|

An overview of defensive and offensive artificial intelligence in cybersecurity

Authors: Amanatidi V.S., Glinskaya E.V.
Published in issue: #5(100)/2025
DOI:


Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security

Keywords: artificial intelligence, machine learning, artificial intelligence-based cyber defense systems, competitive artificial intelligence, development methodology, reinforcement learning, vulnerabilities
Published: 17.10.2025

Currently, we can observe the process of integrating artificial intelligence (AI) into all areas of information technology. Cybersecurity, of course, is no exception: organizations use AI to strengthen their defenses, but at the same time, attackers use it to create new-generation cyberattacks that are becoming increasingly resistant to traditional security systems based on heuristics and signatures. This fact indicates the need for the emergence and widespread implementation of adaptive protection and proactive measures to eliminate potential consequences. The article considers and analyzes the types of AI in cybersecurity, their goals. It also presents a methodology for developing AI-based protection systems.


References

[1] Malatji M., Tolah A. Artificial intelligence (AI) cybersecurity dimensions: a comprehensive framework for understanding adversarial and offensive AI. AI and Ethics, 2024. https://doi.org/10.1007/s43681-024-00427-4

[2] Sun N., Ding M., Jiang J. et al. Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives. IEEE Communications Surveys & Tutorials, 2023, vol. 25, no. 3, p. 1748–1774. https://doi.org/10.1109/comst.2023.3273282

[3] Klopper Ch., Eloff Ja.H.P. Data Fingerprinting and Visualization for AI-Enhanced Cyber-Defence Systems. IEEE Access, 2024, vol. 12, p. 154054–154065. https://doi.org/10.1109/access.2024.3482728

[4] Afanasyev N.S., Chesnov A.E. The process of applying machine learning in the field of cyberspace security. Current Scientific Research in the Modern World, 2021, No. 7-2 (75), pp. 84-90. (In Russ.).

[5] Reznichenko S.A., Kuptsova E.S., Belalov M.R. The use of machine learning in information security audit. Journal of High Humanitarian Technologies, 2024, No. 2 (5), pp. 6-14. (In Russ.).

[6] Paracha A., Arshad Ju., Farah M.B., Ismail Kh. Machine learning security and privacy: a review of threats and countermeasures. EURASIP Journal on Information Security, 2024, vol. 2024, no. 1. https://doi.org/10.1186/s13635-024-00158-3

[7] Mirsky Y., Demontis A., Kotak Ja. et al. The Threat of Offensive AI to Organizations. Computers & Security, 2023, vol. 124, art. no. 103006. https://doi.org/10.1016/j.cose.2022.103006

[8] Muheidat F., Mallouh M.A., Al-Saleh O. et al. Applying AI and Machine Learning to Enhance Automated Cybersecurity and Network Threat Identification. Procedia Computer Science, 2024, vol. 251, pp. 287-294. https://doi.org/10.1016/j.procs.2024.11.112

[9] Gribunin V.G., Kondakov S.E. On the issue of information protection in intellectualized weapons models. Cybersecurity Issues, 2021, No. 5 (45), pp. 5-11. (In Russ.). https://doi.org/10.21681/2311-3456-2021-5-5-11

[10] Palani K., Kethar J., Prasad S., Torremocha V. Impact of AI and Generative AI in transforming Cybersecurity. Journal of Student Research, 2024, vol. 13, no. 2. https://doi.org/10.47611/jsrhs.v13i2.6710