  <?xml version="1.0"?>
<journal>
 <journal_metadata>
  <full_title>Journal of Cybersecurity and Information Management</full_title>
  <abbrev_title>JCIM</abbrev_title>
  <issn media_type="print">2690-6775</issn>
  <issn media_type="electronic">2769-7851</issn>
  <doi_data>
   <doi>10.54216/JCIM</doi>
   <resource>https://www.americaspg.com/journals/show/3154</resource>
  </doi_data>
 </journal_metadata>
 <journal_issue>
  <publication_date media_type="print">
   <year>2019</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2019</year>
  </publication_date>
 </journal_issue>
 <journal_article publication_type="full_text">
  <titles>
   <title>The Challenge of Adversarial Attacks on AI-Driven Cybersecurity Systems</title>
  </titles>
  <contributors>
   <organization sequence="first" contributor_role="author">Associate Professor, Department of CSE, Koneru Lakshmaiah Education Foundation Vaddeswaram, AP, India</organization>
   <person_name sequence="first" contributor_role="author">
    <given_name>M.</given_name>
    <surname>M.</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Professor, Dept. of EEE, Mailam Engineering College, Villupuram, TN, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>A. Jeraldine</given_name>
    <surname>Viji</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Associate Professor, Department of Computer Science and Engineering, Guru Ghasidas Vishwavidyalaya (A Central University), Bilaspur, (C G), India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Amit Kumar</given_name>
    <surname>Chandanan</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Senior Assistant Professor, School of Computer Science Engineering and Artificial intelligence (SCAI), VIT-Bhopal University, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Vijay</given_name>
    <surname>Birchha</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Assistant Professor (Computer Science), College of Community Science, Central Agricultural University, Tura, Meghalaya, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Tushar Kumar</given_name>
    <surname>Pandey</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Assistant professor, Department of Computer Science and Engineering, Bhilai Institute of Technology Durg, Chhattisgarh, 491001, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Sumit Kumar</given_name>
    <surname>Sar</surname>
   </person_name>
  </contributors>
  <jats:abstract xml:lang="en">
   <jats:p>As AI is deployed increasingly in defensive systems, hostile assaults have increased. AI-driven defensive systems are vulnerable to attacks that exploit flaws. This article examines the approaches used to resist AI-based cybersecurity systems and their effects on security. This paper examines existing literature and case studies to demonstrate how attackers modify AI models. These include avoidance, poisoning, and data-driven assaults. It also considers data breaches, system failures, and unauthorized access if a hostile effort succeeds. The report recommends adversarial training, model testing, and input sanitization to address these issues. It also stresses the need for monitoring and updating AI algorithms to adapt to changing opponent tactics. This paper emphasizes the need to limit hostile strike threats using real-life examples and statistics. To defend AI-driven cybersecurity systems from complex threats, cybersecurity specialists, AI researchers, and policymakers must collaborate across domains. This article provides full guidance for cybersecurity and AI professionals. It describes the complex issues adversarial assaults create and proposes a flexible and robust architecture to safeguard AI-driven cybersecurity systems from emerging threats.</jats:p>
  </jats:abstract>
  <publication_date media_type="print">
   <year>2025</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2025</year>
  </publication_date>
  <pages>
   <first_page>288</first_page>
   <last_page>297</last_page>
  </pages>
  <doi_data>
   <doi>10.54216/JCIM.150123</doi>
   <resource>https://www.americaspg.com/articleinfo/2/show/3154</resource>
  </doi_data>
 </journal_article>
</journal>
