Generative AI revolution in cybersecurity: a comprehensive review of threat intelligence and operations

<p dir="ltr">Cyber threats are increasingly frequent in today’s world, posing challenges for organizations and individuals to protect their data from cybercriminals. On the other hand, Generative Artificial Intelligence (GAI) technology offers an efficient way to automatically addres...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلف الرئيسي: Mueen Uddin (4903510) (author)
مؤلفون آخرون: Muhammad Saad Irshad (22466725) (author), Irfan Ali Kandhro (17541876) (author), Fuhid Alanazi (22466728) (author), Fahad Ahmed (825921) (author), Muhammad Maaz (5600600) (author), Saddam Hussain (3144783) (author), Syed Sajid Ullah (17541507) (author)
منشور في: 2025
الموضوعات:
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
الوصف
الملخص:<p dir="ltr">Cyber threats are increasingly frequent in today’s world, posing challenges for organizations and individuals to protect their data from cybercriminals. On the other hand, Generative Artificial Intelligence (GAI) technology offers an efficient way to automatically address these issues with the help of AI models and algorithms. It can work on more critical security aspects where human intervention is required and handle everyday threat situations autonomously. This research paper explores GAI in enhancing cybersecurity by leveraging AI Models and algorithms. GAI can autonomously address common security issues, detect novel threats, and augment human intervention in critical security aspects. Moreover, this research study also highlights autonomous security enhancements, improved security posture against emerging threats, anomaly detection, and threat response. Besides this, we have discussed the GAI limitations, such as occasional incorrect results, expensive training, and the potential for misuse by malicious actors for illegal activities. This research study also provides valuable insights into the balanced adoption of GAI in cybersecurity, ensuring effective threat migration without compromising system integrity.</p><h2>Other Information</h2><p dir="ltr">Published in: Artificial Intelligence Review<br>License: <a href="https://creativecommons.org/licenses/by/4.0" target="_blank">https://creativecommons.org/licenses/by/4.0</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1007/s10462-025-11219-5" target="_blank">https://dx.doi.org/10.1007/s10462-025-11219-5</a></p>