Vol. 1 No. 1 (2026): January 2026
Artificial Intelligence : Technology

AI-Driven Approaches for Developing Effective Cybersecurity Policies and Procedures

P Bhanu Prakash
Department of CSE (IoT, Cyber Security including Block Chain Technology), Annamacharya Institute of Technology & Sciences (Autonomous), Tirupati, Andra Pradesh, India
S Siva Sankar
Department of CSE (IoT, Cyber Security including Block Chain Technology), Annamacharya Institute of Technology & Sciences (Autonomous), Tirupati, Andra Pradesh, India
P Sudarshan
Department of CSE (IoT, Cyber Security including Block Chain Technology), Annamacharya Institute of Technology & Sciences (Autonomous), Tirupati, Andra Pradesh, India
G Mohan Krishna
Department of CSE (IoT, Cyber Security including Block Chain Technology), Annamacharya Institute of Technology & Sciences (Autonomous), Tirupati, Andra Pradesh, India
V Revanth Sai
Department of CSE (IoT, Cyber Security including Block Chain Technology), Annamacharya Institute of Technology & Sciences (Autonomous), Tirupati, Andra Pradesh, India

Published 2026-02-08

Keywords

  • Artificial Intelligence,
  • Cybersecurity Policy,
  • Machine Learning,
  • Support Vector Machine,
  • Policy Automation,
  • Threat Detection,
  • Governance Frameworks
  • ...More
    Less

How to Cite

P Bhanu Prakash, S Siva Sankar, P Sudarshan, G Mohan Krishna, & V Revanth Sai. (2026). AI-Driven Approaches for Developing Effective Cybersecurity Policies and Procedures. Milestone Transactions on Artificial Intelligence, 1(1), 65–77. https://doi.org/10.5281/zenodo.18525711

Abstract

The increasing complexity of cyber threats, coupled with the rapidly increasing pace of digital transformation fueled by cloud computing, IoT, and interconnected enterprise systems, has exposed the limitations of traditional, static cybersecurity policies and procedures. Traditional approaches are largely manual and compliance-oriented, and are not dynamic enough to keep up with the ever-changing nature of cyber threats such as zero-day attacks, advanced persistent threats, and AI-powered social engineering. Our objectives are to design an AI framework for automated generation of cybersecurity policies and procedures, enabling intelligent, data-driven, and dynamic policy design. The proposed system employs Natural Language Processing (NLP) for policy knowledge extraction and a Support Vector Machine (SVM) classifier for policy component classification and validation based on relevance, compliance level, and organizational context. The system design has four layers: input and knowledge acquisition, feature engineering, AI-based decision modeling, and automated policy generation with version control. The experimental results on the NSL-KDD dataset demonstrated that the SVM classifier outperforms Logistic Regression, XGBoost, and Random Forest in terms of accuracy, achieving 99-100%, validating the effectiveness of the proposed system in detecting threat patterns that can serve as a basis for policy formulation. The analysis using the confusion matrix and ROC curve shows that the model is stable, with low false-negative rates, which is significant for proactive cybersecurity governance. The research also considers governance, ethics, and compliance by aligning AI-based policy mechanisms with existing standards such as NIST CSF and ISO. The findings show that AI can play an important role in making policies more responsive, reducing human error, improving compliance, and making policies evolve.

References

  1. Sharma, R., & Gupta, A. (2025). Artificial intelligence and machine learning in cybersecurity: A deep dive into state-of-the-art techniques and future paradigms. Journal of Cybersecurity Research, 12(3), 45–63.
  2. Patel, S., Singh, V. R., & Choudhury, M. (2025). Leveraging AI for enhanced cybersecurity: A comprehensive review. International Journal of Computer Applications, 178(8), 1–15.
  3. Kumar, L., & Das, P. (2025). Generative AI revolution in cybersecurity: A comprehensive review of threat intelligence and operations. Computers & Security, 112, 102–118.
  4. Verma, A. R. (2025). AI-driven cyber threat prediction and procedural optimization. Journal of Information Security and Applications, 67, 103–120.
  5. Chatterjee, M., & Banerjee, S. (2025). AI-based cybersecurity policies and procedures. International Journal of Intelligent Systems, 40(2), 210–230.
  6. Singh, R., & Roy, T. (2025). Artificial intelligence in cybersecurity: Legal and ethical challenges in regulating autonomous defense systems. Cybersecurity Law Review, 8(1), 55–72.
  7. Nair, P., & Sinha, K. (2025). Policy framework for responsible AI deployment in national cybersecurity strategy. Asian Journal of Advanced Research & Reports, 15(4), 77–95.
  8. Das, S. K., & Jain, A. (2025). Artificial intelligence in cybersecurity: Risk, governance, and trust frameworks. International Journal of Financial and Management Research, 14(6), 1–18.
  9. Verma, N., & Mehta, R. (2025). Organizational adaptation to generative AI in cybersecurity: A systematic review. Computers in Industry, 145, 103–121.
  10. Gupta, A., & Sharma, M. (2025). A cybersecurity AI agent selection and decision support framework. Journal of Information Security, 33(4), 89–105.
  11. Radanliev, P., Santos, O., & Ani, U. D. (2025). Generative AI cybersecurity and resilience. Frontiers in Artificial Intelligence, 8, 1568360.
  12. Li, T., Yang, Y.-T., Pan, Y., & Zhu, Q. (2025). From texts to shields: Convergence of large language models and cybersecurity (arXiv Preprint No. arXiv:2505.00841). arXiv.
  13. Mohamed, N. (2025). Artificial intelligence and machine learning in cybersecurity: A deep dive into state-of-the-art techniques and future paradigms. Knowledge and Information Systems, 1–87.
  14. McIntosh, T. R., et al. (2024). From COBIT to ISO 42001: Evaluating cybersecurity frameworks for opportunities, risks, and regulatory compliance in commercializing large language models. Computers & Security, 144, 103964.
  15. Gupta, B. B., Gaurav, A., & Arya, V. (2024). Navigating the security landscape of large language models in enterprise information systems. Enterprise Information Systems, 18(4), 2310846.
  16. Casamassa, J., Wang, W., & Masialeti, M. (2025). Generative AI governance for cybersecurity: An integrated approach. Issues in Information Systems, 26(3), 484–493.
  17. Kulothungan, V. (2024). Securing the AI frontier: Urgent ethical and regulatory imperatives for AI-driven cybersecurity. In Proceedings of the IEEE International Conference on Big Data (BigData) (pp. 5602–5609). IEEE.
  18. Adapala, S. T. R., & Alugubelly, Y. R. (2025). The Aegis Protocol: A foundational security framework for autonomous AI agents (arXiv Preprint No. arXiv:2508.19267). arXiv.
  19. Malatji, M., & Tolah, A. (2025). Artificial intelligence (AI) cybersecurity dimensions: A comprehensive framework for understanding adversarial and offensive AI. AI and Ethics, 5(2), 883–910.
  20. Becher, T., & Torka, S. (2024). Exploring AI-enabled cybersecurity frameworks: Deep-learning techniques, GPU support, and future enhancements (arXiv Preprint No. arXiv:2412.12648). arXiv.
  21. Khan, S. B., Tikotikar, A., DR, K. R., Ahmed, S. T., Albalawi, E., Qusaim, T., & Basheer, S. (2025). Telemedicine via Edge-Cloud Healthcare: A Federated Semi Supervised Learning Resource Recommendation Approach towards Building Sustainable Framework. IEEE Transactions on Consumer Electronics.
  22. Fatima, N., Noorain, A., Ahmed, S. T., & Siddiqha, S. A. (2025, December). Automated Medical System for Rural Communities to Provide Medication without Human Interruption Using Machine Learning Techniques. In 2025 IEEE 5th International Conference on ICT in Business Industry & Government (ICTBIG) (pp. 1-5). IEEE.
  23. Girija, S. H., Khanum, H., Sinchana, B., Ahmed, S. T., & Rashmi, C. (2025, August). Dynamic Network Traffic Anomaly Detection Using Machine Learning. In 2025 International Conference on Artificial Intelligence and Machine Vision (AIMV) (pp. 1-6). IEEE.
  24. Bhavana, N., Guthur, A. S., Reddy, K. S., Ahmed, S. T., & Ahmed, A. (2025). Cognizance through Convolution: A Deep Learning Approach for Emotion Recognition via Convolutional Neural Networks. Procedia Computer Science, 259, 1336-1345.