Artificial Intelligence in Predictive Cybersecurity: Developing Adaptive Algorithms to Combat Emerging Threats
DOI:
https://doi.org/10.33050/corisinta.v2i1.55Keywords:
Artificial Intelligence, Predictive Cybersecurity, Adaptive Algorithms, Cyber Threats, Emerging ThreatsAbstract
The exponential growth of digital systems has introduced significant cybersecurity challenges, exposing vulnerabilities to increasingly sophisticated threats. Traditional security measures, which rely on static and signature-based methods, often fail to adapt to the dynamic nature of cyberattacks, highlighting the need for innovative solutions. This study aims to develop and evaluate adaptive algorithms in predictive cybersecurity, leveraging Artificial Intelligence (AI) to combat emerging threats such as zero-day exploits and advanced persistent threats (APTs). A simulation-based research design was employed, integrating reinforcement learning frameworks like Deep Q-Learning and utilizing datasets such as CICIDS2017 and synthetic data for zero-day threat simulations. The results show that adaptive algorithms achieved 94.8% detection accuracy, reduced false positives by 54.5%, and improved response times by 53.1%, significantly outper forming static models. Additionally, the adaptive systems demonstrated superiorcapacity to identify novel threats in simulated attack scenarios. These findings underscore the potential of adaptive AI algorithms to revolutionize predictive cybersecurity by offering dynamic, real-time responses to evolving threats. Despite their computational demands posing challenges for smaller organizations, integrating techniques such as adversarial training and robust anomaly detection can enhance resilience. That adaptive algorithms can enhance the resilience and reliability of cybersecurity systems, advocating for future integration with technologies like blockchain and edge computing to address scalability and latency issues. These advancements pave the way for more robust and proactive cybersecurity defenses in an increasingly interconnected digital landscape.
References
B. R. Maddireddy and B. R. Maddireddy, “Evolutionary algorithms in ai-driven cybersecurity solutions
for adaptive threat mitigation,” International Journal of Advanced Engineering Technologies and Innova-
tions, vol. 1, no. 2, pp. 17–43, 2021.
A. Mumtaz and H. Liu, “Evolutionary algorithms and ai in cybersecurity: Adaptive threat mitigation
strategies using big data and iot,” 2021.
S. Rangaraju, “Ai sentry: Reinventing cybersecurity through intelligent threat detection,” EPH-
International Journal of Science And Engineering, vol. 9, no. 3, pp. 30–35, 2023.
O. U. Khan, S. M. Abdullah, A. O. Olajide, A. I. Sani, S. M. W. Faisal, A. A. Ogunola, and M. D. Lee,
“The future of cybersecurity: Leveraging artificial intelligence to combat evolving threats and enhance
digital defense strategies,” Journal of Computational Analysis and Applications, vol. 33, no. 8, 2024.
A. R. P. Reddy, “The role of artificial intelligence in proactive cyber threat detection in cloud environ-
ments,” NeuroQuantology, vol. 19, no. 12, pp. 764–773, 2021.
M. Rizvi, “Enhancing cybersecurity: The power of artificial intelligence in threat detection and preven-
tion,” International Journal of Advanced Engineering Research and Science, vol. 10, no. 5, pp. 055–060,
H. Raza, “Proactive cyber defense with ai: Enhancing risk assessment and threat detection in cybersecu-
rity ecosystems,” Journal Name Missing, 2021.
A. Manoharan and M. Sarker, “Revolutionizing cybersecurity: Unleashing the power of artifi-
cial intelligence and machine learning for next-generation threat detection,” DOI: https://www. doi.
org/10.56726/IRJMETS32644, vol. 1, 2023.
Y. Weng and J. Wu, “Leveraging artificial intelligence to enhance data security and combat cyber attacks,”
Journal of Artificial Intelligence General science (JAIGS) ISSN: 3006-4023, vol. 5, no. 1, pp. 392–399,
R. H. Chowdhury, N. U. Prince, S. M. Abdullah, and L. Mim, “The role of predictive analytics in cyber-
security: Detecting and preventing threats,” World Journal of Advanced Research and Reviews, vol. 23,
no. 2, pp. 1615–1623, 2024.
J. Jones, E. Harris, Y. Febriansah, A. Adiwijaya, and I. N. Hikam, “Ai for sustainable development: Appli-
cations in natural resource management, agriculture, and waste management,” International Transactions
on Artificial Intelligence, vol. 2, no. 2, pp. 143–149, 2024.
A. B´ecue, I. Prac¸a, and J. Gama, “Artificial intelligence, cyber-threats and industry 4.0: Challenges and
opportunities,” Artificial Intelligence Review, vol. 54, no. 5, pp. 3849–3886, 2021.
A. Nassar and M. Kamal, “Machine learning and big data analytics for cybersecurity threat detection: A
holistic review of techniques and case studies,” Journal of Artificial Intelligence and Machine Learning
in Management, vol. 5, no. 1, pp. 51–63, 2021.
N. G. Camacho, “The role of ai in cybersecurity: Addressing threats in the digital age,” Journal of Artifi-
cial Intelligence General science (JAIGS) ISSN: 3006-4023, vol. 3, no. 1, pp. 143–154, 2024.
A. N. Raji, A. O. Olawore, A. Ayodeji, and J. Joseph, “Integrating artificial intelligence, machine learning,
and data analytics in cybersecurity: A holistic approach to advanced threat detection and response,” 2023.
R. Gupta and P. Srivastava, “Artificial intelligence and machine learning in cyber security applications,”
in Cyber Security Solutions for Protecting and Building the Future Smart Grid. Elsevier, 2025, pp.
–296.
O. C. Obi, O. V. Akagha, S. O. Dawodu, A. C. Anyanwu, S. Onwusinkwue, and I. A. I. Ahmad, “Com-
prehensive review on cybersecurity: modern threats and advanced defense strategies,” Computer Science
& IT Research Journal, vol. 5, no. 2, pp. 293–310, 2024.
F. Ekundayo, I. Atoyebi, A. Soyele, and E. Ogunwobi, “Predictive analytics for cyber threat intelligence
in fintech using big data and machine learning,” Int J Res Publ Rev, vol. 5, no. 11, pp. 1–15, 2024.
U. Raharja, Y. P. Sanjaya, T. Ramadhan, E. A. Nabila, and A. Z. Nasution, “Revolutionizing tourism in
smart cities: Harnessing the power of cloud-based iot applications,” CORISINTA, vol. 1, no. 1, pp. 41–52,
S. Malik, P. K. Malik, and A. Naim, “Opportunities and challenges in new generation cyber security appli-
cations using artificial intelligence, machine learning and block chain,” Next-Generation Cybersecurity:
AI, ML, and Blockchain, pp. 23–37, 2024.
D. Manongga, U. Rahardja, I. Sembiring, Q. Aini, and A. Wahab, “Improving the air quality monitor-
ing framework using artificial intelligence for environmentally conscious development,” HighTech and
Innovation Journal, vol. 5, no. 3, pp. 794–813, 2024.
P. Bibi, “Artificial intelligence in cybersecurity: Revolutionizing database management for enhanced pro-
tection,” 2022.
M. Ozkan-Okay, E. Akin, ¨O. Aslan, S. Kosunalp, T. Iliev, I. Stoyanov, and I. Beloev, “A comprehen-
sive survey: Evaluating the efficiency of artificial intelligence and machine learning techniques on cybersecurity solutions,” IEEe Access, vol. 12, pp. 12 229–12 256, 2024.
B. P. Sharma, “Evaluating the role of artificial intelligence in enhancing cyber threat detection and re-
sponse mechanisms,” Journal of Digital Transformation, Cyber Resilience, and Infrastructure Security,
vol. 8, no. 12, pp. 1–10, 2024.
M. Brundage, S. Avin, J. Clark, H. Toner, P. Eckersley, B. Garfinkel, A. Dafoe, P. Scharre, T. Zeitzoff,
B. Filar et al., “The malicious use of artificial intelligence: Forecasting, prevention, and mitigation,” arXiv
preprint arXiv:1802.07228, 2018.
E. Guustaaf, U. Rahardja, Q. Aini, H. W. Maharani, and N. A. Santoso, “Blockchain-based education
project,” Aptisi Transactions on Management, vol. 5, no. 1, pp. 46–61, 2021.
D. Arora, P. Tyagi, P. Dadhich et al., “Exploring the impact of artificial intelligence on cyber security:
Challenges, opportunities, and future trends,” 2024.
F. Tao, M. S. Akhtar, and Z. Jiayuan, “The future of artificial intelligence in cybersecurity: A comprehen-
sive survey,” EAI Endorsed Transactions on Creative Technologies, vol. 8, no. 28, pp. e3–e3, 2021.
M. Malatji and A. Tolah, “Artificial intelligence (ai) cybersecurity dimensions: a comprehensive frame-
work for understanding adversarial and offensive ai,” AI and Ethics, pp. 1–28, 2024.
H. Hussain, M. Kainat, T. Ali et al., “Leveraging ai and machine learning to detect and prevent cyber
security threats,” Dialogue Social Science Review (DSSR), vol. 3, no. 1, pp. 881–895, 2025.


