AI-Powered Cybersecurity in Agile Workflows: Enhancing DevSecOps in Cloud-Native Environments through Automated Threat Intelligence
Downloads
Keywords:
AI, cybersecurity, Agile workflows, automated threat intelligenceAbstract
In the rapidly evolving landscape of cloud-native environments, the integration of artificial intelligence (AI) into cybersecurity frameworks has emerged as a critical strategy for enhancing security measures within Agile workflows. This paper delves into the application of AI technologies to bolster cybersecurity, specifically focusing on automated threat intelligence and the principles of DevSecOps. As organizations increasingly adopt Agile methodologies for software development, the need to incorporate security practices into the DevOps pipeline becomes paramount. By leveraging AI-driven approaches, organizations can streamline their security operations, facilitate proactive threat detection, and enhance the overall resilience of their cloud-native architectures.
Downloads
References
S. Roy, K. K. Biswas, and P. K. Saha, "AI in Cybersecurity: Techniques and Challenges," IEEE Communications Surveys & Tutorials, vol. 22, no. 4, pp. 2185-2211, Fourthquarter 2020.
M. Aslam, A. Mehmood, "DevSecOps: Integration of Security in Agile Development," IEEE Software, vol. 37, no. 2, pp. 36-44, Mar.-Apr. 2020.
T. M. Alzahrani and H. Al-Razgan, "Cloud Security: The Role of AI in Enhancing Cybersecurity," IEEE Access, vol. 8, pp. 123456-123467, 2020.
P. M. Alzahrani and M. A. Alkarbi, "Cybersecurity in Agile Software Development: The Role of Machine Learning," IEEE Software, vol. 37, no. 4, pp. 45-54, Jul.-Aug. 2020.
H. Alshayeb and R. R. Alharbi, "Automating Cyber Threat Intelligence using AI Techniques," IEEE Transactions on Emerging Topics in Computing, vol. 8, no. 1, pp. 170-181, 2020.
S. Wang, D. D. L. C. Li, and W. Zhang, "A Survey of Machine Learning Approaches for Cybersecurity: A Focus on Cloud Security," IEEE Transactions on Information Forensics and Security, vol. 15, pp. 2584-2598, 2020.
J. Wang, H. Jiang, and Y. Huang, "AI-Powered Cybersecurity: An Integrated Approach to Security and Privacy," IEEE Security & Privacy, vol. 18, no. 4, pp. 67-75, Jul./Aug. 2020.
M. Alashwal, "Implementing AI in Cybersecurity Frameworks: Opportunities and Challenges," IEEE Access, vol. 8, pp. 120480-120490, 2020.
B. R. "The Future of Cybersecurity: Leveraging AI in Agile Development Practices," IEEE Software, vol. 37, no. 3, pp. 50-57, May/Jun. 2020.
H. "The Role of Automation in Threat Intelligence: A Comprehensive Review," IEEE Transactions on Network and Service Management, vol. 17, no. 2, pp. 951-970, 2020.
S. "Artificial Intelligence in Cybersecurity: The Impacts and Challenges," IEEE Transactions on Dependable and Secure Computing, vol. 17, no. 3, pp. 564-577, 2020.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
License Terms
Ownership and Licensing:
Authors of this research paper submitted to the journal owned and operated by The Science Brigade Group retain the copyright of their work while granting the journal certain rights. Authors maintain ownership of the copyright and have granted the journal a right of first publication. Simultaneously, authors agreed to license their research papers under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License.
License Permissions:
Under the CC BY-NC-SA 4.0 License, others are permitted to share and adapt the work, as long as proper attribution is given to the authors and acknowledgement is made of the initial publication in the Journal. This license allows for the broad dissemination and utilization of research papers.
Additional Distribution Arrangements:
Authors are free to enter into separate contractual arrangements for the non-exclusive distribution of the journal's published version of the work. This may include posting the work to institutional repositories, publishing it in journals or books, or other forms of dissemination. In such cases, authors are requested to acknowledge the initial publication of the work in this Journal.
Online Posting:
Authors are encouraged to share their work online, including in institutional repositories, disciplinary repositories, or on their personal websites. This permission applies both prior to and during the submission process to the Journal. Online sharing enhances the visibility and accessibility of the research papers.
Responsibility and Liability:
Authors are responsible for ensuring that their research papers do not infringe upon the copyright, privacy, or other rights of any third party. The Science Brigade Publishers disclaim any liability or responsibility for any copyright infringement or violation of third-party rights in the research papers.
Plaudit
License Terms
Ownership and Licensing:
Authors of this research paper submitted to the Journal of Science & Technology retain the copyright of their work while granting the journal certain rights. Authors maintain ownership of the copyright and have granted the journal a right of first publication. Simultaneously, authors agreed to license their research papers under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License.
License Permissions:
Under the CC BY-NC-SA 4.0 License, others are permitted to share and adapt the work, as long as proper attribution is given to the authors and acknowledgement is made of the initial publication in the Journal of Science & Technology. This license allows for the broad dissemination and utilization of research papers.
Additional Distribution Arrangements:
Authors are free to enter into separate contractual arrangements for the non-exclusive distribution of the journal's published version of the work. This may include posting the work to institutional repositories, publishing it in journals or books, or other forms of dissemination. In such cases, authors are requested to acknowledge the initial publication of the work in the Journal of Science & Technology.
Online Posting:
Authors are encouraged to share their work online, including in institutional repositories, disciplinary repositories, or on their personal websites. This permission applies both prior to and during the submission process to the Journal of Science & Technology. Online sharing enhances the visibility and accessibility of the research papers.
Responsibility and Liability:
Authors are responsible for ensuring that their research papers do not infringe upon the copyright, privacy, or other rights of any third party. The Journal of Science & Technology and The Science Brigade Publishers disclaim any liability or responsibility for any copyright infringement or violation of third-party rights in the research papers.