<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                                                <journal-id>saucis</journal-id>
            <journal-title-group>
                                                                                    <journal-title>Sakarya University Journal of Computer and Information Sciences</journal-title>
            </journal-title-group>
                                        <issn pub-type="epub">2636-8129</issn>
                                                                                            <publisher>
                    <publisher-name>Sakarya University</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.35377/saucis.8.94717.1711704</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Software Testing, Verification and Validation</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Yazılım Testi, Doğrulama ve Validasyon</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                                                            <article-title>AI-Powered Vulnerability Detection and Adaptive Defense Strategies in Cybersecurity</article-title>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0001-8736-2730</contrib-id>
                                                                <name>
                                    <surname>Kara</surname>
                                    <given-names>Şahin</given-names>
                                </name>
                                                                    <aff>SAKARYA UNIVERSITY OF APPLIED SCIENCES</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-7964-3433</contrib-id>
                                                                <name>
                                    <surname>İlkbahar</surname>
                                    <given-names>Fatih</given-names>
                                </name>
                                                                    <aff>DÜZCE ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0003-4278-7123</contrib-id>
                                                                <name>
                                    <surname>Gündüz</surname>
                                    <given-names>Muhammed Zekeriya</given-names>
                                </name>
                                                                    <aff>BİNGÖL ÜNİVERSİTESİ, BİNGÖL TEKNİK BİLİMLER MESLEK YÜKSEKOKULU</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20250930">
                    <day>09</day>
                    <month>30</month>
                    <year>2025</year>
                </pub-date>
                                        <volume>8</volume>
                                        <issue>3</issue>
                                        <fpage>536</fpage>
                                        <lpage>552</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20250602">
                        <day>06</day>
                        <month>02</month>
                        <year>2025</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20250705">
                        <day>07</day>
                        <month>05</month>
                        <year>2025</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2018, Sakarya University Journal of Computer and Information Sciences</copyright-statement>
                    <copyright-year>2018</copyright-year>
                    <copyright-holder>Sakarya University Journal of Computer and Information Sciences</copyright-holder>
                </permissions>
            
                                                                                                                        <abstract><p>Cybersecurity threats are becoming increasingly complex and sophisticated. These challenges highlight the growing need for organizations and individuals to safeguard their digital assets. In this context, artificial intelligence (AI) technologies offer substantial capabilities to detect and mitigate cybersecurity vulnerabilities. AI enables effective protection by performing deep analyses on large datasets to identify abnormal activities and predict potential threats. By transforming traditional security paradigms, AI contributes to faster and more adaptive responses against cyberattacks. Furthermore, AI’s ability to classify threats and respond in real time gives security professionals a strategic edge. In the following sections, the role of AI in identifying and addressing cybersecurity vulnerabilities will be examined in detail, supported by current real-world applications. Finally, the paper will explore the future of AI in cybersecurity and potential directions for further enhancement.</p></abstract>
                                                            
            
                                                                                        <kwd-group>
                                                    <kwd>Cyber Security</kwd>
                                                    <kwd>  Cyber-attack Experiments</kwd>
                                                    <kwd>  Artificial Intelligence in Cybersecurity</kwd>
                                                    <kwd>  Machine learning</kwd>
                                                    <kwd>  Random Forest.</kwd>
                                            </kwd-group>
                            
                                                                                                                                                    </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">N. G. Camacho, “The Role of AI in Cybersecurity: Addressing Threats in the Digital Age,” J. Artif. Intell. Gen. Sci. (JAIGS), vol. 3, no. 1, pp. 143–154, 2024.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">N. Mohamed, &quot;Artificial intelligence and machine learning in cybersecurity: a deep dive into state-of-the-art techniques and future paradigms,&quot; Knowledge and Information Systems, 2025. [Online]. Available: https://doi.org/10.1007/s10115-025-02429-y.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">K. M. Roba Abbas, J. Pitt, K. M. Vogel, and M. Zafeirakopoulos, “Artificial Intelligence (AI) in Cybersecurity: a socio-technical research roadmap,” 2022. [Online]. Available: https://www.turing.ac.uk/sites/default/files/2023-11/ai_in_cybersecurity.pdf</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">N. Mohamed, “Current trends in AI and ML for cybersecurity: A state-of-the-art survey,” Cogent Eng., vol. 10, no. 2, 2023.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">M. I. Alghamdi, “Survey on Applications of Deep Learning and Machine Learning Techniques for Cyber Security,” Int. J. Interact. Mob. Technol., vol. 14, no. 16, 2020.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">S. Ali, S. U. Rehman, A. Imran, G. Adeem, Z. Iqbal, and K.-I. Kim, “Comparative Evaluation of AI-Based Techniques for Zero-Day Attacks Detection,” Electronics, vol. 11, no. 23, p. 3934, 2022.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">S. Zeadally, E. Adi, Z. Baig, and I. A. Khan, “Harnessing Artificial Intelligence Capabilities to Improve Cybersecurity,” IEEE Access, vol. 8, pp. 23817–23837, 2020.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">M. Tayyab, M. Marjani, N. Z. Jhanjhi, I. A. T. Hashem, R. S. A. Usmani, and F. Qamar, “A comprehensive review on deep learning algorithms: Security and privacy issues,” Comput. Secur., vol. 131, p. 103297, 2023.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">S. Al-Mansoori and M. B. Salem, “The Role of Artificial Intelligence and Machine Learning in Shaping the Future of Cybersecurity: Trends, Applications, and Ethical Considerations,” Int. J. Soc. Analytics, vol. 8, no. 9, pp. 1–16, 2023.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">M. S. Akhtar and T. Feng, “An overview of the applications of Artificial Intelligence in Cybersecurity,” EAI Endorsed Trans. Creat. Technol., vol. 8, no. 29, p. e4, 2021.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">A. D. Sontan and S. V. Samuel, “The intersection of Artificial Intelligence and cybersecurity: Challenges and opportunities,” World J. Adv. Res. Rev., vol. 21, no. 2, pp. 1720–1736, 2024.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">M. M. Yamin, M. Ullah, H. Ullah, and B. Katt, “Weaponized AI for cyber attacks,” J. Inf. Secur. Appl., vol. 57, p. 102722, 2021.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">G. Apruzzese, L. Ferretti, M. Marchetti, M. Colajanni, and A. Guido, “On the effectiveness of machine and deep learning for cyber security,” in 10th Int. Conf. Cyber Conflict (CyCon), IEEE, pp. 371–390, 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">R. Kaur, D. Gabrijelčić, and T. Klobučar, “Artificial intelligence for cybersecurity: Literature review and future research directions,” Inf. Fusion, vol. 97, p. 101804, 2023.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">J. Doshi and B. Trivedi, “Comparison of vulnerability assessment and penetration testing,” Int. J. Appl. Inf. Syst., vol. 8, no. 6, pp. 51–54, 2015.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">Ö. Aslan, S. S. Aktuğ, M. Ozkan-Okay, A. A. Yilmaz, and E. Akin, “A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions,” Electronics, vol. 12, no. 6, p. 1333, 2023.</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">S. Kuipers and M. Schonheit, “Data breaches and effective crisis communication: a comparative analysis of corporate reputational crises,” Corp. Reputation Rev., vol. 25, no. 3, pp. 176–197, 2022.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">U. Bansal, “A review on ransomware attack,” in 2nd Int. Conf. Secure Cyber Comput. Commun. (ICSCCC), IEEE, pp. 221–226, 2021.</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">OWASP, “Top 10 Web Application Security Risks,” OWASP, 2017. [Online]. Available: https://owasp.org/www-project-top-ten/2017/.</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">OWASP, “Top 10 Web Application Security Risks,” OWASP, 2024. [Online]. Available: https://owasp.org/Top10/.</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">OWASP, “API Security Top 10 – 2023 Edition,” OWASP, 2024. [Online]. Available: https://owasp.org/API-Security/editions/2023/en/0x11-t10/.</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">P. Radanliev and O. Santos, “Adversarial Attacks Can Deceive AI Systems, Leading to Misclassification or Incorrect Decisions,” Preprints, 2023.</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">U. Ahmed, M. Nazir, A. Sarwar et al., “Signature-based intrusion detection using machine learning and deep learning approaches empowered with fuzzy clustering,” Sci. Rep., vol. 15, p. 1726, 2025.</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">V. Kanimozhi and D. T. P. Jacob, “Calibration of various optimized machine learning classifiers in network intrusion detection system on the realistic cyber dataset CseCic-Ids2018 using cloud computing,” Int. J. Eng. Appl. Sci. Technol., vol. 4, pp. 209–213, 2019.</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">A. Verma and V. Ranga, “On evaluation of network intrusion detection systems: statistical analysis of CIDDS-001 dataset using machine learning techniques,” Pertanika J. Sci. Technol., vol. 26, pp. 1307–1332, 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref26">
                        <label>26</label>
                        <mixed-citation publication-type="journal">W. Yassin, N. I. Udzir, and Z. Muda, “Anomaly-based intrusion detection through Kmeans clustering and Naive Bayes classification,” in Proc. 4th Int. Conf. Comput. Informatics (ICOCI), 2013.</mixed-citation>
                    </ref>
                                    <ref id="ref27">
                        <label>27</label>
                        <mixed-citation publication-type="journal">I. F. Kilincer, F. Ertam, and A. Sengur, “Machine learning methods for cyber security intrusion detection: Datasets and comparative study,” Comput. Netw., vol. 188, p. 107840, 2021.</mixed-citation>
                    </ref>
                                    <ref id="ref28">
                        <label>28</label>
                        <mixed-citation publication-type="journal">K. Kurniabudi, D. Stiawan, D. Darmawijoyo, M. Y. B. Idris, B. Kerim, and R. Budiarto, “Important features of CICIDS-2017 dataset for anomaly detection in high dimension and imbalanced class dataset,” Indones. J. Electr. Eng. Inform., vol. 9, no. 2, pp. 498–511, 2021.</mixed-citation>
                    </ref>
                                    <ref id="ref29">
                        <label>29</label>
                        <mixed-citation publication-type="journal">M. L. Ali, K. Thakur, S. Schmeelk, J. Debello, and D. Dragos, “Deep learning vs. machine learning for intrusion detection in computer networks: A comparative study,” Appl. Sci., vol. 15, no. 4, p. 1903, 2025.</mixed-citation>
                    </ref>
                                    <ref id="ref30">
                        <label>30</label>
                        <mixed-citation publication-type="journal">R. A. Disha and S. Waheed, “Performance analysis of machine learning models for intrusion detection system using Gini Impurity-based Weighted Random Forest (GIWRF) feature selection technique,” Cybersecurity, vol. 5, no. 1, p. 1, 2022.</mixed-citation>
                    </ref>
                                    <ref id="ref31">
                        <label>31</label>
                        <mixed-citation publication-type="journal">O. Edosa, P. E. Orukpe, and U. Iruansi, “Design and implementation of a deep neural network approach for intrusion detection systems,” e-Prime – Adv. Electr. Eng., Electron. Energy, vol. 7, p. 100434, 2024.</mixed-citation>
                    </ref>
                                    <ref id="ref32">
                        <label>32</label>
                        <mixed-citation publication-type="journal">F. Idhammad, M. Bakkali, and M. Elghazi, “Deep learning for cybersecurity intrusion detection: Approaches, datasets, and comparative study,” Comput. Secur., vol. 123, p. 102968, 2023.</mixed-citation>
                    </ref>
                                    <ref id="ref33">
                        <label>33</label>
                        <mixed-citation publication-type="journal">S. Mishra, “Exploring the impact of AI-based cyber security financial sector management,” *Applied Sciences*, vol. 13, no. 10, p. 5875, 2023. doi:10.3390/app13105875</mixed-citation>
                    </ref>
                                    <ref id="ref34">
                        <label>34</label>
                        <mixed-citation publication-type="journal">A. Z. Alomari and M. H. Alshammari, “Cybersecurity applications of machine learning: State of the art and challenges,” Cybersecurity, vol. 3, no. 1, p. 1, 2020.</mixed-citation>
                    </ref>
                                    <ref id="ref35">
                        <label>35</label>
                        <mixed-citation publication-type="journal">S. P. Singh and N. Afzal, “THE MESA SECURITY MODEL 2.0: A DYNAMIC FRAMEWORK FOR MITIGATING STEALTH DATA EXFILTRATION,” *Int. J. Network Security &amp; Its Applications*, vol. 16, no. 3, May 2024, doi:10.5121/ijnsa.2024.16302</mixed-citation>
                    </ref>
                                    <ref id="ref36">
                        <label>36</label>
                        <mixed-citation publication-type="journal">H. Yin, D. He, S. Qian, J. Liu, and K. Wang, “A survey on cybersecurity intrusion detection based on deep learning,” J. Cyber Secur. Technol., vol. 5, no. 4, pp. 231–255, 2021.</mixed-citation>
                    </ref>
                                    <ref id="ref37">
                        <label>37</label>
                        <mixed-citation publication-type="journal">K. Tallam, “CyberSentinel: An Emergent Threat Detection System for AI Security,” *arXiv*, Feb. 20, 2025. Available: https://arxiv.org/abs/2502.14966</mixed-citation>
                    </ref>
                                    <ref id="ref38">
                        <label>38</label>
                        <mixed-citation publication-type="journal">T. M. Nguyen, D. T. Nguyen, and S. Y. Shin, “A comprehensive review of machine learning for cybersecurity,” IEEE Access, vol. 9, pp. 88968–89004, 2021.</mixed-citation>
                    </ref>
                                    <ref id="ref39">
                        <label>39</label>
                        <mixed-citation publication-type="journal">ISACA, “Adaptive Access Control: Navigating Cybersecurity in the Era of AI and Zero Trust,” *ISACA Now Blog*, Apr. 2025. [Online]. Available: https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2025/adaptive-access-control-navigating-cybersecurity-in-the-era-of-ai-and-zero-trust</mixed-citation>
                    </ref>
                                    <ref id="ref40">
                        <label>40</label>
                        <mixed-citation publication-type="journal">M. Seo, W. Choi, M. You, and S. Shin, “AutoPatch: Multi‑Agent Framework for Patching Real‑World CVE Vulnerabilities,” *arXiv*, May 2025. Available: https://arxiv.org/abs/2505.04195</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
