Application of Artificial Intelligence Technology in Cyberspace Security Defense
DOI:
https://doi.org/10.53469/ijomsr.2025.08(06).06Keywords:
Artificial intelligence technology, Cybersecurity defense, ApplicationAbstract
The application of artificial intelligence technology in cyberspace security defense is helpful to improve network information security. Based on this, this paper takes the overview of cyber defence and artificial intelligence technologies as the point of departure, and compares and analyzes the advantages of artificial intelligence technologies over traditional cyber defence technologies. We explored the application practices of relational rule mining technology, neural network technology, and intelligent firewall technology in network security defense. In network security defense, deepening the application and promotion of artificial intelligence technology can fully tap the value of artificial intelligence technology in information security protection, effectively resist various security threats, and provide guarantee for cyberspace security.
References
Zeng, Yuan, et al. "Education investment, social security, and household financial market participation." Finance Research Letters 77 (2025): 107124.
Wang, Chun, Jianke Zou, and Ziyang Xie. "AI-Powered Educational Data Analysis for Early Identification of Learning Difficulties." The 31st International scientific and practical conference “Methodological aspects of education: achievements and prospects”(August 06–09, 2024) Rotterdam, Netherlands. International Science Group. 2024. 252 p.. 2024.
Wang, Hao. "Joint Training of Propensity Model and Prediction Model via Targeted Learning for Recommendation on Data Missing Not at Random." AAAI 2025 Workshop on Artificial Intelligence with Causal Techniques. 2025.
Chen, Yuyan, et al. "Emotionqueen: A benchmark for evaluating empathy of large language models." arXiv preprint arXiv:2409.13359 (2024).
Ding, Cheng, and Chenwei Wu. "Self-Supervised Learning for Biomedical Signal Processing: A Systematic Review on ECG and PPG Signals." medRxiv (2024): 2024-09.
Restrepo, David, et al. "Multimodal Deep Learning for Low-Resource Settings: A Vector Embedding Alignment Approach for Healthcare Applications." medRxiv (2024): 2024-06.
Yang, Jing, et al. "IoT-Driven Skin Cancer Detection: Active Learning and Hyperparameter Optimization for Enhanced Accuracy." IEEE Journal of Biomedical and Health Informatics (2025).
Jiang, Chenxi, et al. "LMAT-ND: A Meta-Attention-Enhanced Llama-7B Model for AI-Generated News Detection." 2025 5th International Conference on Consumer Electronics and Computer Engineering (ICCECE). IEEE, 2025.
Wu, W., Bi, S., Zhan, Y., & Gu, X. (2025). Supply chain digitalization and energy efficiency (gas and oil): How do they contribute to achieving carbon neutrality targets?. Energy Economics, 142, 108140.
Peng, Qucheng, et al. "RAIN: regularization on input and network for black-box domain adaptation." arXiv preprint arXiv:2208.10531 (2022).
Zheng, Ce, et al. "Diffmesh: A motion-aware diffusion framework for human mesh recovery from videos." 2025 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV). IEEE, 2025.
Zhang, Shengyuan, et al. "Research on machine learning-based anomaly detection techniques in biomechanical big data environments." Molecular & Cellular Biomechanics 22.3 (2025): 669-669.
Zhou, Dianyi, et al. "Research on LSTM-driven UAV path planning." Fourth International Conference on Advanced Algorithms and Neural Networks (AANN 2024). Vol. 13416. SPIE, 2024.
Tu, T. (2025). Log2Learn: Intelligent Log Analysis for Real-Time Network Optimization.