Design and Development of Artificial Intelligence Knowledge Processing System for Optimizing Security of Software Systems

  • Authors

    • Blessling Nova Department of Data Science, Nnamdi Azikiwe University, Awka, Nigeria. Author
    • Dr. Tunde Ogunleye Department of Computer Science, University of Nigeria, Nsukka, Nigeria. Author

    Published 2026-01-05

  • Artificial Intelligence (AI), Knowledge Processing System (KPS), Software Security, Threat Detection, Machine Learning, Anomaly Detection, Expert Systems, Cybersecurity Optimization, Secure Software Development, Predictive Analytics

    Issue

    Section

    Articles

    How to Cite

    [1]
    B. Nova and T. Ogunleye, “Design and Development of Artificial Intelligence Knowledge Processing System for Optimizing Security of Software Systems”, IJDEIC, vol. 1, no. 1, pp. 11–21, Jan. 2026, Accessed: Mar. 02, 2026. [Online]. Available: https://worldcometresearchgroup.com/index.php/ijdeic/article/view/44
  • Abstract

    As software systems continue to evolve in complexity, ensuring their security has become an increasingly critical challenge. Traditional security approaches often fail to adapt to dynamic threat landscapes and sophisticated cyber-attacks. This paper presents the design and development of an Artificial Intelligence (AI)-driven Knowledge Processing System (KPS) aimed at optimizing the security of software systems. The proposed system leverages AI techniques such as machine learning, natural language processing, and expert systems to analyze threat patterns, detect anomalies, and suggest real-time mitigation strategies. By integrating continuous learning from security data and contextual knowledge, the system enhances decision-making and predictive capabilities for threat prevention and response. This research highlights system architecture, implementation methodology, and experimental validation to demonstrate the system’s efficacy. Results show significant improvement in threat detection accuracy, response time, and overall system resilience, suggesting that AI-based KPS can be a powerful tool in the software security domain.

  • References

    [1] S. Bhardwaj and N. K. Singh, "AI in Cybersecurity: A Survey on Threat Detection," IEEE Access, vol. 9, pp. 123456–123475, 2021.

    [2] N. Idika and B. Bhargava, "Extending Software Vulnerability Detection with Knowledge Graphs," ACM Computing Surveys, vol. 44, no. 3, pp. 1–27, 2020.

    [3] M. Lopez and R. Chavan, "Machine Learning Models for Anomaly-Based Intrusion Detection," Journal of Cybersecurity, vol. 8, no. 2, 2021.

    [4] Y. Bengio, I. Goodfellow, and A. Courville, Deep Learning, MIT Press, 2016.

    [5] M. Tavallaee et al., "A Detailed Analysis of the KDD Cup 99 Dataset," Proceedings of IEEE CISDA, 2009.

    [6] R. Sommer and V. Paxson, "Outside the Closed World: On Using Machine Learning for Network Intrusion Detection," IEEE Symposium on Security and Privacy, 2010.

    [7] A. Nasr and K. Elish, "Graph-based Threat Detection Using Neo4j and AI Techniques," Proc. of the Int’l Conf. on Security Engineering, 2022.

    [8] H. Xu et al., "Explainable AI for Cybersecurity: State of the Art and Challenges," IEEE Transactions on Dependable and Secure Computing, 2023.

    [9] N. Papernot et al., "Practical Black-Box Attacks against Machine Learning," ACM CCS, 2017.

    [10] MITRE Corporation, "ATT&CK Framework," [Online]. Available: https://attack.mitre.org

    [11] Common Vulnerabilities and Exposures (CVE), "CVE Database," [Online]. Available: https://cve.mitre.org

    [12] S. Yampolskiy, "AI Safety Engineering: Why Machine Ethics is a Wrong Approach," Springer AI & Society, vol. 32, pp. 445–455, 2017.

    [13] Open Web Application Security Project (OWASP), "Top 10 Security Risks," [Online]. Available: https://owasp.org

    [14] A. Roy et al., "Federated Learning for Cybersecurity: A Review," IEEE Access, vol. 10, pp. 65871–65892, 2022.

  • Downloads