Optimizing the Cyber Crisis Management Process with an Artificial Intelligence Approach in Iranian Banks

Authors

  • Samira AzadSanjari * Department of Industries, Faculty of Industrial and Systems Engineering, Tarbiat Modares University, Tehran, Iran.
  • Seyed Kamal Charsoughi Department of Industries, Faculty of Industrial and Systems Engineering, Tarbiat Modares University, Tehran, Iran.

https://doi.org/10.48314/apem.vi.38

Abstract

Given the increasing frequency and complexity of cyber-attacks in recent years, leveraging Artificial Intelligence (AI) to enhance Cyber Crisis Management (CCM) has become a necessity. According to various cybersecurity reports, banking malware and financial fraud have experienced significant growth over the past decades. In light of the escalating sophistication of cyber threats and the rapid emergence of new attack vectors, traditional crisis management methods are no longer sufficient to meet the security demands of Iranian banking institutions. In this research, we propose an optimized AI-driven framework for CCM. In our proposed approach, AI is employed in the pre-crisis phase to predict complex cyber threats, allowing for the rapid deployment of defensive measures that minimize the likelihood of a crisis. During the crisis itself, AI enhances the Incident Response (IR) process through advanced automated algorithms capable of analyzing vast volumes of data in minimal time. The integration of AI into the CCM process facilitates faster response times, process automation, reduction of human error, real-time analysis of high-volume and complex datasets, and enables continuous learning and adaptive improvement.

Keywords:

Artificial intelligence, Cyber crisis management, Electronic banking, Cybersecurity, Threat detection, Incident response, Vulnerability assessment

References

  1. [1] Urbinati, A., Chiaroni, D., Chiesa, V., & Frattini, F. (2020). The role of digital technologies in open innovation processes: an exploratory multiple case study analysis. R&D management, 50(1), 136–160. https://doi.org/10.1111/radm.12313

  2. [2] Abdou, H. A., English, J., & Adewunmi, P. O. (2014). An investigation of risk management practices in electronic banking: The case of the UK banks. Banks & bank systems, 9(3), 19–31. https://b2n.ir/tj1485

  3. [3] Singh, A., & Gupta, B. B. (2022). Distributed denial-of-service (DDoS) attacks and defense mechanisms in various web-enabled computing platforms: Issues, challenges, and future research directions. International journal on semantic web and information systems (IJSWIS), 18(1), 1–43. https://doi.org/10.4018/IJSWIS.297143

  4. [4] Borode, A., & Olubambi, P. (2024). Optimisation of artificial intelligence models and response surface methodology for predicting viscosity and relative viscosity of GNP-alumina hybrid nanofluid: incorporating the effects of mixing ratio and temperature. The journal of supercomputing, 80(4), 4841–4869. https://doi.org/10.1007/s11227-023-05652-y

  5. [5] Dunsin, D., Ghanem, M. C., Ouazzane, K., & Vassilev, V. (2024). A comprehensive analysis of the role of artificial intelligence and machine learning in modern digital forensics and incident response. Forensic science international: Digital investigation, 48, 301675. https://doi.org/10.1016/j.fsidi.2023.301675

  6. [6] Alasmari, A. O. (2018). A review of the challenges of the crisis management during the cyber attacks. Journal of contemporary scientific research (ISSN (online) 2209-0142), 2(7), 1–9. https://b2n.ir/eq2687

  7. [7] Alghazo, J. M., Kazmi, Z., & Latif, G. (2017). Cyber security analysis of internet banking in emerging countries: user and bank perspectives. 2017 4th IEEE international conference on engineering technologies and applied sciences (ICETAS) (pp. 1–6). IEEE. https://doi.org/10.1109/ICETAS.2017.8277910

  8. [8] Al-Alawi, A. I., & Al-Bassam, M. S. A. (2020). The significance of cybersecurity system in helping managing risk in banking and financial sector. Journal of xidian university, 14(7), 1523–1536. https://doi.org/10.37896/jxu14.7/174

  9. [9] Chafjiri, M. B., & Mahmoudabadi, A. (2018). Developing a conceptual model for applying the principles of crisis management for risk reduction on electronic banking. American journal of computer science and technology, 1(1), 31–38. https://doi.org/10.11648/j.ajcst.20180101.15 %0D

  10. [10] Yamashita, R., Nishio, M., Do, R. K. G., & Togashi, K. (2018). Convolutional neural networks: an overview and application in radiology. Insights into imaging, 9(4), 611–629. https://doi.org/10.1007/s13244-018-0639-9

  11. [11] Salehi, P., Chalechale, A., & Taghizadeh, M. (2020). Generative adversarial networks (GANs): An overview of theoretical model, evaluation metrics, and recent developments. ArXiv Preprint ArXiv:2005.13178. https://doi.org/10.48550/arXiv.2005.13178

  12. [12] Aslan, Ö., Aktuğ, S. S., Ozkan-Okay, M., Yilmaz, A. A., & Akin, E. (2023). A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics, 12(6), 1–42. https://doi.org/10.3390/electronics12061333

  13. [13] Khan, S., & Parkinson, S. (2018). Review into state of the art of vulnerability assessment using artificial intelligence. In Guide to vulnerability analysis for computer networks and systems: an artificial intelligence approach (pp. 3–32). Springer. https://doi.org/10.1007/978-3-319-92624-7_1

  14. [14] Xiaopeng, T., & Di, T. (2019). A distributed vulnerability scanning on machine learning. 2019 6th international conference on information science and control engineering (ICISCE) (pp. 32–35). IEEE computer society. https://doi.ieeecomputersociety.org/10.1109/ICISCE48695.2019.00016

  15. [15] Kumar, S., Gupta, U., Singh, A., & Singh, A. (2023). Artificial intelligence: Revolutionizing cyber security in the digital era. Journal of computers, mechanical and management, 2, 31–42. http://dx.doi.org/10.57159/gadl.jcmm.2.3.23064

  16. [16] Markevych, M., & Dawson, M. (2023). A review of enhancing intrusion detection systems for cybersecurity using artificial intelligence (AI) [presentation]. International conference knowledge-based organization (Vol. 29, pp. 30–37). http://dx.doi.org/10.2478/kbo-2023-0072

  17. [17] Kim, S., Hwang, C., & Lee, T. (2020). Anomaly based unknown intrusion detection in endpoint environments. Electronics, 9(6), 1–19. https://doi.org/10.3390/electronics9061022

  18. [18] Javed, S. H., Ahmad, M. Bin, Asif, M., Almotiri, S. H., Masood, K., & Ghamdi, M. A. Al. (2022). An intelligent system to detect advanced persistent threats in industrial internet of things (I-IoT). Electronics, 11(5), 1–25. https://doi.org/10.3390/electronics11050742

  19. [19] Schlette, D., Caselli, M., & Pernul, G. (2021). A comparative study on cyber threat intelligence: The security incident response perspective. IEEE communications surveys & tutorials, 23(4), 2525–2556. https://doi.org/10.1109/COMST.2021.3117338

  20. [20] Hassan, S. K., & Ibrahim, A. (2023). The role of artificial intelligence in cyber security and incident response. International journal for electronic crime investigation, 7(2), 49–72. https://doi.org/10.54692/ijeci.2023.0702154

Published

2025-08-19

Issue

Section

Articles

How to Cite

Optimizing the Cyber Crisis Management Process with an Artificial Intelligence Approach in Iranian Banks. (2025). Annals of Process Engineering and Management. https://doi.org/10.48314/apem.vi.38

Similar Articles

1-10 of 17

You may also start an advanced similarity search for this article.