Impact Factor:6.549
 Scopus Suggested Journal: UNDER REVIEW for TITLE INCLUSSION

International Journal
of Computer Engineering in Research Trends (IJCERT)

Scholarly, Peer-Reviewed, Open Access and Multidisciplinary

Welcome to IJCERT

International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary

ISSN(Online):2349-7084                 Submit Paper    Check Paper Status    Conference Proposal

Back to Current Issues

Artificial Intelligence in Cyber Security: A Survey

Mohemmed Sha, Amir Kalbasi, , ,
1 : Department of Computer Science (Wadi Addawasir), Prince Sattam bin Abdulaziz University,saudi Arabia. ; 2 :Assistant Professor ,Department of Computer Engineering (Emeritus), Amirkabir University of Technology (Tehran Polytechnic),Tehran, Iran.

Cyber-attacks have outstripped the sector's financial and human capabilities for analyzing and combatting new cyber threats. With the growth of digital presence comes an increase in the amount of personal and financial information that must be safeguarded. Indeed, cyber-attacks have the potential to completely ruin an organization's brand. The goal of this research is to determine how artificial intelligence may be used to improve cyber security. In recent years, advances in artificial intelligence have overtaken human competency in activities such as data analytics. The research team conducted a systematic review of the current literature, using data from Google Scholar, Science Direct, Research Gates, and academic journals and publications. While using artificial intelligence to guard against cyber threats has significant limitations, the study concluded that the benefits outweigh the drawbacks. According to one expert, the speed and efficiency necessary to run AI systems will almost certainly result in an increase in customer and company cyber security. Traditional scanning engines are progressively taking the place of AI engines in cyber security.

Mohemmed Sha,Amir Kalbasi."Artificial Intelligence in Cyber Security: A Survey". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.9, Issue 10,pp.201-205, October - 2022, URL :,

Keywords : Deep Learning (DL), Artificial Intelligence (AI), Attacks, Machine Learning (ML), AI Engines, Security.

[1] S. Bhutada and P. Bhutada, Application of Artificial Intelligence in Cyber Security: in IJERCSE, 2018, 5(4): 214 219
[2] P.V. Alberto, lecture, Topic: Application of Artificial Intelligence (AI) to Network Security?, ITEC 625, University of Maryland, University College, Maryland, Mar. 2018.
[3] Avira, The Application of AI to Cybersecurity An Avira White Paper, Germany, Avira Operation, 2017.
[4] S. A Panimalar, U.G. Pai and K.S. Khan, ?AI Techniques for Cyber Security?, International Research Journal of Engineering and Technology, vol. 5, 3, pp. 122 124, Mar. 2018. Available: [assessed May. 29, 2020]
[5] T.S. Tuang. Diep.Q. B, and Zelinka. I, Artificial Intelligence in the Cyber Domain: Offense and Defense: Symmetry, 2020, 12,410 available: on [assessed Apr. 20, 2020]
[6] E. Kanal, Machine Learning in Cybersecurity: Carnegie Mellon University Software Engineering Institute, available on
[7] D. Selma, C. Huseyin and A. Mustafa, Application of Artificial Intelligence Techniques to Combating Cyber Crimes: A Review, International Journal of Artificial Intelligence &Applications, vol. 6, issue 1, pp. 21 39, January 2015.
[8] T. Enn, ?Artificial Intelligence in Cyber Defense?, in Proceedings of 3rd International Conference on Cyber Conflicts [ICCC], 7--10 June, 2011 Tallin Estonia.
[9] P. Dennis, A. Stuart, ?Global Challenges: Twelve risks that threaten human civilization, Global Challenges Foundation?: 2015,Available: /wp--content/ uploads/12--Risks--with--infinite--impact.pdf [accessed Jun. 3, 2020]
[10] R. Stuart, D. Daniel, T. Max, ??Research Priorities for Robust and Beneficial Artificial Intelligence‘‘, AI Magazine, vol. 36, issue 4, pp. 105--114, Winter 2015
[11] National Science & Technology Council, ?Artificial Intelligence and Cybersecurity: Opportunities and Challenges? Net. & Info.Tech R&D Sub--comtt and the ML & AI Sub--comtt, 2020.
[12] A. M. Shamiulla, Role of Artificial Intelligence in Cyber Security, International Journal of Innovative Technology and Exploring Engineering, vol. 9 issue 1 pp. 4628--4630, November 2019
[13] P. Pranav, ?Artificial Intelligence in cyber security?, International Journal of Research in Computer Applications & Robotics, vol 4, 1, pp.1--5, May 2016
[14] J. Kivimaa, A. Ojamaa, E. Tyugu. Graded Security Expert System. Lecture Notes in Computer Science, v. 5508. Springer, 2009, 279--286.
[15] B. Christain, D.A. Elizondo and T. Watson, ?Application of artificial neural networks and related techniques to intrusion detection?, World Congress on Computation Intelligence, pp 949--954, 2010
[16] E. Tyugu, ?Artificial Intelligence in Cyber Defense?, International conference on Cyber Conflict, vol. 3, pp. 95--105, Tallinn, Estonia, Jan. 2011
[17] W. Nadine and K. Hadas, ?Artificial Intelligence in Cybersecurity?, Cyber, Intelligence, and Security, vol. 1, 1, pp. 103--119, Jan. 2017
[18] S. Dima, M. Robert, B. Zvi, S. Shahar and E. Yuval, ?Using Artificial Neural Network to Detect Unknown Computer Worms?, Neural Computing and Applications, vol.18, 7, pp. 663--674, Oct. 2009
[19] E. H. Geoffrey, O. Simon and T. Yee--Whye, ?A Fast Learning Algorithm for Deep Belief Nets?, Neural Computation, vol. 18, no. 7, pp. 1527--1554, 2006
[20] V. Thomson, ?Cyber Attacks Could be Predicted with Artificial Intelligence?, iTechPost, 7/cyber-attacks--predicted--artificial--intelligen ce--help.htm, Apr. 21, 2016 [Jun. 2, 2020]
[21] S. Franklin and A. Graesser, ?Is It an Agent, or Just a Program? A Taxonomy for Autonomous Agents?, Third International Workshop on Agent Theories, Architectures, and Languages, no. 3, pp. 21--35, 1997
[22] Y. Xia and L. Junshan, ?A Security Architecture Based on Immune Agents for MANET?, International Conference on Wireless Communication and Sensor Computing, no. , pp. 1--5, 2010
[23] M. F. AbRazak, etal, ?Bio--inspired for features optimization and malware detection.Arabian Journal of Science and Engineering, no. 43, pp. 6963––6979. 2018
[24] A. Fatima, etal, ?Android Malware Detection Using Genetic Algorithm based Optimized Feature Selection and Machine Learning?, In Proceedings of the 42nd International Conference on Telecommunications and Signal Processing (TSP), Budapest, Hungary, 1––3 July 2019; pp. 220––223.
[25] R.A.R Ashfaq, etal, ?Fuzziness based semi--supervised learning approach for intrusion detection system?. Inf. Sci. 2017, 378, 484––497.
[26] L. Lazic, ?Benefits from AI in Cyber Security?, The 11th international Conference on Business Information Security, 18th Oct. 2019, Belgrade, Serbia, pp. 1—9

DOI Link :

Download :

Refbacks : Currently there are no Refbacks


Authors are not required to pay any article-processing charges (APC) for their article to be published open access in Journal IJCERT. No charge is involved in any stage of the publication process, from administrating peer review to copy editing and hosting the final article on dedicated servers. This is free for all authors. 

News & Events

Latest issue :Volume 10 Issue 1 Articles In press

A plagiarism check will be implemented for all the articles using world-renowned software. Turnitin.

Digital Object Identifier will be assigned for all the articles being published in the Journal from September 2016 issue, i.e. Volume 3, Issue 9, 2016.

IJCERT is a member of the prestigious.Each of the IJCERT articles has its unique DOI reference.
DOI Prefix : 10.22362/ijcert

IJCERT is member of The Publishers International Linking Association, Inc. (“PILA”)

Emerging Sources Citation Index (in process)

IJCERT title is under evaluation by Scopus.

Key Dates

☞   LAST DATE OF SUBMISSION : 31st March 2023
In 7 Days

Important Announcements

All the authors, conference coordinators, conveners, and guest editors kindly check their articles' originality before submitting them to IJCERT. If any material is found to be duplicate submission or sent to other journals when the content is in the process with IJCERT, fabricated data, cut and paste (plagiarized), at any stage of processing of material, IJCERT is bound to take the following actions.
1. Rejection of the article.
2. The author will be blocked for future communication with IJCERT if duplicate articles are submitted.
3. A letter regarding this will be posted to the Principal/Director of the Institution where the study was conducted.
4. A List of blacklisted authors will be shared among the Chief Editors of other prestigious Journals
We have been screening articles for plagiarism with a world-renowned tool: Turnitin However, it is only rejected if found plagiarized. This more stern action is being taken because of the illegal behavior of a handful of authors who have been involved in ethical misconduct. The Screening and making a decision on such articles costs colossal time and resources for the journal. It directly delays the process of genuine materials.

Citation Index

Citations Indices All
Citations 1026
h-index 14
i10-index 20
Source: Google Scholar

Acceptance Rate (By Year)

Acceptance Rate (By Year)
Year Rate
2021 10.8%
2020 13.6%
2019 15.9%
2018 14.5%
2017 16.6%
2016 15.8%
2015 18.2%
2014 20.6%

Important Links

Conference Proposal