IIUM Repository

Advancing cybersecurity through proactive cyber threat intelligence

Zainuddin, Ahmad Anwar and Abd Rahim, Noor Hayani and Ahmad Nordin, Nabilah and Amerolazuam, Amysha Qistina and Nik Mohd Kamal, Nik Nor Muhammad Saifudin and Sapuan, Muhamad Syariff (2024) Advancing cybersecurity through proactive cyber threat intelligence. In: Artificial Intelligence and Hikmah. Center for Islamization, International Islamic University Malaysia, Kuala Lumpur, pp. 198-228.

[img] PDF - Published Version
Restricted to Registered users only

Download (8MB) | Request a copy

Abstract

In the context of hikmah, the application of artificial intelligence (AI) can significantly enhance our defence against the increasingly severe and frequent cyberattacks of today. The dynamic, elusive, resilient, and complex nature of new-generation threats makes it challenging for traditional security systems based on heuristics and signatures to keep up. By incorporating AI, organisations can adopt a proactive approach, collecting and disseminating real-time cyber threat information with greater precision and efficiency. Cyber Threat Intelligence (CTI) mining, a rapidly growing field, leverages AI to find, process, and evaluate crucial data regarding cyber risks. However, many businesses still primarily focus on fundamental use cases, such as integrating intrusion prevention systems, security information and event management, and threat data feeds with existing network and firewall systems. This article surveys and investigates various data sources related to CTI mining and explores the potential paths for future research in this area, emphasising the role of AI guided by hikmah principles in enhancing cybersecurity. The findings indicate that AI-guided CTI mining, when aligned with hikmah principles, can create a more ethically robust cybersecurity framework. Future work should investigate the long-term impacts of such an integration on threat detection and mitigation across various sectors.

Item Type: Book Chapter
Uncontrolled Keywords: cybersecurity, threat intelligence, proactive defence, cyber threats
Subjects: T Technology > T Technology (General) > T55.4 Industrial engineering.Management engineering. > T58.5 Information technology
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): Kulliyyah of Information and Communication Technology > Department of Information System
Kulliyyah of Information and Communication Technology > Department of Information System

Kulliyyah of Information and Communication Technology
Kulliyyah of Information and Communication Technology
Depositing User: Dr. Noor Hayani Abd Rahim
Date Deposited: 26 Jun 2025 10:38
Last Modified: 26 Jun 2025 10:38
URI: http://irep.iium.edu.my/id/eprint/121720

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year