The Role of Artificial Intelligence in Dealing with Advanced Cyber Attacks: A Comparative Study of Algorithms

Authors

  • Sabreen ali Hussein University of Babylon / College of Basic Education Author
  • Aseel hamoud Hamza University of Babylon / College of Law Author
  • Suhad Al-Shoukry Middle Euphrates Technical University, Najaf Technical Institute Author

DOI:

https://doi.org/10.25130/jfa.conf.10.5.1

Keywords:

Artificial Intelligence, Cyber Attacks, Intrusion Detection Systems, Machine Learning and Deep Learning, Artificial Neural Networks

Abstract

The digital world is witnessing an unprecedented escalation in the extent and development of cyber attacks, which requires more intelligent security solutions that adapt to the constantly changing technological environment. This research aims to explore the effective role of artificial intelligence technologies, especially machine learning algorithms, in dealing with advanced cyber attacks, such as intelligent phishing attacks, advanced malicious software, and zero-day attacks. The digital world is witnessing an unprecedented escalation in the extent and development of cyber attacks, which requires more intelligent security solutions that adapt to the constantly changing technological environment. This research aims to explore the effective role of artificial intelligence technologies, especially machine learning algorithms, in dealing with advanced cyber attacks, such as attacks on the Day of Zero, intelligent phishing attacks, advanced malware.

The research is based on a comparison method between a variety of smart algorithms used in intrusion detection systems (IDS), such as decision trees, artificial neural networks (ANN), support vectors (SVM), and deep learning algorithms. Estimating the performance of these algorithms according to the criteria of accuracy, detection rate, false alarm rate, 

Downloads

Download data is not yet available.

References

[1] "Machine learning (ML) in cybersecurity”. Sep 2023. [Online]. Available: https://www.sailpoint.com/identity-library/how-ai-and-machine-learning-are-improving-cybersecurity

[2] Patrick K. Gikunda, R. Kimanzi, P. Kimanga and D. Cherori. "Deep Learning Algorithms Used in Intrusion Detection Systems - A Review". Feb 2024. [Online]. Available: https://arxiv.org/html/2402.17020v1

[3] N. Veselinović, M. Milašinović, M. Jovanović, A. Aleksić and N. Biga. "Countering Cybersecurity Threats with AI". Mar 2022. [Online]. Available: https://ceur-ws.org/Vol-3529/short_8.pdf

[4] Y. Xin, L. Kong, Z. Liu, Y. Chen, Y. Li and H. Zhu. "Machine Learning and Deep Learning Methods for Cybersecurity". (accessed Apr 06, 2025). [Online]. Available: https://ieeexplore.ieee.org/document/8359287

[5] "What Are the Risks and Benefits of Artificial Intelligence (AI) in Cybersecurity?". Apr 2025. [Online]. Available: https://www.paloaltonetworks.com/cyberpedia/ai-risks-and-benefits-in-cybersecurity

[6] U. Ahmed, M. Nazir, A. Sarwar, T. Ali, El-Hadi M. Aggoune, T. Shahzad and M. A. Khan. "Signature-based intrusion detection using machine learning and deep learning approaches empowered with fuzzy clustering". Jan 2025. [Online]. Available: https://www.nature.com/articles/s41598-025-85866-7

[7] M. Hammad, N. Hewahi and W. Elmedany. "T-SNERF: A novel high accuracy machine learning approach for Intrusion Detection Systems". Mar 2021. [Online]. Available: https://ietresearch.onlinelibrary.wiley.com/doi/10.1049/ise2.12020

[8] Sowmya T. and Mary Anita E.A.. "A comprehensive review of AI based intrusion detection system". Jan 2023. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S2665917423001630

[9] R. Chinnasamy, M. Subramanian, S. V. Easwaramoorthy and J. Cho. "Deep learning-driven methods for network-based intrusion detection systems: A systematic review". Jan 2025. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S2405959525000050

[10] J. Khan, R. Elfakharany, H. Saleem, M. Pathan, E. Shahzad, S. Dhou and F. Aloul. "Can Machine Learning Enhance Intrusion Detection to Safeguard Smart City Networks from Multi-Step Cyberattacks?". Jan 2025. [Online]. Available: https://www.mdpi.com/2624-6511/8/1/13

[11] Z. Azam, Md. Motaharul Islam and M. N. Huda. "Comparative Analysis of Intrusion Detection Systems and Machine Learning-Based Model Analysis Through Decision Tree". (accessed Apr 06, 2025). [Online]. Available: https://ieeexplore.ieee.org/document/10185955/

[12] G. Apruzzese, L. Ferretti, M. Marchetti, M. Colajanni and A. Guido. "On the Effectiveness of Machine and Deep Learning for Cyber Security". May 2018. [Online]. Available: https://www.ccdcoe.org/uploads/2018/10/Art-19-On-the-Effectiveness-of-Machine-and-Deep-Learning-for-Cyber-Security.pdf

[13] S. A. R. Shah and B. Issac. "Performance comparison of intrusion detection systems and application of machine learning to Snort system". Jan 2018. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0167739X17323178

[14] S. A. R. Shah and B. Issac. "Performance Comparison of Intrusion Detection Systems and Application of Machine Learning to Snort System". Oct 2017. [Online]. Available: https://arxiv.org/abs/1710.04843

[15] IMI. "Artificial Intelligence Cyber Intrusions". Jul 2023. [Online]. Available: https://identitymanagementinstitute.org/artificial-intelligence-cyber-intrusions/

[16] A. Khraisat, I. Gondal, P. Vamplew and J. Kamruzzaman. "Survey of intrusion detection systems: techniques, datasets and challenges". Jul 2019. [Online]. Available: https://cybersecurity.springeropen.com/articles/10.1186/s42400-019-0038-7

[17] M. Macas, C. Wu and W. Fuertes. "A survey on deep learning for cybersecurity: Progress, challenges, and opportunities". Jul 2022. [Online]. Available: https://www.sciencedirect.com/science/article/abs/pii/S1389128622001864

[18] C. Goodman. "AI in Cybersecurity: Transforming Threat Detection and Prevention". Jan 2025. [Online]. Available: https://www.balbix.com/insights/artificial-intelligence-in-cybersecurity/

[19] N. Thapa, Z. Liu, Dukka B. KC, B. Gokaraju and K. Roy. "Comparison of Machine Learning and Deep Learning Models for Network Intrusion Detection Systems". Sep 2020. [Online]. Available: https://www.mdpi.com/1999-5903/12/10/167

[20] "What is Deep Learning? | Deep Instinct". Jun 2022. [Online]. Available: https://www.deepinstinct.com/glossary/deep-learning

[21] Traci Gusher ,”EY Americas AI and Data”, Jan 2024 . Available: https://www.ey.com/en_us/insights/cybersecurity/ai-and-ml-are-cybersecurity-problems-and-solutions

Downloads

Published

2026-03-07

How to Cite

The Role of Artificial Intelligence in Dealing with Advanced Cyber Attacks: A Comparative Study of Algorithms. (2026). Journal of Al-farahidi’s Arts, 10(5), 1-24. https://doi.org/10.25130/jfa.conf.10.5.1