HYBRID CYBERSECURITY STRATEGIES FOR WEB APPLICATIONS USING ARTIFICIAL INTELLIGENCE

Authors

  • Kostiantyn Savchuk Lviv Polytechnic National University

DOI:

https://doi.org/10.28925/2663-4023.2025.31.969

Keywords:

web security, OWASP Top 10, artificial intelligence/machine learning, anomaly detection, attack classification, WAF, SIEM/SOAR, HTTP embeddings, graph neural networks

Abstract

Web applications form the foundation of most digital services and remain primary targets for SQLi, XSS, CSRF, IDOR, SSRF, and DDoS attacks. The expansion of cloud technologies and API-driven architectures increases risk, while artificial intelligence (AI) offers new opportunities for detection and response. This article examines a reproducible security framework that maps the OWASP Top 10 risks to protocol-dependent control measures and supplementary AI signals, clarifying where AI adds the greatest value without incurring excessive operational costs. The study presents a structured review of OWASP recommendations, industry reports, and academic research (including HTTP request embeddings, online anomaly detection, and graph neural networks). It defines comparative criteria emphasizing attack coverage, precision-recall for imbalanced data, false positive rate, and detection latency—illustrated through practical examples of “baseline controls + AI monitoring.” The paper aligns common web threats with fundamental protection elements (validation, CSP, parameterized queries, MFA, SameSite and short-lived tokens, WAF, TLS/HSTS, and egress restrictions) and AI applications (HTTP embeddings, session/behavioral features, log sequence models). It recommends precision-recall and streaming metrics such as NAB for early and accurate alerts. Reported operational benefits include fewer account takeovers, approximately 60% fewer false positives, around 40% faster investigations, and prevention of large-scale data breaches when AI complements established controls. AI strengthens—but does not replace—baseline defense mechanisms. A hybrid strategy is recommended: maintain a strong foundational security posture, integrate high-quality AI signals via SIEM/SOAR, and invest in MLOps, interpretability, and privacy-preserving learning. Future work should focus on web-specific tests and rigorous, reproducible evaluations to bridge the gap between research and practical deployment.

Keywords: web security, OWASP Top 10, artificial intelligence/machine learning, anomaly detection, attack classification, WAF, SIEM/SOAR, HTTP embeddings, graph neural networks.

Downloads

Download data is not yet available.

References

OWASP Foundation. (2025). OWASP Top 10. Retrieved from https://owasp.org/Top10/

Qualys Blog. (2025, April 18). AI Security Monitoring. https://blog.qualys.com/product-tech/2025/04/18/ai-security-monitoring

Fortinet. (2025). Artificial Intelligence in Cybersecurity (Cyber Glossary). https://www.fortinet.com/resources/cyberglossary/artificial-intelligence-in-cybersecurity

AI Multiple. (2025). AI Cybersecurity Use Cases. https://research.aimultiple.com/ai-cybersecurity-use-cases/

Al-Shaer, E.. (2021). AI/ML for Network Security: A Survey (Version 1). arXiv. https://arxiv.org/abs/2108.01763

Mirsky, Y., G. E. & Elovici, Y. (2018). Kitsune: An Ensemble of Autoencoders for Network Intrusion Detection. In Network and Distributed System Security Symposium (NDSS). https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018_03A-3_Mirsky_paper.pdf

Zubair, M., & Awan, M. S. (2022). Ensemble Learning for Intrusion Detection: A Survey. Computer Networks, 214, 109156. https://doi.org/10.1016/j.comnet.2022.109156

Taranenko, Y. V. (2024). Artificial Intelligence in Cybersecurity: Threats and Opportunities. Systemy Zakhystu Informatsii, 4, 94-102. (Title/Source inferred from URL structure). http://www.irbis-nbuv.gov.ua/cgi-bin/irbis_nbuv/cgiirbis_64.exe?I21DBN=LINK&P21DBN=UJRN&Z21ID=&S21REF=10&S21CNR=20&S21STN=1&S21FMT=ASP_meta&C21COM=S&2_S21P03=FILA=&2_S21STR=szi_2024_4_11

Google Trends. (2025). Explore: cybersecurity AI. https://trends.google.com/trends/explore?date=today%205-y&q=cybersecurity%20AI&hl=en

Ferrag, M. A., & Mourtada, S. M. (2020). Intrusion detection for wireless body area networks: A comprehensive review. Computer Communications, 156, 12-25. https://doi.org/10.1016/j.comcom.2020.03.012

Gao, S., M. C., & M. S. (2015). A Novel Anomaly Detection Scheme based on the Combination of CNN and LSTM. PLoS ONE, 10(3), e0118432. https://doi.org/10.1371/journal.pone.0118432

Ma, J., F. L., J. X., & W. T. (2024). A novel attack detection approach for industrial internet of things security. Computer Communications, 223, 1-10. https://doi.org/10.1016/j.comcom.2024.03.012

Downloads


Abstract views: 0

Published

2025-12-16

How to Cite

Savchuk, K. (2025). HYBRID CYBERSECURITY STRATEGIES FOR WEB APPLICATIONS USING ARTIFICIAL INTELLIGENCE. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 3(31), 323–332. https://doi.org/10.28925/2663-4023.2025.31.969