1 Department of Mathematical Science, Adekunle Ajasin University, Ondo, Nigeria.
2 Department of Management Information Systems, Lamar University, Texas, USA.
3 Jack H. Brown College of Business & Public Administration, California State University, California, USA
4 Department of Mechanical Engineering, Georgia Southern University, Georgia, USA
International Journal of Science and Research Archive, 2025, 14(02), 1587-1597
Article DOI: 10.30574/ijsra.2025.14.2.0542
Received on 12 January 2025; revised on 22 February 2025; accepted on 25 February 2025
The increasing complexity and frequency of cyber threats have prompted organizations to seek more sophisticated defense mechanisms. Traditional signature-based methods and manual threat-hunting processes often fall short against evolving malware, zero-day exploits, and social engineering techniques. Artificial Intelligence (AI) and Machine Learning (ML) have emerged as pivotal tools, enabling automated threat detection, real-time anomaly analysis, and proactive incident response. This review synthesizes current research and practices related to AI-driven cybersecurity, examining supervised and unsupervised learning for threat detection, AI-powered anomaly detection, and real-world industrial applications. The discussion also explores ethical considerations such as adversarial AI and bias, concluding with future directions that include quantum-safe cryptography, AI-augmented security operations centers, and the integration of blockchain for enhanced cybersecurity.
Cybersecurity; Artificial Intelligence; Machine Learning; Deep Learning; Phishing
Preview Article PDF
Aminat Bolaji Bello, Akeem Olakunle Ogundipe, Awobelem A. George and Olabode Anifowose. The role of AI and machine learning in cybersecurity: Advancements in threat detection, anomaly detection and automated response. International Journal of Science and Research Archive, 2025, 14(02), 1587-1597. Article DOI: https://doi.org/10.30574/ijsra.2025.14.2.0542.
Copyright © 2025 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0







