Abstract
The objective was to determine the relationship between artificial intelligence predictive models and protection against advanced persistent threats (APTs) in the Lima banking system in 2024. A secondary source analysis was conducted on AI predictive models that detect persistent cybersecurity threats such as malware. A survey was administered to a sample of 79 employees from banking institutions in Lima. The research is non experimental, quantitative, and cross-sectional. The results showed improved security system performance in the banking sector following the implementation of predictive models in areas such as APT detection, mitigation, and prevention, strengthening cybersecurity in a critical environment. These findings highlight the models' usefulness in more accurately predicting the impact of attacks on financial institutions. The survey revealed that the majority of participants believe AI predictive models contribute to protection against APTs and optimize problem-solving, indicating a favorable trend toward the implementation of AI-based tools in the banking system. The application of predictive AI models improves the resilience of the banking system against APT attacks, as their ability to optimize processes enhances resistance and has an effect on the evolution of protection against APT attacks, giving them adaptability to new threats as they improve and become more sophisticated.
References
Abualhassan, Z., Hassan, E., Husni, D., Alothman, B., Shehata, N., Trabelsi, M., Shyha, I., Jaradat, S., & Al-Dubai, A. (2026). Malware recognition using novel convolutional neural network with residual connections. International Journal Of Machine Learning And Cybernetics, 17(3). https://doi.org/10.1007/s13042-025-02815-6
Alageel, A., & Maffeis, S. (2026). Investigation of advanced persistent threats network-based tactics, techniques and procedures. Computer Networks, 278, 112069. https://doi.org/10.1016/j.comnet.2026.112069
Almazarqi, H. A., Woodyard, M., & Marnerides, A. K. (2025). BotPro: Data-driven tracking & profiling of IoT botnets in the wild. Computers & Security, 162, 104778. https://doi.org/10.1016/j.cose.2025.104778
Arulkumar, D., & K, K. (2025). Metastack-aptnet: An ensemble deep learning framework for advanced persistent threat detection and mitigation in cyber-physical systems using blockchain technology. Computers & Electrical Engineering, 130, 110838. https://doi.org/10.1016/j.compeleceng.2025.110838
Banco Bilbao Vizcaya Argentaria S.A. ”BBVA ”. (2025, 10 de septiembre). La IA, en los dos lados de la ciberseguridad: aliada y amenaza en el mundo digital. BBVA. https://www.bbva.com/es/innovacion/la-ia-en-los-dos-lados-de-la-ciberseguridad-aliada-y-amenaza-en-el-mundo-digital/
Belali, F., Essetty, A., Bah, S., Wafi, I. E., & Daghouri, A. (2026). Design of a resilient multi-layered security framework for satellite communications. International Journal Of Information Security, 25(2). https://doi.org/10.1007/s10207-025-01184-z
Bodström, T., & Hämäläinen, T. (2026). Raw binary data usage with deep learning for advanced persistent threat attacks early stage detection. International Journal Of Machine Learning And Cybernetics, 17(2). https://doi.org/10.1007/s13042-025-02853-0
Choudhary, N., & Khaitan, V. (2026). Dependability Analysis of Cloud‐Based VoIP Under an Advanced Persistent Threat Attack: A Semi‐Markov Approach. Transactions On Emerging Telecommunications Technologies, 37(2). https://doi.org/10.1002/ett.70353
De la Hoz Suárez, B. A., Moran, I. F. L., Tete, A. E. M., & De la Hoz Suárez, A. I. (2024). Inteligencia artificial como estrategia para gestionar los procesos de auditoría financiera. Revista Estrategia Organizacional, 13(1), 57-72. https://doi.org/10.22490/25392786.7818
Deng, X., Li, P., Wang, C., Wang, R., Liu, Y., Han, W., & Tian, Z. (2026). A Stackelberg game based deception defense strategy against APT under resource constraints. Science China Information Sciences, 69(3). https://doi.org/10.1007/s11432-025-4530-7
Du, Y., Ren, W., Li, W., Wang, M., Wang, W., Zhang, H., & Xia, M. (2025). GA-ConvE: An APT attack prediction method based on combination of graph attention network and 2D convolution. Neural Networks, 195, 108216. https://doi.org/10.1016/j.neunet.2025.108216
Duan, L., Wen, M., & Xiong, Y. (2025). MLDSJ: a multi-level feature joint attribution method for APT group based on threat intelligence. EURASIP Journal On Information Security, 2026(1). https://doi.org/10.1186/s13635-025-00222-6
Enrique, D. M. L., & Samuel, A. H. E. (2025, 22 junio). Implementación de una Solución de Seguridad para el Filtrado Web y el Acceso Remoto Seguro a Aplicaciones Empresariales mediante el uso de Zero Trust Network Access (ZTNA). http://hdl.handle.net/10757/685827
Gutta, A., S, S., M, N., Shetty, Y. A., C, D., G, A., & Kamwa, I. (2025). A security-centric SCADA framework for wind energy systems using enhanced network segmentation and rogue traffic visualization. Results In Engineering, 29, 108535. https://doi.org/10.1016/j.rineng.2025.108535
Hassanzadeh, E., Hajiabadi, M. E., Samadi, M., & Lotfi, H. (2023). Improving the resilience of the distribution system using the automation of network switches. The Journal Of Engineering, 2023(2). https://doi.org/10.1049/tje2.12238
Hua, B., & Xi, H. (2025). A privacy preserving intrusion detection framework for IIoT in 6G networks using homomorphic encryption and graph neural networks. Scientific Reports, 16(1), 2297. https://doi.org/10.1038/s41598-025-32087-7
Hussain, N., Li, S., Hussain, A., Ullah, Z., & Jamjoom, M. (2025). Quantum-aware secure blockchain intrusion detection system for industrial IoT networks. Scientific Reports, 16(1), 2265. https://doi.org/10.1038/s41598-025-31985-0
Iturbe, E., Dalamagkas, C., Radoglou-Grammatikis, P., Rios, E., & Toledo, N. (2025). A pattern-aware LSTM-based approach for APT detection leveraging a realistic dataset for critical infrastructure security. Future Generation Computer Systems, 178, 108308. https://doi.org/10.1016/j.future.2025.108308
Kalogiannidis, S., Patitsa, C., & Chalaris, M. (2024). The Integration of Artificial Intelligence in Business Communication Channels: Opportunities and Challenges. WSEAS TRANSACTIONS ON BUSINESS AND ECONOMICS, 21, 1922-1944. https://doi.org/10.37394/23207.2024.21.157
Lee, S., Seo, H., Heo, H., Wang, A., Shin, S., & Kim, J. (2025). SecTracer: A framework for uncovering the root causes of network intrusions via security provenance. Computers & Security, 161, 104760. https://doi.org/10.1016/j.cose.2025.104760
Lewis, A. (2026). The Red Queen of cyberspace: The persistence of advanced persistent threats (APTs) explained through co-evolution. Technology In Society, 86, 103238. https://doi.org/10.1016/j.techsoc.2026.103238
Madrid, J. (2024). El impacto de la Inteligencia Artificial en la protección de datos personales y el acceso a la información. https://www.ucm.es/eg/file/el-impacto-de-la-inteligencia-artificial-en-protecci%C3%93n-de-datos-personales-y-acceso-a-la-informaci%C3%93n?ver.
Melo, V. (2022). Inteligencia artificial, desinformación y protección de datos personales. In Itinere. Revista Digital de Estudios Humanísticos de la Universidad FASTA, 12(1),26–37. https://revistas.ufasta.edu.ar/index.php/initinere/article/view/234/pdf_174
Molina, O. (2023). Inteligencia artificial, Bigdata y Derecho a la protección de datos de las personas trabajadoras. Revista de Estudios Jurídico Laborales y de Seguridad Social (REJLSS), 6, 89-117. https://revistas.uma.es/index.php/REJLSS/article/view/16225/16626
Olasehinde, D. O., Bamisile, O., Ejiyi, C. J., Zhang, G., Cai, D., Li, J., Wei, L., & Huang, Q. (2026). Cybersecurity in cyber-physical power systems: analyzing vulnerabilities, threats, and control structures. Cluster Computing, 29(3). https://doi.org/10.1007/s10586-025-05894-w
Pardiñas, S. (2020). Inteligencia Artificial: un estudio de su impacto en la sociedad. https://ruc.udc.es/rest/api/core/bitstreams/e6401877-6b89-4b3c-9c51-0e8e5ec26224/content
Ren, W., Zhao, L., & Li, W. (2026b). A knowledge extrapolation model for attack inference based on graph attention networks and relation mapping. Knowledge And Information Systems, 68(1). https://doi.org/10.1007/s10115-025-02669-y
Sarker, I. H. (2022). AI-Based Modeling: Techniques, Applications and Research Issues Towards Automation, Intelligent and Smart Systems. SN Computer Science, 3(2), 158. https://doi.org/10.1007/s42979-022-01043-x
Shen, J., Li, F., Hashemi, M., & Fang, H. (2025). Resilient and Robust Controller Design in Large-Scale Multi-Agent Industrial Cyber-Physical Systems. Journal Of Dynamic Systems Measurement And Control, 148(3). https://doi.org/10.1115/1.4070173
Wang, H., Chen, W., Li, L., Pu, H., & Zhang, Y. (2026). Dinspector: Dual factor graph attention mechanism for Advanced Persistent Threat detection. Engineering Applications Of Artificial Intelligence, 167, 113861. https://doi.org/10.1016/j.engappai.2026.113861
Yang, L., Ye, A., Liu, Y., Lu, W., & Huang, C. (2025). LLM-APTDS: A high-precision advanced persistent threat detection system for imbalanced data based on large language models with strong interpretabilit. Future Generation Computer Systems, 178, 108315. https://doi.org/10.1016/j.future.2025.108315

This work is licensed under a Creative Commons Attribution 4.0 International License.
Copyright (c) 2026 Héctor Martín Espinoza Villavicencio
