Research Article

AI-Powered Vulnerability Detection and Adaptive Defense Strategies in Cybersecurity

Volume: 8 Number: 3 September 30, 2025
EN

AI-Powered Vulnerability Detection and Adaptive Defense Strategies in Cybersecurity

Abstract

Cybersecurity threats are becoming increasingly complex and sophisticated. These challenges highlight the growing need for organizations and individuals to safeguard their digital assets. In this context, artificial intelligence (AI) technologies offer substantial capabilities to detect and mitigate cybersecurity vulnerabilities. AI enables effective protection by performing deep analyses on large datasets to identify abnormal activities and predict potential threats. By transforming traditional security paradigms, AI contributes to faster and more adaptive responses against cyberattacks. Furthermore, AI’s ability to classify threats and respond in real time gives security professionals a strategic edge. In the following sections, the role of AI in identifying and addressing cybersecurity vulnerabilities will be examined in detail, supported by current real-world applications. Finally, the paper will explore the future of AI in cybersecurity and potential directions for further enhancement.

Keywords

Ethical Statement

This study does not involve any personal data. All analyses were conducted using the publicly available CICIDS2017 dataset. Therefore, ethical approval is not required. The dataset used was anonymized and made freely available for research purposes by the Communications Security Establishment (CSE) and the Canadian Institute for Cybersecurity (CIC) in Canada.

Thanks

We would like to thank the Canadian Institute for Cybersecurity (CIC) and the Communications Security Establishment (CSE) for providing the publicly available dataset used in this study. We also express our gratitude to all researchers who contributed academically and to the communities developing open-source tools that made this work possible.

References

  1. N. G. Camacho, “The Role of AI in Cybersecurity: Addressing Threats in the Digital Age,” J. Artif. Intell. Gen. Sci. (JAIGS), vol. 3, no. 1, pp. 143–154, 2024.
  2. N. Mohamed, "Artificial intelligence and machine learning in cybersecurity: a deep dive into state-of-the-art techniques and future paradigms," Knowledge and Information Systems, 2025. [Online]. Available: https://doi.org/10.1007/s10115-025-02429-y.
  3. K. M. Roba Abbas, J. Pitt, K. M. Vogel, and M. Zafeirakopoulos, “Artificial Intelligence (AI) in Cybersecurity: a socio-technical research roadmap,” 2022. [Online]. Available: https://www.turing.ac.uk/sites/default/files/2023-11/ai_in_cybersecurity.pdf
  4. N. Mohamed, “Current trends in AI and ML for cybersecurity: A state-of-the-art survey,” Cogent Eng., vol. 10, no. 2, 2023.
  5. M. I. Alghamdi, “Survey on Applications of Deep Learning and Machine Learning Techniques for Cyber Security,” Int. J. Interact. Mob. Technol., vol. 14, no. 16, 2020.
  6. S. Ali, S. U. Rehman, A. Imran, G. Adeem, Z. Iqbal, and K.-I. Kim, “Comparative Evaluation of AI-Based Techniques for Zero-Day Attacks Detection,” Electronics, vol. 11, no. 23, p. 3934, 2022.
  7. S. Zeadally, E. Adi, Z. Baig, and I. A. Khan, “Harnessing Artificial Intelligence Capabilities to Improve Cybersecurity,” IEEE Access, vol. 8, pp. 23817–23837, 2020.
  8. M. Tayyab, M. Marjani, N. Z. Jhanjhi, I. A. T. Hashem, R. S. A. Usmani, and F. Qamar, “A comprehensive review on deep learning algorithms: Security and privacy issues,” Comput. Secur., vol. 131, p. 103297, 2023.

Details

Primary Language

English

Subjects

Software Testing, Verification and Validation

Journal Section

Research Article

Early Pub Date

September 29, 2025

Publication Date

September 30, 2025

Submission Date

June 2, 2025

Acceptance Date

July 5, 2025

Published in Issue

Year 2025 Volume: 8 Number: 3

APA
Kara, Ş., İlkbahar, F., & Gündüz, M. Z. (2025). AI-Powered Vulnerability Detection and Adaptive Defense Strategies in Cybersecurity. Sakarya University Journal of Computer and Information Sciences, 8(3), 536-552. https://doi.org/10.35377/saucis.8.94717.1711704
AMA
1.Kara Ş, İlkbahar F, Gündüz MZ. AI-Powered Vulnerability Detection and Adaptive Defense Strategies in Cybersecurity. SAUCIS. 2025;8(3):536-552. doi:10.35377/saucis.8.94717.1711704
Chicago
Kara, Şahin, Fatih İlkbahar, and Muhammed Zekeriya Gündüz. 2025. “AI-Powered Vulnerability Detection and Adaptive Defense Strategies in Cybersecurity”. Sakarya University Journal of Computer and Information Sciences 8 (3): 536-52. https://doi.org/10.35377/saucis.8.94717.1711704.
EndNote
Kara Ş, İlkbahar F, Gündüz MZ (September 1, 2025) AI-Powered Vulnerability Detection and Adaptive Defense Strategies in Cybersecurity. Sakarya University Journal of Computer and Information Sciences 8 3 536–552.
IEEE
[1]Ş. Kara, F. İlkbahar, and M. Z. Gündüz, “AI-Powered Vulnerability Detection and Adaptive Defense Strategies in Cybersecurity”, SAUCIS, vol. 8, no. 3, pp. 536–552, Sept. 2025, doi: 10.35377/saucis.8.94717.1711704.
ISNAD
Kara, Şahin - İlkbahar, Fatih - Gündüz, Muhammed Zekeriya. “AI-Powered Vulnerability Detection and Adaptive Defense Strategies in Cybersecurity”. Sakarya University Journal of Computer and Information Sciences 8/3 (September 1, 2025): 536-552. https://doi.org/10.35377/saucis.8.94717.1711704.
JAMA
1.Kara Ş, İlkbahar F, Gündüz MZ. AI-Powered Vulnerability Detection and Adaptive Defense Strategies in Cybersecurity. SAUCIS. 2025;8:536–552.
MLA
Kara, Şahin, et al. “AI-Powered Vulnerability Detection and Adaptive Defense Strategies in Cybersecurity”. Sakarya University Journal of Computer and Information Sciences, vol. 8, no. 3, Sept. 2025, pp. 536-52, doi:10.35377/saucis.8.94717.1711704.
Vancouver
1.Şahin Kara, Fatih İlkbahar, Muhammed Zekeriya Gündüz. AI-Powered Vulnerability Detection and Adaptive Defense Strategies in Cybersecurity. SAUCIS. 2025 Sep. 1;8(3):536-52. doi:10.35377/saucis.8.94717.1711704

Cited By

 

INDEXING & ABSTRACTING & ARCHIVING

 

31045 31044   ResimLink - Resim Yükle  31047 

31043 28939 28938 34240
 

 

29070    The papers in this journal are licensed under a Creative Commons Attribution-NonCommercial 4.0 International License