Адаптивний ШІ для кібербезпеки: практичні приклади усунення сліпих зон
Keywords:
Cybersecurity, Privacy-preserving AI, Phishing detection, Malware detection, CNN, Autoencoders, Ultra-low latency threat detectionAbstract
Cyber-attacks increasingly evade static, rules-based controls by shifting content, infrastructure, and pace. This article synthesizes practical machine-learning patterns that measurably improve defence across six domains: phishing/social engineering, malware detection, network anomaly detection, insider-risk analytics, vulnerability prioritisation, and incident-response automation. The approach highlights transformer-based NLP that reads messages more like people do (with reported F1 scores of approximately 0.98 on public phishing benchmarks), image-based CNNs that recognise malware “byte-textures,” autoencoders and sequence models that baseline network behaviour, federated and explainable methods for privacy-preserving insider detection, EPSS-driven triage that prioritises by exploitation likelihood, and reinforcement learning that adapts response actions under guardrails. Emphasis is on deployable patterns – shadow-mode pilots, precision/recall tracking, false-positive budgets, human-in-the-loop review, and continuous learning from user feedback and honeypot telemetry – so organisations can move from brittle signature races to adaptive systems that improve with every campaign observed. The transition to 5G and emerging 6G architectures compounds these challenges, introducing ultra-low latency requirements, massive device densities, and decentralized, edge-based infrastructures. Adaptive AI must therefore operate not only in traditional enterprise networks but also in heterogeneous, mobile, and resource-constrained 5G/6G environments where security, privacy, and resilience are paramount
Downloads
Published
How to Cite
Issue
Section
License
The scientific journal "Information Security" adheres to the principles of open science and provides free, free and permanent access to all published materials. The goal of the policy is to increase the visibility, citation and impact of the results of scientific research in the field of information security. The journal works according to the principles of Open Access and does not charge a fee for access to published articles.
All articles are published in Open Access under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
Copyright
Authors who publish their works in the journal “Information Security”:
-
retain the copyright to their publications;
-
grant the journal the right of first publication of the article;
-
agree to the distribution of their materials under the CC BY 4.0 license;
-
have the right to reuse, archive, and distribute their works (including in institutional and subject repositories), provided that proper reference is made to the original publication in the journal.