Skip to main navigation menu Skip to main content Skip to site footer
Submitted January 28, 2025
Published 2025-01-30

Artículos

Vol. 12 No. 1 (2025): Revista Colón Ciencias, Tecnología y Negocios

Introduction to Artificial Intelligence and Machine Learning in Cybersecurity Abimelec Antek Arias Ariza1, Miguel Vargas-Lombardo


DOI https://doi.org/10.48204/j.colonciencias.v12n1.a6824

Cover image

References
DOI: 10.48204/j.colonciencias.v12n1.a6824

Published: 2025-01-30

How to Cite

Arias Ariza, A. A., & Vargas-Lombardo, M. (2025). Introduction to Artificial Intelligence and Machine Learning in Cybersecurity Abimelec Antek Arias Ariza1, Miguel Vargas-Lombardo. Revista Colón Ciencias, Tecnología Y Negocios, 12(1), 32–48. https://doi.org/10.48204/j.colonciencias.v12n1.a6824

Abstract

Cybersecurity plays a vital role in protecting digital assets and the privacy of individuals in the information age. In this context, artificial intelligence (AI) and machine learning (ML) have emerged as powerful tools to improve the detection and prevention of cyber threats. This article analyzes the use of AI and ML in cybersecurity, examining its historical evolution, advantages and limitations, as well as its social impact and ethical considerations.  A review of scientific and technical literature is carried out using keywords "Artificial Intelligence in cybersecurity", "Machine Learning in computer security" and "AI and ML in threat detection" in the IEEE Xplore, ScienceDirect and ACM Digital Library databases, selecting 30 useful references from a total of 150 articles identified. A questionnaire was applied to 12 systems engineers from various companies in the country who have at least a master's degree in cybersecurity in order to find out if they can implement the PICOC technique in cybersecurity environments.  Artificial intelligence and machine learning have revolutionized cybersecurity by allowing the automated detection of threats, the analysis of abnormal behavior, and the generation of faster and more accurate responses to potential cyber-attacks.

Downloads

Download data is not yet available.