International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 3 | Views: 101 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3

Study Papers | Computer Science and Information Technology | India | Volume 13 Issue 8, August 2024 | Popularity: 5.1 / 10


     

Effectiveness of AI/ML in SOAR (Security Automation and Orchestration) Platforms

Srihari Subudhi


Abstract: Security Operations Centres (SOCs) are consistently confronted with an ongoing challenge posed by the evolution of cyber threats. Security Automation and Orchestration (SOAR) platforms have effectively tackled this challenge through the optimization of workflows and the automation of tasks. The integration of Artificial Intelligence (AI) and Machine Learning (ML) into SOAR represents a significant advancement in enhancing security efficacy. Within this context, the current study explores the influence of AI/ML in SOAR on threat identification, efficiency of response, and the overall security stance. Drawing upon data derived from academic research, publications, reports, as well as industry investigations, in conjunction with semi - structured interviews conducted with specific security experts, this research scrutinizes security data to measure enhancements realized through AI/ML in SOAR. Furthermore, the qualitative data offers perspectives into user encounters and outlooks, unveiling a human - centred view on the functionalities of AI/ML. Through an assessment of the efficacy of AI/ML in SOAR, this investigation facilitates the advancement and deployment of forthcoming AI - driven SOAR solutions, enabling organizations to harness AI/ML for bolstering their security stance against the constantly evolving threat landscape.


Keywords: AI - powered SOAR, Security Automation and Orchestration (SOAR), Machine Learning (ML), Threat Detection, Incident Response, Security Alert Prioritization, Automated Response, Security Posture, Threat Landscape


Edition: Volume 13 Issue 8, August 2024


Pages: 201 - 206


DOI: https://www.doi.org/10.21275/MR24802085215



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Srihari Subudhi, "Effectiveness of AI/ML in SOAR (Security Automation and Orchestration) Platforms", International Journal of Science and Research (IJSR), Volume 13 Issue 8, August 2024, pp. 201-206, https://www.ijsr.net/getabstract.php?paperid=MR24802085215, DOI: https://www.doi.org/10.21275/MR24802085215



Similar Articles

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science and Information Technology, United States of America, Volume 10 Issue 6, June 2021

Pages: 1859 - 1864

AI-based Systems Enhance Cybersecurity Defenses, Identify and Mitigate Cyber Threats in Real-Time

Rajesh Palthya

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science and Information Technology, United States of America, Volume 13 Issue 7, July 2024

Pages: 617 - 622

Federated Learning in Cybersecurity: Applications, Challenges, and Future Directions

Yamini Kannan

Share this Article

Downloads: 2 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

New Innovation and Idea, Computer Science and Information Technology, United States of America, Volume 13 Issue 5, May 2024

Pages: 1129 - 1133

Reinforcing Cyber Defense: Generative AI Powered Intelligent Agent Architecture for Enhanced Security Operations

Varadharaj Varadhan Krishnan

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Computer Science and Information Technology, United States of America, Volume 10 Issue 8, August 2021

Pages: 1290 - 1295

AI-based Systems Enhance Cybersecurity Defenses, Identify and Mitigate Cyber Threats in Real-Time

Rajesh Palthya

Share this Article

Downloads: 3 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper, Computer Science and Information Technology, India, Volume 10 Issue 11, November 2021

Pages: 1582 - 1586

Implementing Zero Trust Security Models in Cloud Infrastructures

Ayisha Tabbassum, Shaik Abdul Kareem

Share this Article
Top