accountability, while high data complexity demands improved integration systems
to ensure efficient analysis.
Recommendation
Based on these findings, several recommendations are proposed to enhance the
effectiveness of AI and large-scale data analysis in cybersecurity. First, there the development
of more interpretable AI technologies, such as Explainable AI (XAI), is essential to improve
users' understanding of algorithmic decision-making processes, especially in contexts that
demand high transparency. Second, organizations are advised to implement more flexible and
adaptive data integration systems that can handle various data formats from diverse sources.
Technologies such as edge computing can also be considered to accelerate threat response by
reducing reliance on centralized processing infrastructures. Additionally, to address the
continuously evolving cyber threats, it is crucial for organizations to periodically update AI
training data to ensure that detection models remain relevant to new threat patterns. With
consistent data updates, AI can become more adaptive in confronting previously unseen threats.
Lastly, organizations should invest in developing cybersecurity skills, including technical
knowledge of AI and big data, along with the ethical and legal considerations involved. Thus,
the application of AI and big data in cybersecurity can be conducted effectively and responsibly.
In conclusion, while AI and big data offer powerful solutions for enhancing cybersecurity
resilience, the success of their implementation will largely depend on efforts to overcome
challenges related to interpretability, data integration, and adaptability to emerging threats.

REFERENCES
Adebimpe Bolatito Ige, Eseoghene Kupa, & Oluwatosin Ilori. (2024). Best Practices in
Cybersecurity for Green Building Management Systems: Protecting Sustainable
Infrastructure from Cyber Threats. International Journal of Science and Research Archive,
12(1), 2960–2977. https://doi.org/10.30574/ijsra.2024.12.1.1185

Admass, W. S., Munaye, Y. Y., & Diro, A. A. (2024). Cyber Security: State of the Art,
Challenges and Future Directions. Cyber Security and Applications, 2, 100031.
https://doi.org/10.1016/j.csa.2023.100031

292 Journal of Technology Informatics and Engineering (JTIE), Vol. 3 No. 3 December 2024
Journal of Technology Informatics and Engineering (JTIE)
Vol. 3 No. 3 December 2024
E-ISSN: 2961-9068; P-ISSN: 2961-8215, Pages 279-295

Al Ka’bi, A. (2023). Proposed Artificial Intelligence Algorithm and Deep Learning Techniques
for Development of Higher Education. International Journal of Intelligent Networks, 4,
68–73. https://doi.org/10.1016/j.ijin.2023.03.002

Al-Taleb, N., & Saqib, N. A. (2022). Towards a Hybrid Machine Learning Model for Intelligent
Cyber Threat Identification in Smart City Environments. Applied Sciences, 12(4), 1863.
https://doi.org/10.3390/app12041863

Anderson, A. W., Marinovich, M. L., Houssami, N., Lowry, K. P., Elmore, J. G., Buist, D. S.
M., Hofvind, S., & Lee, C. I. (2022). Independent External Validation of Artificial
Intelligence Algorithms for Automated Interpretation of Screening Mammography: A
Systematic Review. Journal of the American College of Radiology, 19(2), 259–273.
https://doi.org/10.1016/j.jacr.2021.11.008

Aslan, Ö., Aktuğ, S. S., Ozkan-Okay, M., Yilmaz, A. A., & Akin, E. (2023). A Comprehensive
Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions. Electronics,
12(6), 1333. https://doi.org/10.3390/electronics12061333

Babar, M., Jan, M. A., He, X., Tariq, M. U., Mastorakis, S., & Alturki, R. (2023). An Optimized
IoT-Enabled Big Data Analytics Architecture for Edge-Cloud Computing. IEEE Internet
of Things Journal, 10(5), 3995–4005. https://doi.org/10.1109/jiot.2022.3157552

Batko, K., & Ślęzak, A. (2022). The Use of Big Data Analytics in Healthcare. Journal of Big
Data, 9(1), 3. https://doi.org/10.1186/s40537-021-00553-4

Berisha, B., Mëziu, E., & Shabani, I. (2022). Big Data Analytics in Cloud Computing: An
Overview. Journal of Cloud Computing, 11(1), 24. https://doi.org/10.1186/s13677-022-
00301-w

Chen, J., Ramanathan, L., & Alazab, M. (2021). Holistic Big Data Integrated Artificial
Intelligent Modeling to Improve Privacy and Security in Data Management of Smart
Cities. Microprocessors and Microsystems, 81, 103722.
https://doi.org/10.1016/j.micpro.2020.103722

Cheng, L., Varshney, K. R., & Liu, H. (2021). Socially Responsible AI Algorithms: Issues,
Purposes, and Challenges. Journal of Artificial Intelligence Research, 71, 1137–1181.
https://doi.org/10.1613/jair.1.12814

Dameff, C., Tully, J., Chan, T. C., Castillo, E. M., Savage, S., Maysent, P., Hemmen, T. M.,
Clay, B. J., & Longhurst, C. A. (2023). Ransomware Attack Associated with Disruptions
at Adjacent Emergency Departments in the US. JAMA Network Open, 6(5), 2312270.
https://doi.org/10.1001/jamanetworkopen.2023.12270

Dasgupta, D., Akhtar, Z., & Sen, S. (2022). Machine Learning in Cybersecurity: A
Comprehensive Survey. Journal of Defense Modeling and Simulation, 19(1), 57–106.
https://doi.org/10.1177/1548512920951275
Enhancing Cybersecurity with AI Algorithms and Big Data Analytics...

Fathi, M., Haghi Kashani, M., Jameii, S. M., & Mahdipour, E. (2022). Big Data Analytics in
Weather Forecasting: A Systematic Review. Archives of Computational Methods in
Engineering, 29(2), 1247–1275. https://doi.org/10.1007/s11831-021-09616-4

Firat Kilincer, I., Ertam, F., Sengur, A., Tan, R. S., & Rajendra Acharya, U. (2023). Automated
Detection of Cybersecurity Attacks in Healthcare Systems with Recursive Feature
Elimination and Multilayer Perceptron Optimization. Biocybernetics and Biomedical
Engineering, 43(1), 30–41. https://doi.org/10.1016/j.bbe.2022.11.005

Georgiadis, G., & Poels, G. (2022). Towards a Privacy Impact Assessment Methodology to
Support the Requirements of the General Data Protection Regulation in a Big Data
Analytics Context: A Systematic Literature Review. Computer Law & Security Review,
44, 105640. https://doi.org/10.1016/j.clsr.2021.105640

Ghiasi, M., Niknam, T., Wang, Z., Mehrandezh, M., Dehghani, M., & Ghadimi, N. (2023). A
Comprehensive Review of Cyber-Attacks and Defense Mechanisms for Improving
Security in Smart Grid Energy Systems: Past, Present and Future. Electric Power Systems
Research, 215, 108975. https://doi.org/10.1016/j.epsr.2022.108975

Hassija, V., Chamola, V., Mahapatra, A., Singal, A., Goel, D., Huang, K., Scardapane, S.,
Spinelli, I., Mahmud, M., & Hussain, A. (2024). Interpreting Black-Box Models: A
Review on Explainable Artificial Intelligence. Cognitive Computation, 16(1), 45–74.
https://doi.org/10.1007/s12559-023-10179-8

Himeur, Y., Elnour, M., Fadli, F., Meskin, N., Petri, I., Rezgui, Y., Bensaali, F., & Amira, A.
(2023). AI-Big Data Analytics for Building Automation and Management Systems: A
Survey, Actual Challenges and Future Perspectives. Artificial Intelligence Review, 56(6),
4929–5021. https://doi.org/10.1007/s10462-022-10286-2

Kaur, J., & Ramkumar, K. R. (2022). The Recent Trends in Cyber Security: A Review. Journal
of King Saud University - Computer and Information Sciences, 34(8), 5766–5781.
https://doi.org/10.1016/j.jksuci.2021.01.018

Mmango, N., & Gundu, T. (2024). Cybersecurity as a Competitive Advantage for


Entrepreneurs. Communications in Computer and Information Science, 2159, 374–387.
https://doi.org/10.1007/978-3-031-64881-6_22

N. N. Misra, Manreet Singh Bhullar, Ahmad Al-Mallahi, Yash Dixit, Rohit Upadhyay, & Alex
Martynenko. (2022). IoT, Big Data, and Artificial Intelligence in Agriculture and Food
Industry. IEEE Internet of Things Journal, 9(9), 6305–6324.
https://doi.org/10.1109/jiot.2020.2998584

Santoso, J. T., Raharjo, B., & Wibowo, A. (2024). Combination of Alphanumeric Password and
Graphic Authentication for Cyber Security. Journal of Internet Services and Information
Security, 14(1), 16–36. https://doi.org/10.58346/jisis.2024.i1.002

Sarker, I. H. (2023). Machine Learning for Intelligent Data Analysis and Automation in
Cybersecurity: Current and Future Prospects. Annals of Data Science, 10(6), 1473–1498.
https://doi.org/10.1007/s40745-022-00444-2

294 Journal of Technology Informatics and Engineering (JTIE), Vol. 3 No. 3 December 2024
Journal of Technology Informatics and Engineering (JTIE)
Vol. 3 No. 3 December 2024
E-ISSN: 2961-9068; P-ISSN: 2961-8215, Pages 279-295

Sarker, I. H., Furhad, M. H., & Nowrozy, R. (2021). AI-Driven Cybersecurity: An Overview,
Security Intelligence Modeling and Research Directions. SN Computer Science, 2(3), 173.
https://doi.org/10.1007/s42979-021-00557-0

Shafiq, M., Gu, Z., Cheikhrouhou, O., Alhakami, W., & Hamam, H. (2022). The Rise of
“Internet of Things”: Review and Open Research Issues Related to Detection and
Prevention of IoT-Based Security Attacks. Wireless Communications and Mobile
Computing, 2022(1), 8669348. https://doi.org/10.1155/2022/8669348

Sharma, S. K., Al-Wanain, M. I., Alowaidi, M., & Alsaghier, H. (2024). Mobile Healthcare (m-
Health) Based on Artificial Intelligence in Healthcare 4.0. Expert Systems, 41(6), 13025.
https://doi.org/10.1111/exsy.13025

Sreedevi, A. G., Nitya Harshitha, T., Sugumaran, V., & Shankar, P. (2022). Application of
Cognitive Computing in Healthcare, Cybersecurity, Big Data And IoT: A Literature
Review. Information Processing and Management, 59(2), 102888.
https://doi.org/10.1016/j.ipm.2022.102888

Wang, J., Xu, C., Zhang, J., & Zhong, R. (2022). Big Data Analytics for Intelligent
Manufacturing Systems: A Review. Journal of Manufacturing Systems, 62, 738–752.
https://doi.org/10.1016/j.jmsy.2021.03.005

Wehbe, R. M., Sheng, J., Dutta, S., Chai, S., Dravid, A., Barutcu, S., Wu, Y., Cantrell, D. R.,
Xiao, N., Allen, B. D., MacNealy, G. A., Savas, H., Agrawal, R., Parekh, N., &
Katsaggelos, A. K. (2021). DeepCOVID-XR: An Artificial Intelligence Algorithm to
Detect COVID-19 on Chest Radiographs Trained and Tested on a Large U.S. Clinical
Data Set. Radiology, 299(1), 167–176. https://doi.org/10.1148/radiol.2020203511

Wei, K., Zang, H., Pan, Y., Wang, G., & Shen, Z. (2024). Strategic Application of AI Intelligent
Algorithm in Network Threat Detection and Defense. Journal of Theory and Practice of
Engineering Science, 4(1), 2024. https://doi.org/10.53469/jtpes.2024.04(01).07

You might also like