Advanced AI-Powered Intrusion Detection Systems in Cybersecurity Protocols for Network Protection
Conventional rule-based network intrusion detection systems (NIDS) find it difficult to remain with the increasing complexity of cyber-attacks. To solve these issues, this study examines the development of NIDS as well as the transformative potential of artificial intelligence (AI). AI-enhanced NIDS...
Uloženo v:
| Vydáno v: | Procedia computer science Ročník 259; s. 140 - 149 |
|---|---|
| Hlavní autoři: | , , , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Elsevier B.V
2025
|
| Témata: | |
| ISSN: | 1877-0509, 1877-0509 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Shrnutí: | Conventional rule-based network intrusion detection systems (NIDS) find it difficult to remain with the increasing complexity of cyber-attacks. To solve these issues, this study examines the development of NIDS as well as the transformative potential of artificial intelligence (AI). AI-enhanced NIDS can efficiently identify and respond to known and unknown threats in real-time by utilizing machine learning (ML) techniques. The system can differentiate between typical network behavior and abnormalities using both supervised and unsupervised learning techniques, as opposed to depending exclusively on pre-established rules. The accuracy and adaptability of the system are further improved by deep learning (DL) architectures like recurrent neural networks (RNNs) and convolutional neural networks (CNNs). The paper explores the past developments of intrusion detection, comparing rule-based approaches to modern AI-driven systems. It discusses cutting-edge techniques like anomaly detection, ensemble methods, and hybrid models. While Recognizing issues such as adversarial attacks and interpretability, the article underlines the importance of AI-enhanced NIDS in protecting digital infrastructure. This study provides a complete overview, unique insights, and practical advice for cybersecurity experts looking to install and optimize AI-powered intrusion detection solutions. |
|---|---|
| ISSN: | 1877-0509 1877-0509 |
| DOI: | 10.1016/j.procs.2025.03.315 |