Cybersecurity Threats And Defenses In The Generative AI Era

Authors

  • Ginne M James Sri Ramakrishna College of Arts & Science, Coimbatore, India Author

Keywords:

Generative AI, Cybersecurity, Large Language Models, Adversarial Machine Learning, Deepfake Detection, AI-Powered Threats, Neural Network Defense, Phishing Detection

Abstract

The rapid proliferation of generative artificial intelligence (GenAI) technologies, including large language models (LLMs) and generative adversarial networks (GANs), has fundamentally transformed the cybersecurity landscape by simultaneously empowering sophisticated attack vectors and enabling advanced defensive mechanisms. This paper presents a comprehensive analysis of emerging cybersecurity threats catalyzed by generative AI, encompassing AI-generated phishing campaigns, deepfake-based social engineering, automated malware generation, and adversarial exploitation techniques. Concurrently, it examines AI-enhanced defense strategies, including transformer-based threat detection, adversarial training for model robustness, and neural network-driven intrusion detection systems. Through a systematic taxonomy of AI-powered threats and a comparative evaluation of traditional versus AI-augmented defense mechanisms, this study quantifies the paradigm shift in attack sophistication and defense efficacy. Findings reveal that AI-enhanced defenses achieve detection rate improvements ranging from 22.4% to 33.4% over traditional methods across phishing, malware, intrusion, and deepfake detection domains. The paper further discusses regulatory frameworks, ethical considerations, and future research directions essential for maintaining cybersecurity resilience in an AI-driven threat environment.

Author Biography

  • Ginne M James, Sri Ramakrishna College of Arts & Science, Coimbatore, India

    Assistant Professor & Head, Department of BCA AI

Downloads

Published

2026-04-09

Issue

Section

Articles

How to Cite

Cybersecurity Threats And Defenses In The Generative AI Era. (2026). Peer-Reviewed Journal of Computer Science (PRJCS), 1(4), 7-13. https://peerreviewjournal.in/index.php/prjcs/article/view/37

Most read articles by the same author(s)