Predictive Threat Modeling : Data-Centric AI for Proactive Cyber Threat Intelligence

Authors(1) :-Ashish Reddy Kumbham

Thereby, it could be declared that traditional 'defensive' measures that presuppose an organization's readiness to be merely passive could prevent today's high-speed cyber threats from penetrating the systems. The threat modeling system is predictive and offers threat modeling for Data-centric AI; therefore, cybersecurity professionals search for threats, and concurrently, machine learning loops and scans vast datasets and executes routines. By employing the Big Data Processing functionality, Artificial Intelligence cybersecurity tools provide ways of real-time threat detection to avoid cybercrimes based on the identification of configured patterns. Complementing the anomaly detection method of analysis, behavioral analytics functions along with the natural language processing (NLP) and self-security reaction systems provide fundamental technological components of this analysis. In this manner, the authors respond to the practical difficulties associated with model bias in using AI for the cybersecurity protection of different systems and the risk of adversarial AI technologies and privacy legislation. For instance, the study will employ real-life business examples to shed light on how industries alter cybersecurity systems due to advancements in AI technology. This section of the work also provides a future outlook focusing on trends currently emerging in AI's threat modeling. It looks at quantum AI together with self-safeguarding or self-repairing cybersecurity and the use of blockchain to identify the most imminent pre-emptive cybersecurity defenses.

Authors and Affiliations

Ashish Reddy Kumbham
Independent Researcher, USA

Predictive Threat Modeling operates with Data-Centric AI alongside Cyber Threat Intelligence to perform Anomaly Detection while enabling Automated Security Response.

  1. Andersen, L. C. (2016). Data-driven Approach to Information Sharing using Data Fusion and Machine Learning (Master's thesis). https://ntnuopen.ntnu.no/ntnu-xmlui/bitstream/handle/11250/2403053/LCAndersen_2016.pdf?sequence=1
  2. Katikireddi, P. M., & Jaini, S. (2022). IN GENERATIVE AI: ZERO-SHOT AND FEW-SHOT. International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT) , 8(1), 391–397. https://doi.org/https://doi.org/10.32628/CSEIT2390668
  3. Nunnagupala, L. S. C. ., Mallreddy, S. R., & Padamati, J. R. . (2022). Achieving PCI Compliance with CRM Systems. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 13(1), 529–535.
  4. Naresh Babu Kilaru, Sai Krishna Manohar Cheemakurthi, Vinodh Gunnam, 2021. "SOAR Solutions in PCI Compliance: Orchestrating Incident Response for Regulatory Security"ESP Journal of Engineering & Technology Advancements 1(2): 78-84.
  5. Jangampeta, S., Mallreddy, S.R., & Padamati, J.R. (2021). Anomaly Detection for Data Security in SIEM: Identifying Malicious Activity in Security Logs and User Sessions. 10(12), 295-298
  6. Vasa, Y. (2021). Robustness and adversarial attacks on generative models. International Journal for Research Publication and Seminar, 12(3), 462–471. https://doi.org/10.36676/jrps.v12.i3.1537
  7. Kilaru, N. B., Cheemakurthi, S. K. M., & Gunnam, V. (n.d.). Advanced Anomaly Detection In Banking: Detecting Emerging Threats Using Siem. International Journal of Computer Science and Mechatronics, 7(4), 28–33.
  8. Naresh Babu Kilaru. (2021). AUTOMATE DATA SCIENCE WORKFLOWS USING DATA ENGINEERING TECHNIQUES. International Journal for Research Publication and Seminar, 12(3), 521–530. https://doi.org/10.36676/jrps.v12.i3.1543
  9. Gunnam, V., & Kilaru, N. B. (2021). Securing Pci Data: Cloud Security Best Practices And Innovations. Nveo, 8(3), 418–424. https://doi.org/https://doi.org/10.53555/nveo.v8i3.5760
  10. Katikireddi, P. M., Singirikonda, P., & Vasa, Y. (2021). Revolutionizing DEVOPS with Quantum Computing: Accelerating CI/CD pipelines through Advanced Computational Techniques. Innovative Research Thoughts, 7(2), 97–103. https://doi.org/10.36676/irt.v7.i2.1482
  11. Vasa, Y. (2021). Quantum Information Technologies in cybersecurity: Developing unbreakable encryption for continuous integration environments. International Journal for Research Publication and Seminar, 12(2), 482–490. https://doi.org/10.36676/jrps.v12.i2.1539
  12. Jangampeta, S., Mallreddy, S. R., & Padamati, J. R. (2021). Data Security: Safeguarding the Digital Lifeline in an Era of Growing Threats. International Journal for Innovative Engineering and Management Research, 10(4), 630-632.
  13. Singirikonda, P., Jaini, S., & Vasa, Y. (2021). Develop Solutions To Detect And Mitigate Data Quality Issues In ML Models. NVEO - Natural Volatiles & Essential Oils, 8(4), 16968–16973. https://doi.org/https://doi.org/10.53555/nveo.v8i4.5771
  14. Vasa, Y. (2021). Develop Explainable AI (XAI) Solutions For Data Engineers. NVEO - Natural Volatiles & Essential Oils, 8(3), 425–432. https://doi.org/https://doi.org/10.53555/nveo.v8i3.5769
  15. Singirikonda, P., Katikireddi, P. M., & Jaini, S. (2021). Cybersecurity In Devops: Integrating Data Privacy And Ai-Powered Threat Detection For Continuous Delivery. NVEO - Natural Volatiles & Essential Oils, 8(2), 215–216. https://doi.org/https://doi.org/10.53555/nveo.v8i2.5770
  16. Kilaru, N. B., & Cheemakurthi, S. K. M. (2021). Techniques For Feature Engineering To Improve Ml Model Accuracy. NVEO-NATURAL VOLATILES & ESSENTIAL OILS Journal| NVEO, 194-200.
  17. Vasa, Y., Jaini, S., & Singirikonda, P. (2021). Design Scalable Data Pipelines For Ai Applications. NVEO - Natural Volatiles & Essential Oils, 8(1), 215–221. https://doi.org/https://doi.org/10.53555/nveo.v8i1.5772
  18. Sukender Reddy Mallreddy(2020).Cloud Data Security: Identifying Challenges and Implementing Solutions.JournalforEducators,TeachersandTrainers,Vol.11(1).96 -102.

Publication Details

Published in : Volume 9 | Issue 1 | January-February 2022
Date of Publication : 2022-02-10
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 394-399
Manuscript Number : IJSRSET2310230
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Ashish Reddy Kumbham, " Predictive Threat Modeling : Data-Centric AI for Proactive Cyber Threat Intelligence, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 9, Issue 1, pp.394-399, January-February-2022. Journal URL : https://res.ijsrset.com/IJSRSET2310230

Article Preview