AI-Powered Patch Management: Reducing Vulnerabilities in Operating Systems
DOI:
https://doi.org/10.53555/ephijse.v10i3.287Keywords:
AI-driven patching, , automated vulnerability management, OS security, predictive patchingAbstract
A vital part of cybersecurity, patch management ensures that running systems remain secure and strong against always developing vulnerabilities. Typical challenges for traditional patching systems include delayed updates, compatibility issues, and resource-intensive deployment. By automating the detection, prioritization & the execution of patches, AI-driven patch management is transforming this field & therefore reducing human participation & the errors. Artificial intelligence can quickly find the weaknesses, assess probable hazards & apply the improvements in a more strategic & effective manner by means of predictive analytics & machine learning. This improves security & lowers system outage, thereby helping businesses to maintain the operational continuity. Furthermore, artificial intelligence-enabled patching guarantees that necessary security enhancements are given to systems before possible exploitation and greatly speeds up the deployment process. Recent case studies show that artificial intelligence-driven patch management shortens patch deployment time by 60%, therefore optimizing updates and preserving dependability even. Businesses have to embrace intelligent automation if they are to stay competitive given the complexity of cyberattacks. AI-driven solutions provide a proactive approach for the vulnerability management as they ensure that running systems are constantly upgraded with little interruption. Including artificial intelligence into patch management improves security, lowers manual labor and maximizes the general IT performance.
References
Goswami, MaloyJyoti. "Utilizing AI for Automated Vulnerability Assessment and Patch Management." Eduzone (2019).
Abbas, Zafer, and Muhammad Aslam. "AI-Powered Cybersecurity: Addressing Vulnerabilities and Emerging Threats in Modern Organizations." (2023).
Wang, Bo-Xiang, Jiann-Liang Chen, and Chiao-Lin Yu. "An AI-powered network threat detection system." IEEE Access 10 (2022): 54029-54037.
Komaragiri, Venkata Bhardwaj, and Andrew Edward. "AI-Driven Vulnerability Management and Automated Threat Mitigation." International Journal of Scientific Research and Management (IJSRM) 10.10 (2022): 981-998.
Veprytska, Olena, and Vyacheslav Kharchenko. "AI powered attacks against AI powered protection: classification, scenarios and risk analysis." 2022 12th International Conference on Dependable Systems, Services and Technologies (DESSERT). IEEE, 2022.
Kaul, Deepak, and Rahul Khurana. "AI to detect and mitigate security vulnerabilities in APIs: encryption, authentication, and anomaly detection in enterprise-level distributed systems." Eigenpub Review of Science and Technology 5.1 (2021): 34-62.
Jaber, Aws, and Lothar Fritsch. "Towards ai-powered cybersecurity attack modeling with simulation tools: Review of attack simulators." International Conference on P2P, Parallel, Grid, Cloud and Internet Computing. Cham: Springer International Publishing, 2022.
Koumoutzelis, Stylianos, et al. "Security issues of GPUs and FPGAs for AI-powered near & far edge services." European Conference on Cyber Warfare and Security. Vol. 22. Academic Conferences International Limited, 2023.
Kaloudi, Nektaria, and Jingyue Li. "The ai-based cyber threat landscape: A survey." ACM Computing Surveys (CSUR) 53.1 (2020): 1-34.
Ganapathy, Apoorva. "AI fitness checks, maintenance and monitoring on systems managing content & data: A study on CMS world." Malaysian Journal of Medical and Biological Research 2.2 (2015): 113-118.
Balaganski, Alexie. "API Security Management." KuppingerCole Report 70958 (2015): 20-27.
MacDonald, Callan Smith. "The Convergence of Artificial Intelligence and Blockchain in Healthcare: A Critical." Innovation 8.3 (2013): 108-115.
Kolluri, Venkateswaranaidu. "a Pioneering Approach To Forensic Insights: Utilization Ai for Cybersecurity Incident Investigations." IJRAR-International Journal of Research and Analytical Reviews (IJRAR), E-ISSN (2016): 2348-1269.
Baber Khan, Muhammad Faiz. "Spring Boot and Microservices: Accelerating Enterprise-Grade Application Development." (2016).
Reddya, T. Rama Subba, et al. "Fuzzy Controller-Based Sensor less Control Strategy for AC-DC Boost Converter, Voltage and Current Monitoring-Free Solution." Inspiring Soul 3.2 (2015): 63.