Artificial intelligence-powered computer networks for cyberattack protection: a systematic literature review

Authors

DOI:

https://doi.org/10.55873/rad.v4i2.373

Keywords:

machine learning, educational cybersecurity, intrusion detection, neural networks, technological vulnerabilities

Abstract

In the context of rising cyberattacks and the vulnerability of educational computer networks, this study conducted a systematic review to assess the effectiveness of artificial intelligence (AI) compared to traditional protection methods. Following PRISMA guidelines, 17 studies published between 2020 and 2024 were analyzed from databases such as IEEE Xplore and Scopus, with inclusion criteria focused on temporal relevance and educational networks. The findings revealed that AI achieved an average detection accuracy of 89%, outperforming traditional approaches at 72%, particularly in identifying emerging threats. However, key barriers were identified, including high implementation costs (averaging USD 28,000 in hardware), lack of specialized personnel, and heterogeneity across educational infrastructures. The study concludes that collaborative models, low-code tools, and hybrid approaches are essential to enable AI adoption in resource-constrained contexts. Furthermore, it highlights the importance of extending future research to diverse geographical settings to strengthen the applicability and scalability of AI in educational cybersecurity.

Downloads

Download data is not yet available.

References

Abdi, A. H., et al. (2024). Security control and data planes of SDN: A comprehensive review of traditional, AI, and MTD approaches to security solutions. IEEE Access, 12, 69941–69980. https://doi.org/10.1109/ACCESS.2024.3393548

Ali, O., Murray, P. A., Momin, M., Dwivedi, Y. K., & Malik, T. (2024). The effects of artificial intelligence applications in educational settings: Challenges and strategies. Technological Forecasting and Social Change, 199, 123076. https://doi.org/10.1016/j.techfore.2023.123076

Bin Hafiz, M. F., Khan, N. A., Kamal, Z., Hossain, S., & Barman, S. (2024). A robust malware classification approach leveraging explainable AI. 2024 International Conference on Intelligent Systems for Cybersecurity (ISCS), 1–6. https://doi.org/10.1109/ISCS61804.2024.10581382

El Abdellaoui Alaoui, E. A., Filali, A., Sallah, A., Hajhouj, M., Hessane, A., & Merras, M. (2024). Towards transparent cybersecurity: The role of explainable AI in mitigating spam threats. Procedia Computer Science, 236, 394–401. https://doi.org/10.1016/j.procs.2024.05.046

EBSCO-Metadata-2024-10-02 (6). (2024). [Dataset].

EBSCO-Metadata-2024-10-02 (8). (2024). [Dataset].

EBSCO-Metadata-2024-10-02 (9). (2024). [Dataset].

Guru Rao, C. V., Mohammad Ali Chisty, N., Mishra, S. K., Sathe, M., Rizvi, S., & Soni, M. (2024). Innovations, difficulties, and approaches for next-generation cybersecurity: Protecting the digital future. 2024 International Conference on Trends in Quantum Computing and Emerging Business Technologies, 1–6. https://doi.org/10.1109/TQCEBT59414.2024.10545178

Huang, P., Bu, X., Lin, G., Xu, Q., & Xiao, C. (2024). Simulation of coupling characteristics of motion and heat transfer between airflow and ice crystals in a single-stage compressor. Propulsion and Power Research. https://doi.org/10.1016/j.jppr.2024.04.003

Ilić, M. P., Păun, D., Šević, N. P., Hadžić, A., & Jianu, A. (2021). Needs and performance analysis for changes in higher education and implementation of artificial intelligence, machine learning, and extended reality. Education Sciences, 11(10). https://doi.org/10.3390/educsci11100568

Islam, M. T., Syfullah, M. K., Islam, J., Quadir, H. M. S., Rashed, M. G., & Das, D. (2023). Exploring the potential: ML vs. DL in network security with explainable AI (XAI) insights. 2023 26th International Conference on Computer and Information Technology (ICCIT), 1–6. https://doi.org/10.1109/ICCIT60459.2023.10441363

Lei, K., Ye, H., Liang, Y., Xiao, J., & Chen, P. (2021). Towards a translation-based method for dynamic heterogeneous network embedding. ICC 2021 - IEEE International Conference on Communications, 1–6. https://doi.org/10.1109/ICC42927.2021.9500303

Martínez-Comesaña, M., Rigueira-Díaz, X., Larrañaga-Janeiro, A., Martínez-Torres, J., Ocarranza-Prado, I., & Kreibel, D. (2023). Impact of artificial intelligence on assessment methods in primary and secondary education: Systematic literature review. Revista de Psicodidáctica (English ed.), 28(2), 93–103. https://doi.org/10.1016/j.psicoe.2023.06.002

Qiao, Z., Liu, B., Tian, B., & Liu, Y. (2021). Heterogeneous network embedding with enhanced event awareness via triplet network. 2021 International Conference on Networking and Network Applications (NaNA), 231–235. https://doi.org/10.1109/NaNA53684.2021.00047

Safaei Pour, M., Nader, C., Friday, K., & Bou-Harb, E. (2023). A comprehensive survey of recent internet measurement techniques for cyber security. Computers & Security. Elsevier Ltd. https://doi.org/10.1016/j.cose.2023.103123

Suresh Manic, K., Al-Bemani, A. S., Nizamudin, A. A., Balaji, G., & Amal, A. A. (2024). Optimizing academic journey for high schoolers in Oman: A machine learning-enabled AI model. Procedia Computer Science, 235, 2716–2729. https://doi.org/10.1016/j.procs.2024.04.256

Thakur, P., Goel, S., & Puthooran, E. (2024). Edge AI enabled IoT framework for secure smart home infrastructure. Procedia Computer Science, 235, 3369–3378. https://doi.org/10.1016/j.procs.2024.04.317

Published

2025-07-25

How to Cite

Rivera-Moreto, J., & Ramírez-Pezo, Y. E. (2025). Artificial intelligence-powered computer networks for cyberattack protection: a systematic literature review. Revista Amazonía Digital, 4(2), e373. https://doi.org/10.55873/rad.v4i2.373

Similar Articles

1 2 > >> 

You may also start an advanced similarity search for this article.