IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Generative AI for Threat Intelligence and Information Sharing

Generative AI for Threat Intelligence and Information Sharing
View Sample PDF
Author(s): Siva Raja Sindiramutty (Taylor's University, Malaysia), Krishna Raj V. Prabagaran (Universiti Malaysia Sarawak, Malaysia), N. Z. Jhanjhi (Taylor's University, Malaysia), Raja Kumar Murugesan (Taylor's University, Malaysia), Sarfraz Nawaz Brohi (University of the West of England, UK)and Goh Wei Wei (Taylor's University, Malaysia)
Copyright: 2025
Pages: 44
Source title: Utilizing Generative AI for Cyber Defense Strategies
Source Author(s)/Editor(s): Noor Zaman Jhanjhi (Taylor's University, Malaysia)
DOI: 10.4018/979-8-3693-8944-7.ch006

Purchase

View Generative AI for Threat Intelligence and Information Sharing on the publisher's website for pricing and purchasing information.

Abstract

Collaboration in providing threat intelligence and disseminating information enables cyber security professionals to embrace digital security most successfully, whose risks are ever-changing. This article dwells on the capacity of machine intelligence to change information security by categorising indicators of compromise (IOC) and threat actors, then highlights the limits of traditional methods. Among Artificial intelligence tools such as generative adversarial networks (GANs) and Variational autoencoders (VAEs), which are the key innovators, one can create synthetic or fake threat data that emulates real attack scenarios in the past. This allows cyber-related risks to be analysed differently from before. In addition, this feature enables secure stakeholder collaborations. It is also meant mainly for factual data that protects private information but allows the exchange of helpful information. It is clear from the fact that showcasing real-world examples demonstrates Al's automation through cybersecurity detection.

Related Content

Mohammed Adi Al Battashi, Mohamad A. M. Adnan, Asyraf Isyraqi Bin Jamil, Majid Adi Al-Battashi. © 2026. 30 pages.
Potchong M. Jackaria, Al-adzran G. Sali, Hana An L. Alvarado, Rashidin H. Moh. Jiripa, Al-sabrie Y. Sahijuan. © 2026. 26 pages.
Elizabeth Gross. © 2026. 30 pages.
Siti Nazleen Abdul Rabu, Xie Fengli, Ng Man Yi. © 2026. 44 pages.
Mohammed Abdul Wajeed. © 2026. 30 pages.
Aldammien A. Sukarno, Al-adzkhan N. Abdulbarie, Wati Sheena M. Bulkia, Potchong M. Jackaria. © 2026. 24 pages.
Abdulla Sultan Binhareb Almheiri, Humaid Albastaki, Hanadi Alrashdan. © 2026. 26 pages.
Body Bottom