IIUM Repository

Are GPT-powered AI systems superior to traditional cybersecurity tools: applications and challenges

Abdelmaboud, Abdelzahir and Salih, Sayeed and Hassan Abdalla Hashim, Aisha and Almohamedh, Refan Mohamed and Tajelsier, Hayfaa and Motwakel, Abdelwahed (2025) Are GPT-powered AI systems superior to traditional cybersecurity tools: applications and challenges. International Journal of Safety and Security Engineering, 15 (9). pp. 1885-1900. ISSN 2041-9031 E-ISSN 2041-904X

[img]
Preview
PDF (Journal) - Published Version
Download (1MB) | Preview

Abstract

Generative Pre-trained Transformer (GPT) models are revolutionizing cybersecurity by enhancing threat detection, risk evaluation, phishing defense, and automatic vulnerability analysis. This study delves into the various applications of GPT Technologies in security operations, emphasizing their competence in processing security information of large volume, anomaly detections, and providing real-time insights. Case studies cite quantifiable benefits: Anomaly detection by AI reached a high of 80% accuracy, malware and phishing classification 75–95% accuracy, and Microsoft Copilot reduced phishing attacks by 45% in commercial settings. VirusTotal and Cylance AI improved malware categorization accuracy by 38%, reducing false positives by 35%. Incident response effectiveness was improved by as high as 40% in reported deployments. However, GPT models are also exposed to adversarial exploitation, gaps in explanation, integration issues, and dependence on previous data. This paper lists countermeasures, such as prompt engineering, fine-tuning, domain-specific training, and hybrid AI-human decision systems. Findings further highlight the significance of continuous updates, interdisciplinary collaboration with adherence to ethical frameworks to reap the full benefits of GPT-powered cybersecurity. So, take into consideration integrating these models into present security ecosystems. This way, organizations may strengthen their defenses, improve risk management, and make resilience against cyber threats.

Item Type: Article (Journal)
Additional Information: 2523/126813
Uncontrolled Keywords: generative AI, cybersecurity, natural language processing, threat detection, risk management, phishing prevention, data privacy
Subjects: T Technology > TK Electrical engineering. Electronics Nuclear engineering > TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices > TK7885 Computer engineering
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): Kulliyyah of Engineering
Kulliyyah of Engineering > Department of Electrical and Computer Engineering
Depositing User: Prof. Dr. Aisha Hassan Abdalla Hashim
Date Deposited: 15 Jan 2026 14:28
Last Modified: 16 Jan 2026 10:54
Queue Number: 2026-01-Q1620
URI: http://irep.iium.edu.my/id/eprint/126813

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year