Some things to try with “AI”

Run all programs through LLMs looking for malicious coding, instructions to export data to remote sites, anything associated with known bad actors, and bad coding.

Use LLMs to review router traffic going to or from suspect IP addresses.

Maintain a list of suspect IP Addresses. Block them as close to the source as possible.

Maintain a list of DoS (botnet) IP addresses and block them at gateway routers. Block them at my router if nothing else.

Run existing programs through LLMs to optimize coding and to document the code.

Run Programs through LLMs to identify, and possibly correct, bad programming such as buffer overflows, uncleared buffers and other hack-able openings.

Run all new programs through LLMs to ensure they follow ‘good’ programming protocols.