Artificial intelligence-powered computer networks for cyberattack protection: a systematic literature review
DOI:
https://doi.org/10.55873/rad.v4i2.373Keywords:
machine learning, educational cybersecurity, intrusion detection, neural networks, technological vulnerabilitiesAbstract
In the context of rising cyberattacks and the vulnerability of educational computer networks, this study conducted a systematic review to assess the effectiveness of artificial intelligence (AI) compared to traditional protection methods. Following PRISMA guidelines, 17 studies published between 2020 and 2024 were analyzed from databases such as IEEE Xplore and Scopus, with inclusion criteria focused on temporal relevance and educational networks. The findings revealed that AI achieved an average detection accuracy of 89%, outperforming traditional approaches at 72%, particularly in identifying emerging threats. However, key barriers were identified, including high implementation costs (averaging USD 28,000 in hardware), lack of specialized personnel, and heterogeneity across educational infrastructures. The study concludes that collaborative models, low-code tools, and hybrid approaches are essential to enable AI adoption in resource-constrained contexts. Furthermore, it highlights the importance of extending future research to diverse geographical settings to strengthen the applicability and scalability of AI in educational cybersecurity.
Downloads
References
Abdi, A. H., et al. (2024). Security control and data planes of SDN: A comprehensive review of traditional, AI, and MTD approaches to security solutions. IEEE Access, 12, 69941–69980. https://doi.org/10.1109/ACCESS.2024.3393548
Ali, O., Murray, P. A., Momin, M., Dwivedi, Y. K., & Malik, T. (2024). The effects of artificial intelligence applications in educational settings: Challenges and strategies. Technological Forecasting and Social Change, 199, 123076. https://doi.org/10.1016/j.techfore.2023.123076
Bin Hafiz, M. F., Khan, N. A., Kamal, Z., Hossain, S., & Barman, S. (2024). A robust malware classification approach leveraging explainable AI. 2024 International Conference on Intelligent Systems for Cybersecurity (ISCS), 1–6. https://doi.org/10.1109/ISCS61804.2024.10581382
El Abdellaoui Alaoui, E. A., Filali, A., Sallah, A., Hajhouj, M., Hessane, A., & Merras, M. (2024). Towards transparent cybersecurity: The role of explainable AI in mitigating spam threats. Procedia Computer Science, 236, 394–401. https://doi.org/10.1016/j.procs.2024.05.046
EBSCO-Metadata-2024-10-02 (6). (2024). [Dataset].
EBSCO-Metadata-2024-10-02 (8). (2024). [Dataset].
EBSCO-Metadata-2024-10-02 (9). (2024). [Dataset].
Guru Rao, C. V., Mohammad Ali Chisty, N., Mishra, S. K., Sathe, M., Rizvi, S., & Soni, M. (2024). Innovations, difficulties, and approaches for next-generation cybersecurity: Protecting the digital future. 2024 International Conference on Trends in Quantum Computing and Emerging Business Technologies, 1–6. https://doi.org/10.1109/TQCEBT59414.2024.10545178
Huang, P., Bu, X., Lin, G., Xu, Q., & Xiao, C. (2024). Simulation of coupling characteristics of motion and heat transfer between airflow and ice crystals in a single-stage compressor. Propulsion and Power Research. https://doi.org/10.1016/j.jppr.2024.04.003
Ilić, M. P., Păun, D., Šević, N. P., Hadžić, A., & Jianu, A. (2021). Needs and performance analysis for changes in higher education and implementation of artificial intelligence, machine learning, and extended reality. Education Sciences, 11(10). https://doi.org/10.3390/educsci11100568
Islam, M. T., Syfullah, M. K., Islam, J., Quadir, H. M. S., Rashed, M. G., & Das, D. (2023). Exploring the potential: ML vs. DL in network security with explainable AI (XAI) insights. 2023 26th International Conference on Computer and Information Technology (ICCIT), 1–6. https://doi.org/10.1109/ICCIT60459.2023.10441363
Lei, K., Ye, H., Liang, Y., Xiao, J., & Chen, P. (2021). Towards a translation-based method for dynamic heterogeneous network embedding. ICC 2021 - IEEE International Conference on Communications, 1–6. https://doi.org/10.1109/ICC42927.2021.9500303
Martínez-Comesaña, M., Rigueira-Díaz, X., Larrañaga-Janeiro, A., Martínez-Torres, J., Ocarranza-Prado, I., & Kreibel, D. (2023). Impact of artificial intelligence on assessment methods in primary and secondary education: Systematic literature review. Revista de Psicodidáctica (English ed.), 28(2), 93–103. https://doi.org/10.1016/j.psicoe.2023.06.002
Qiao, Z., Liu, B., Tian, B., & Liu, Y. (2021). Heterogeneous network embedding with enhanced event awareness via triplet network. 2021 International Conference on Networking and Network Applications (NaNA), 231–235. https://doi.org/10.1109/NaNA53684.2021.00047
Safaei Pour, M., Nader, C., Friday, K., & Bou-Harb, E. (2023). A comprehensive survey of recent internet measurement techniques for cyber security. Computers & Security. Elsevier Ltd. https://doi.org/10.1016/j.cose.2023.103123
Suresh Manic, K., Al-Bemani, A. S., Nizamudin, A. A., Balaji, G., & Amal, A. A. (2024). Optimizing academic journey for high schoolers in Oman: A machine learning-enabled AI model. Procedia Computer Science, 235, 2716–2729. https://doi.org/10.1016/j.procs.2024.04.256
Thakur, P., Goel, S., & Puthooran, E. (2024). Edge AI enabled IoT framework for secure smart home infrastructure. Procedia Computer Science, 235, 3369–3378. https://doi.org/10.1016/j.procs.2024.04.317

Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Jhenrry Rivera-Moreto, Yngue Elizabeth Ramírez-Pezo

This work is licensed under a Creative Commons Attribution 4.0 International License.