Abdelmaboud, Abdelzahir and Salih, Sayeed and Hassan Abdalla Hashim, Aisha and Almohamedh, Refan Mohamed and Tajelsier, Hayfaa and Motwakel, Abdelwahed (2025) Are GPT-powered AI systems superior to traditional cybersecurity tools: applications and challenges. International Journal of Safety and Security Engineering, 15 (9). pp. 1885-1900. ISSN 2041-9031 E-ISSN 2041-904X
|
PDF (Journal)
- Published Version
Download (1MB) | Preview |
Abstract
Generative Pre-trained Transformer (GPT) models are revolutionizing cybersecurity by enhancing threat detection, risk evaluation, phishing defense, and automatic vulnerability analysis. This study delves into the various applications of GPT Technologies in security operations, emphasizing their competence in processing security information of large volume, anomaly detections, and providing real-time insights. Case studies cite quantifiable benefits: Anomaly detection by AI reached a high of 80% accuracy, malware and phishing classification 75–95% accuracy, and Microsoft Copilot reduced phishing attacks by 45% in commercial settings. VirusTotal and Cylance AI improved malware categorization accuracy by 38%, reducing false positives by 35%. Incident response effectiveness was improved by as high as 40% in reported deployments. However, GPT models are also exposed to adversarial exploitation, gaps in explanation, integration issues, and dependence on previous data. This paper lists countermeasures, such as prompt engineering, fine-tuning, domain-specific training, and hybrid AI-human decision systems. Findings further highlight the significance of continuous updates, interdisciplinary collaboration with adherence to ethical frameworks to reap the full benefits of GPT-powered cybersecurity. So, take into consideration integrating these models into present security ecosystems. This way, organizations may strengthen their defenses, improve risk management, and make resilience against cyber threats.
| Item Type: | Article (Journal) |
|---|---|
| Additional Information: | 2523/126813 |
| Uncontrolled Keywords: | generative AI, cybersecurity, natural language processing, threat detection, risk management, phishing prevention, data privacy |
| Subjects: | T Technology > TK Electrical engineering. Electronics Nuclear engineering > TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices > TK7885 Computer engineering |
| Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): | Kulliyyah of Engineering Kulliyyah of Engineering > Department of Electrical and Computer Engineering |
| Depositing User: | Prof. Dr. Aisha Hassan Abdalla Hashim |
| Date Deposited: | 15 Jan 2026 14:28 |
| Last Modified: | 16 Jan 2026 10:54 |
| Queue Number: | 2026-01-Q1620 |
| URI: | http://irep.iium.edu.my/id/eprint/126813 |
Actions (login required)
![]() |
View Item |

Download Statistics
Download Statistics