Artificial intelligence algorithms in automated cyber incident response
DOI:
https://doi.org/10.37868/sei.v7i2.id622Abstract
Advancements in cyber threats that are becoming more complicated and frequent have highlighted the need for intelligent and automated incident response systems, particularly in a high-risk region such as Ukraine. This experiment seeks to answer whether artificial intelligence (AI) algorithms are practical in cyber incident detection and response automation based on a custom dataset created with a focus on addressing the Ukraine threat situation, reflecting its particularities, and on a general-purpose benchmark dataset, CICIDS2017. Three AI models, Support Vector Machine (SVM), Random Forest (RF), and Long Short-Term Memory (LSTM), were considered in terms of accuracy of detection, F1-score, and the response time. Among these, LSTM was the best, showing a detection accuracy of 96.3%, because it is robust in identifying patterns in sequential attacks. RF had an optimal balance between performance and computational efficiency, where SVM was found to be moderate, particularly for less complex attacks. These findings show that the approach of using AI can be viable in future responses in strengthening the cybersecurity infrastructures of a nation. In addition, the study has practical implications for not only centralized systems but also resource-limited settings. It opens the way to further investigations on real-time implementation as well as hybrid AI model development.
Published
How to Cite
Issue
Section
Copyright (c) 2025 Olha Suprun, Serhii Zybin, Oleksandr Vlasenko, Taras Khometa, Alla Romaniuk

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.





