AI-Driven Cybersecurity: Enhancing System Resilience with Advance Security Automation Program (ASAP)

Year : 2024 | Volume :11 | Issue : 02 | Page : –
By

Garima Sharma

Ram Narayan

  1. Assistant Professor Department of Computer Science and Engineering, The NorthCap University Haryana India
  2. Student Department of Computer Science and Engineering, The NorthCap University Haryana India

Abstract

In the face of increasing cyber threats, this research paper presents Advanced Security Automation Program (ASAP) a revolutionary solution aimed at addressing modern cyber threats through the utilization of Artificial Intelligence (AI) and open-source technologies. Unlike conventional security systems like (SIEMs) Security Information and Event Management & (SOCs) Security Operations Centre, ASAP provides automated defense mechanisms that surpass their limitations by significantly increasing both the speed and accuracy of incident detection by 50% to 90% and incident response efficiency by 30% to 70% holistically at no-cost. By democratizing cybersecurity, ASAP enables organizations of all sizes and even individual systems to access robust protection without relying on expensive proprietary solutions. By integrating open-source tools and AI, ASAP enhances threat detection, simplifies incident response, and bolsters overall cybersecurity. The paper encourages collaboration by sharing not only ASAP’s architecture but also development insights with the open-source community. By adopting ASAP, organizations can proactively strengthen their defenses, mitigate cyber risks and ensure operational continuity in the face of ever-evolving cyber threat. Our research not only contributes to the field by proposing ASAP, but also identifies promising areas for future research such as integrating explainable AI techniques to increase user trust and understanding of ASAP’s decision-making processes.

Keywords: Cyber-Resilience, Open-source technologies, (ASAP) Advance Security Automation Program, (SIEM) Security Information and Event Management, (SOCs) Security Operations Centers.

[This article belongs to Journal of Open Source Developments(joosd)]

How to cite this article: Garima Sharma, Ram Narayan. AI-Driven Cybersecurity: Enhancing System Resilience with Advance Security Automation Program (ASAP). Journal of Open Source Developments. 2024; 11(02):-.
How to cite this URL: Garima Sharma, Ram Narayan. AI-Driven Cybersecurity: Enhancing System Resilience with Advance Security Automation Program (ASAP). Journal of Open Source Developments. 2024; 11(02):-. Available from: https://journals.stmjournals.com/joosd/article=2024/view=152537

References

  1. Moh, M., Pininti, S., Doddapaneni, S., Moh, T.-S.: Detecting web attacks using multi-stage log analysis. In: 2016 IEEE 6th International Conference on Advanced Computing (IACC), Bhimavaram, India, pp. 733–738 (2019)
  2. co: Elasticsearch Documentation (2019). https://www.elastic.co/guide/en/elasticsearch/reference/current/index.html
  3. Bassett, S., Paquette, M.: Improve Security Analytics with the Elastic Stack, Wazuh, and IDS. Elastic Blog, 01 April 2019. https://www.elastic.co/blog/improve-security-analytics- with-the-elastic-stack-wazuh-and-ids.
  4. Elastic.co: Filebeat Documentation (2019). https://www.elastic.co/guide/en/beats/filebeat/current/index.html.
  5. Elastic.co:KibanaGuide(2019).https://www.elastic.co/guide/en/kibana/current/index.html.
  6. Elastic.co: Logstash Documentation (2019). https://www.elastic.co/guide/en/logstash/current/index.html.
  7. Elastic.co: Metricbeat Documentation (2019). https://www.elastic.co/guide/en/beats/metricbeat/current/index.html.
  8. Secrepo.com: SecRepo – Security Data Samples Repository (2019). https://www.secrepo.com
  9. ModSecurity:OpenSourceWebApplicationFirewall(2019).https://www.modsecurity.org/ about.html.
  10. Combs,R.:Snort3.0withElasticsearch, Logstash, and Kibana(ELK)(2019).Blog.snort.org. https://blog.snort.org/2017/11/snort-30-with-elasticsearch-logstash.html.
  11. Kuc, R., Rogozinski, M.: Mastering Elasticsearch, 2nd edn. Packt Publishing Ltd., Birmingham (2015)
  12. Taylor, A.: Detect Beaconing with Flare, Elastic Stack, and Intrusion Detection Systems . Austin Taylor. http://www.austintaylor.io/detect/beaconing/intrusion/detection/system/command/control/flare/elastic/stack/2017/06/10/detect-beaconing-with-flare-elasticsearch-and-intrusion-detection-systems .
  13. Paquette, M.: Using Machine Learning and Elasticsearch for Security Analytics: A Deep Dive. Elastic Blog, 02 May 2019. https://www.elastic.co/blog/using-machine-learning-and- elasticsearch-for-security-analytics-deep-dive.
  14. Elastic.co: Suricata module: Filebeat Reference [master] (2019). https://www.elastic.co/guide/en/beats/filebeat/master/filebeat-module-suricata.html

Regular Issue Subscription Review Article
Volume 11
Issue 02
Received April 9, 2024
Accepted June 26, 2024
Published June 29, 2024