Impact of Big Data Analytics and ChatGPT on Cybersecurity

Every day, network assaults and cyber threats get more sophisticated, and the worldwide number of attacks increases, as do the approaches and methods used to infiltrate business systems and personal devices. The options for pursuing assaults are gradually expanding, and recently such attacks have resulted in broad, severe effects and results. This study examines how Bigdata analytics and Artificial Intelligence (AI) technologies or platforms such as ChatGPT may be utilized to mitigate cybersecurity risks. When it comes to cyber hazards, ChatGPT has both a beneficial and a bad influence. It can be utilized at times to provide preventive measures, but it can also be used as a catalyst to assist complex cyber-attacks with no coding solutions. The study also looks at existing AI and data analytics technologies and how they may improve cybersecurity. The incoming AI application in ChatGPT shortcomings is also discussed in this research focusing on its pros and cons in managing cyber threats. The article focuses a heavy emphasis on security systems in order to respond to greater preventive and predictive reactions and monitoring. Finally, this study examines the barriers to such adoptions, proposing potential approaches to address them.

[1]  Bibhu Dash,et al.  Smart SCM Using AI and Microsoft 365 , 2022, IJARCCE.

[2]  Bibhu Dash,et al.  Federated Learning for Privacy-Preserving: A Review of PII Data Analysis in Fintech , 2022, International Journal of Software Engineering & Applications.

[3]  Bibhu Dash,et al.  Role of Artificial Intelligence in Smart Cities for Information Gathering and Dissemination (A Review) , 2022, Academic Journal of Research and Scientific Publishing.

[4]  Satish Nambisan,et al.  Innovation Analytics and Digital Innovation Experimentation: The Rise of Research-driven Online Review Platforms , 2021 .

[5]  Charles A. Kamhoua,et al.  A Survey of Defensive Deception: Approaches Using Game Theory and Machine Learning , 2021, IEEE Communications Surveys & Tutorials.

[6]  R. Ko Cyber Autonomy: Automating the Hacker- Self-healing, self-adaptive, automatic cyber defense systems and their impact to the industry, society and national security , 2020, Emerging technologies and international security.

[7]  Praveen Kumar Reddy Maddikunta,et al.  A Review on Cyber Crimes on the Internet of Things , 2020, ArXiv.

[8]  Fabio Nonino,et al.  Understanding the management of cyber resilient systems , 2020, Comput. Ind. Eng..

[9]  Rajni Jindal,et al.  Blockchain Technology for Cloud Storage , 2020, ACM Comput. Surv..

[10]  JindalRajni,et al.  Blockchain Technology for Cloud Storage: A Systematic Literature Review , 2020 .

[11]  Marjan Kuchaki Rafsanjani,et al.  A survey on security challenges in cloud computing: issues, threats, and solutions , 2020, The Journal of Supercomputing.

[12]  Leonardo Babun,et al.  USB-Watch: A Dynamic Hardware-Assisted USB Threat Detection Framework , 2019, SecureComm.

[13]  David M. Wheeler,et al.  The IoT Architect's Guide to Attainable Security and Privacy , 2019 .

[14]  Sang Guun Yoo,et al.  Cognitive security: A comprehensive study of cognitive science in cybersecurity , 2019, J. Inf. Secur. Appl..

[15]  M. Roy,et al.  Nexus of Internet of Things (IoT) and Big Data: Roadmap for Smart Management Systems (SMgS) , 2019, IEEE Engineering Management Review.

[16]  Mérouane Debbah,et al.  Wireless Networks Design in the Era of Deep Learning: Model-Based, AI-Based, or Both? , 2019, IEEE Transactions on Communications.

[17]  Dijiang Huang,et al.  A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities , 2019, IEEE Communications Surveys & Tutorials.

[18]  Ibrahim M. Baggili,et al.  Survey results on adults and cybersecurity education , 2018, Education and Information Technologies.

[19]  Jin Wang,et al.  Overview on DeepMind and Its AlphaGo Zero AI , 2018, ICBDE.

[20]  Javier López,et al.  IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations , 2018, Sensors.

[21]  Ramona Trestian,et al.  Seamless Multimedia Delivery Within a Heterogeneous Wireless Networks Environment: Are We There Yet? , 2018, IEEE Communications Surveys & Tutorials.

[22]  Mariam Khader,et al.  Threat Hunting Using GRR Rapid Response , 2017, 2017 International Conference on New Trends in Computing Sciences (ICTCS).

[23]  Muhammad Ubale Kiru,et al.  A Situation Analysis on Cybercrime and its Economic Impact in Nigeria , 2017 .

[24]  Jingguo Wang,et al.  Coping Responses in Phishing Detection: An Investigation of Antecedents and Consequences , 2017, Inf. Syst. Res..

[25]  Fiona Carroll,et al.  Ethics and the Internet of Everything: A Glimpse into People’s Perceptions of IoT Privacy and Security , 2012, IoT.

[26]  Roseline Oluwaseun Ogundokun,et al.  Application of Machine Learning for Ransomware Detection in IoT Devices , 2021 .

[27]  Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities , 2021, Studies in Computational Intelligence.

[28]  Fadi Muheidat,et al.  Artificial Intelligence and Blockchain for Cybersecurity Applications , 2021, Studies in Big Data.

[29]  Paul Rimba,et al.  Data-Driven Cybersecurity Incident Prediction: A Survey , 2019, IEEE Communications Surveys & Tutorials.

[30]  Fadi Al-Turjman,et al.  Small Cells in the Forthcoming 5G/IoT: Traffic Modelling and Deployment Overview , 2019, IEEE Communications Surveys & Tutorials.