LEVERAGING ARTIFICIAL INTELLIGENCE IN THREAT MODELING: ADVANCEMENTS, BENEFITS, AND CHALLENGES
DOI:
https://doi.org/10.34218/IJCET_16_01_146Keywords:
AI-Driven Threat Modeling, Cybersecurity Risk Assessment, Machine Learning In Security, Automated Vulnerability Detection, Human-AI Collaboration In CybersecurityAbstract
This article explores the transformative impact of artificial intelligence on threat modeling in cybersecurity. It begins by examining the fundamentals of threat modeling, including key methodologies and principles, before delving into the integration of AI-driven tools in this critical security practice. The article discusses various AI applications in threat modeling, such as automated threat identification, enhanced risk assessment, and mitigation recommendations. It highlights the significant benefits of AI-powered approaches, including increased efficiency, improved accuracy, and the ability to handle complex, large-scale systems. However, the article also addresses the challenges associated with implementing AI in threat modeling, such as data quality concerns, result interpretability, and the risk of over-reliance on automated systems. Looking ahead, the article explores future directions in AI-driven threat modeling, including the development of more sophisticated AI models, the integration of advanced machine learning techniques, and the potential for stronger synergies between AI systems and human security experts. Throughout, the article emphasizes the importance of balancing AI capabilities with human expertise to create more robust and comprehensive threat modeling practices in an increasingly complex digital landscape.
References
Katanosh Morovat, Brajendra Panda ,”A Survey Of Artificial Intelligence In Cybersecurity “. 2020 International Conference on Computational Science and Computational Intelligence (CSCI). [Online] Available: https://american-cse.org/sites/csci2020proc/pdfs/CSCI2020-6SccvdzjqC7bKupZxFmCoA/762400a109/762400a109.pdf
Shostack, A. (2014). Threat Modeling: Designing for Security. John Wiley & Sons. [Online] Available: https://www.threatmodelingbook.com
Microsoft. (2023). “Microsoft Threat Modeling Tool threats”. [Online] Available: https://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-threats#stride-model
IBM (2024). “Cost of a Data Breach Report. IBM Security”. [Online] Available: https://www.ibm.com/security/data-breach
Shuiqiao Yang, et al. (2024). "ThreatModeling-LLM: Automating Threat Modeling using Large Language Models for Banking System” [Online] Available: https://arxiv.org/pdf/2411.17058
McDaniel, P., Launchbury, J., Martin, B., Wang, C. and Kautz, H., 2020. Artificial intelligence and cyber security: opportunities and challenges technical workshop summary report. Networking & Information Technology Research And Development Subcommittee And The Machine Learning & Artificial Intelligence Subcommittee Of The National Science & Technology Council. [Online] Available: https://par.nsf.gov/biblio/10173547
Cloud security Alliance. (2024). “The State of AI and Security Survey Report” [Online] Available: https://cloudsecurityalliance.org/artifacts/the-state-of-ai-and-security-survey-report
Folorunso, Adebola, et al. "Impact of AI on cybersecurity and security compliance." Global Journal of Engineering and Technology Advances 21.01 (2024): 167-184. [Online] Available: https://www.researchgate.net/profile/Adebola-Folorunso/publication/385558741_Impact_of_AI_on_cybersecurity_and_security_compliance/links/672aa97677b63d1220dce1fe/Impact-of-AI-on-cybersecurity-and-security-compliance.pdf
Familoni BT. “Cybersecurity challenges in the age of AI: theoretical approaches and practical solutions”. Computer Science & IT Research Journal. 2024 Mar 22;5(3):703-24.[Online] Available: https://fepbl.com/index.php/csitrj/article/view/930
Visory, “The Future of AI in Cybersecurity”. Jan 29th, 2024. [Online] Available:https://visory.net/the-future-of-ai-in-cybersecurity/
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Bhooshan Ravikumar Gadkari (Author)

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.