AI-Driven Intrusion Detection Systems: A Business Analyst’s Framework for Enhancing Enterprise Security and Intelligence
Main Article Content
Abstract
Nowadays, it is more than ever that enterprises must confront an increasing number of cybersecurity risks, which are caused by the complexity of cyberattacks, the expansion of digital properties, and the dependence on connected systems. The conventional intrusion detection systems (IDS) offer the basic level of protection but have a tendency to be constrained with fixed rule sets, false alarms, and lack the flexibility to meet the emergent threat patterns. Artificial intelligence (AI) has turned out to be a change agent in increasing the features of IDS because it is able to detect anomalies in real-time, model predictive behavior, and adapt to changing cyber threat activities.
In this article, the framework of a business analyst is introduced, which incorporates AI-powered IDS into enterprise security and intelligent strategies. In addition to technical efficiency, the framework also focuses on actionable insights and prioritization of risks and data-driven decision-making made by AI-enabled systems. Methodologically, the research design is a structured research design that uses AI modeling, comparison of IDS performance metrics and also integration with enterprise intelligence tools. The findings indicate that the accuracy of detection is improved significantly, less false alarms are witnessed, and the visibility of the threat landscapes are enhanced at the organizational level.
The results indicate the twofold usefulness of AI-based IDS: enhancing technical defenses on one side and strategic intelligence on the other side to serve enterprises. This paper, by comparing AI-optimized security services with the ideas of business analysts, highlights the possibilities of IDS to protect the digital infrastructure, as well as to enhance the resilience of the whole enterprise, compliance, and informed decision-making.
Article Details
Section
How to Cite
References
1. Anton, S. G., &Nucu, A. E. A. (2020). Enterprise Risk Management: A Literature Review and Agenda for Future Research. Journal of Risk and Financial Management, 13(11). https://doi.org/10.3390/jrfm13110281
2. Al-Haija, Q. A., &Ishtaiwi, A. (2021). Machine Learning Based Model to Identify Firewall Decisions to Improve Cyber-Defense. International Journal on Advanced Science, Engineering and Information Technology, 11(4), 1688–1695. https://doi.org/10.18517/ijaseit.11.4.14608
3. Du, L., Fan, Y., Zhang, L., Wang, L., & Sun, T. (2020). A summary of the development of cyber security threat intelligence sharing. International Journal of Digital Crime and Forensics, 12(4), 54–67. https://doi.org/10.4018/IJDCF.2020100105
4. Khajuria, Samant., Sørensen, Lene., &Skouby, K. Erik. (2017). Cybersecurity and Privacy - Bridging the Gap. Cybersecurity and Privacy (p. 240). Retrieved from http://www.forskningsdatabasen.dk/en/catalog/2398180542
5. Marquez-Tejon, J., Jimenez-Partearroyo, M., & Benito-Osorio, D. (2022). Security as a key contributor to organisational resilience: a bibliometric analysis of enterprise security risk management. Security Journal, 35(2), 600–627. https://doi.org/10.1057/s41284-021-00292-4
6. Mthiyane, Z. Z. F., van der Poll, H. M., &Tshehla, M. F. (2022). A Framework for Risk Management in Small Medium Enterprises in Developing Countries. Risks, 10(9). https://doi.org/10.3390/risks10090173
7. Medjek, F., Tandjaoui, D., Djedjig, N., &Romdhani, I. (2021). Fault-tolerant AI-driven Intrusion Detection System for the Internet of Things. International Journal of Critical Infrastructure Protection, 34. https://doi.org/10.1016/j.ijcip.2021.100436
8. Narsimha, B., Raghavendran, C. V., Rajyalakshmi, P., Kasi Reddy, G., Bhargavi, M., &Naresh, P. (2022). Cyber Defense in the Age of Artificial Intelligence and Machine Learning for Financial Fraud Detection Application. International Journal of Electrical and Electronics Research, 10(2), 87–92. https://doi.org/10.37391/IJEER.100206
9. Otoum, S., Kantarci, B., &Mouftah, H. (2021). A Comparative Study of AI-Based Intrusion Detection Techniques in Critical Infrastructures. ACM Transactions on Internet Technology, 21(4). https://doi.org/10.1145/3406093
10. Oliva, F. L. (2016). A maturity model for enterprise risk management. International Journal of Production Economics, 173, 66–79. https://doi.org/10.1016/j.ijpe.2015.12.007
11. Otero González, L., DuránSantomil, P., & Tamayo Herrera, A. (2020). The effect of Enterprise Risk Management on the risk and the performance of Spanish listed companies. European Research on Management and Business Economics, 26(3), 111–120. https://doi.org/10.1016/j.iedeen.2020.08.002
12. Ogundokun, R. O., Awotunde, J. B., Sadiku, P., Adeniyi, E. A., Abiodun, M., &Dauda, O. I. (2021). An Enhanced Intrusion Detection System using Particle Swarm Optimization Feature Extraction Technique. In Procedia Computer Science (Vol. 193, pp. 504–512). Elsevier B.V. https://doi.org/10.1016/j.procs.2021.10.052
13. Rege, M., &Mbah, R. (2018). Machine Learning for Cyber Defense and Attack. DATA ANALYTICS 2018 : The Seventh International Conference on Data Analytics Machine, 22(1), 7–14. Retrieved from https://www.nsa.gov/resources/everyone/digital-media-center/publications/the-next-wave/
14. Rosenberg, I., Shabtai, A., Elovici, Y., &Rokach, L. (2022, June 30). Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain. ACM Computing Surveys. Association for Computing Machinery. https://doi.org/10.1145/3453158
15. Singh, J., Wazid, M., Das, A. K., Chamola, V., &Guizani, M. (2022). Machine learning security attacks and defense approaches for emerging cyber physical applications: A comprehensive survey. Computer Communications, 192, 316–331. https://doi.org/10.1016/j.comcom.2022.06.012
16. Sarker, I. H., Furhad, M. H., &Nowrozy, R. (2021, May 1). AI-Driven Cybersecurity: An Overview, Security Intelligence Modeling and Research Directions. SN Computer Science. Springer. https://doi.org/10.1007/s42979-021-00557-0
17. Tschersich, T. (2017). Cybersecurity - What’s Next? In Management for Professionals (Vol. Part F602, pp. 101–112). Springer Nature. https://doi.org/10.1007/978-3-319-46529-6_11
18. van Haastrecht, M., Golpur, G., Tzismadia, G., Kab, R., Priboi, C., David, D., … Spruit, M. (2021). A shared cyber threat intelligence solution for smes. Electronics (Switzerland), 10(23). https://doi.org/10.3390/electronics10232913
19. Watney, M. M. (2020). Artificial intelligence and its’ legal risk to cybersecurity. In European Conference on Information Warfare and Security, ECCWS (Vol. 2020-June, pp. 398–405). Curran Associates Inc. https://doi.org/10.34190/EWS.20.026
20. Winkler, I., & Gomes, A. T. (2017). What Is Threat Intelligence? In Advanced Persistent Security (pp. 143–150). Elsevier. https://doi.org/10.1016/b978-0-12-809316-0.00012-9