Analysis of automation in cybersecurity of cloud environments: A literature review

Authors

DOI:

https://doi.org/10.55873/rad.v4i1.364

Keywords:

automation, chatbots, cybersecurity, coud Computing, artificial Intelligence

Abstract

The growing adoption of cloud technologies has introduced new cybersecurity challenges, particularly with the rise of automated threats. This article presents a systematic literature review on automation in cloud cybersecurity, focusing on recent techniques, tools, and approaches implemented to enhance incident detection, response, and mitigation. A total of 17 relevant studies published between 2018 and 2023 were analyzed, considering quality, relevance, and scientific contribution. The results show that artificial intelligence, machine learning, and automated incident response systems play a crucial role in addressing complex threats in cloud environments. Finally, research trends, knowledge gaps, and recommendations for future work in the field are identifi

Downloads

Download data is not yet available.

References

F. Nawshin, D. Unal, M. Hammoudeh, and P. N. Suganthan, “AI-powered malware detection with Differential Privacy for zero trust security in Internet of Things networks,” Ad Hoc Networks, vol. 161, Aug. 2024, doi: 10.1016/j.adhoc.2024.103523.

M. Golec, E. S. Hatay, M. Golec, M. Uyar, M. Golec, and S. S. Gill, “Quantum cloud computing: Trends and challenges,” Journal of Economy and Technology, vol. 2, pp. 190–199, Nov. 2024, doi: 10.1016/j.ject.2024.05.001.

S. A. Bello et al., “Cloud computing in construction industry: Use cases, benefits and challenges,” Feb. 01, 2021, Elsevier B.V. doi: 10.1016/j.autcon.2020.103441.

L. Anaya, A. Braizat, and R. Al-Ani, “Implementing AI-based Chatbot: Benefits and Challenges,” in Procedia Computer Science, Elsevier B.V., 2024, pp. 1173–1179. doi: 10.1016/j.procs.2024.06.284.

José Albeiro Montes Gil, “Servicios en la Nube para la deteccion de ataques de denegacion de servicios,” 2024.

B. X. Wang, J. L. Chen, and C. L. Yu, “An AI-Powered Network Threat Detection System,” IEEE Access, vol. 10, pp. 54029–54037, 2022, doi: 10.1109/ACCESS.2022.3175886.

Elvis Wesley Vásquez Valarezo, “IMPLEMENTACIÓN DE UN CHATBOT EN LENGUAJE NATURAL, UTILIZANDO TECNICAS DE IA,” 2022.

E. M. Suñé, “Chatbot cognitivo capaz de dar respuesta y gestionar incidentes de ciberseguridad,” 2023.

K. Adel, A. Elhakeem, and M. Marzouk, “Chatbot for construction firms using scalable blockchain network,” Autom Constr, vol. 141, Sep. 2022, doi: 10.1016/j.autcon.2022.104390.

M. Golec, E. S. Hatay, M. Golec, M. Uyar, M. Golec, and S. S. Gill, “Quantum cloud computing: Trends and challenges,” Journal of Economy and Technology, vol. 2, pp. 190–199, Nov. 2024, doi: 10.1016/j.ject.2024.05.001.

M. Mukherjee et al., “Security and Privacy in Fog Computing: Challenges,” IEEE Access, vol. 5, pp. 19293–19304, Sep. 2017, doi: 10.1109/ACCESS.2017.2749422.

Shruti, S. Rani, M. Shabaz, A. K. Dutta, and E. A. Ahmed, “Enhancing privacy and security in IoT-based smart grid system using encryption-based fog computing,” Alexandria Engineering Journal, vol. 102, pp. 66–74, Sep. 2024, doi: 10.1016/j.aej.2024.05.085.

M. Charfeddine, H. M. Kammoun, B. Hamdaoui, and M. Guizani, “ChatGPT’s Security Risks and Benefits: Offensive and Defensive Use-Cases, Mitigation Measures, and Future Implications,” IEEE Access, vol. 12, pp. 30263–30310, 2024, doi: 10.1109/ACCESS.2024.3367792.

Zilungile Bokolo1 and Olawande Daramola2*, “Detección de amenazas y vulnerabilidades de seguridad en chatbots,” 2019, doi: 10.1038/s4159802468791z.

E. M. Suñé, “Título: Chatbot cognitivo capaz de dar respuesta y gestionar incidentes de ciberseguridad,” 2022.

S. Sai, U. Yashvardhan, V. Chamola, and B. Sikdar, “Generative AI for Cyber Security: Analyzing the Potential of ChatGPT, DALL-E, and Other Models for Enhancing the Security Space,” IEEE Access, vol. 12, pp. 53497–53516, 2024, doi: 10.1109/ACCESS.2024.3385107.

M. Torres Arrabal, “Sistema de Detección de Amenazas en la Nube para Entornos Híbridos,” 2024.

RAD

Published

2025-01-30

How to Cite

Valdivia-Vilchez, R. B., Albarrán-Romero, J., León-Tiravanti, B. L., & Ramirez-Pezo, Y. E. (2025). Analysis of automation in cybersecurity of cloud environments: A literature review. Revista Amazonía Digital, 4(1), e364. https://doi.org/10.55873/rad.v4i1.364

Similar Articles

1 2 > >> 

You may also start an advanced similarity search for this article.