The Rise of Cognitive SOCs: A Systematic Literature Review on AI Approaches

被引:0
作者
Binbeshr, Farid [1 ]
Imam, Muhammad [1 ,2 ]
Ghaleb, Mustafa [1 ]
Hamdan, Mosab [4 ]
Rahim, Mussadiq Abdul [1 ]
Hammoudeh, Mohammad [3 ]
机构
[1] King Fahd Univ Petr & Minerals, Interdisciplinary Res Ctr Intelligent Secure Syst, Dhahran 31261, Saudi Arabia
[2] King Fahd Univ Petr & Minerals, Dept Comp Engn, Dhahran 31261, Saudi Arabia
[3] King Fahd Univ Petr & Minerals, Dept Informat & Comp Sci, Dhahran 31261, Saudi Arabia
[4] Natl Coll Ireland, Sch Comp, Dublin D02 VY45, Ireland
来源
IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY | 2025年 / 6卷
关键词
Artificial intelligence; Security; Systematic literature review; Real-time systems; Automation; Threat assessment; Taxonomy; Surveys; Petroleum; Natural language processing; Artificial intelligence (AI); cognitive computing; cybersecurity; deep learning; explainable AI; human-AI collaboration; machine learning; natural language processing; network security; security automation; security information and event management (SIEM); security operations center (SOC); threat detection; threat intelligence; zero trust security;
D O I
10.1109/OJCS.2025.3536800
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing sophistication of cyber threats has led to the evolution of Security Operations Centers (SOCs) towards more intelligent and adaptive systems. This review explores the integration of Artificial Intelligence (AI) in SOCs, focusing on their current state, challenges, opportunities, and advantages over traditional methods. We address three key questions: (1) What are the current AI approaches in SOCs? (2) What challenges and opportunities exist with these approaches? (3) What benefits do AI models offer in SOC environments compared to traditional methods? We analyzed 38 studies using a structured methodology involving database searches, quality checks, and data extraction. Our findings show that Machine Learning (ML) techniques dominate SOC research, with a trend towards multi-approach AI methods. We classified these into ML, Natural Language Processing, multi-approach, and others, forming a detailed taxonomy of AI applications in SOCs. Challenges include data quality, model interpretability, legacy system integration, and the need for constant adaptation. Opportunities involve task automation, enhanced threat detection, real-time analysis, and adaptive learning. AI-driven SOCs show better accuracy, reduced false positives, greater scalability, and predictive capabilities than traditional approaches. This review defines Cognitive SOCs, emphasizing their ability to mimic human-like processes. We offer practical insights for SOC designers and managers on implementing AI to improve security operations. Finally, we suggest future research directions in explainable AI, human-AI collaboration, and privacy-preserving AI for SOCs.
引用
收藏
页码:360 / 379
页数:20
相关论文
共 55 条
  • [1] Investigating cyber alerts with graph-based analytics and narrative visualization
    AfzaliSeresht, Neda
    Miao, Yuan
    Liu, Qing
    Teshome, Assefa
    Ye, Wenjie
    [J]. 2020 24TH INTERNATIONAL CONFERENCE INFORMATION VISUALISATION (IV 2020), 2020, : 521 - 529
  • [2] A systematic method for measuring the performance of a cyber security operations centre analyst
    Agyepong, Enoch
    Cherdantseva, Yulia
    Reinecke, Philipp
    Burnap, Pete
    [J]. COMPUTERS & SECURITY, 2023, 124
  • [3] Combat Security Alert Fatigue with AI-Assisted Techniques
    Ban, Tao
    Samuel, Ndichu
    Takahashi, Takeshi
    Inoue, Daisuke
    [J]. PROCEEDINGS OF 14TH WORKSHOP ON CYBER SECURITY EXPERIMENTATION AND TEST (CSET 2021), 2021, : 9 - 16
  • [4] Architecture of Anomaly Detection Module for the Security Operations Center
    Bienias, Piotr
    Kolaczek, Grzegorz
    Warzynski, Arkadiusz
    [J]. 2019 IEEE 28TH INTERNATIONAL CONFERENCE ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE), 2019, : 126 - 131
  • [5] Using the Activity Theory to Identify the Challenges of Designing Elearning Tools based on Machine Learning for Security Operations Centers
    Cazacu, Mihail
    Bodea, Constanta
    Dascalu, Maria-Iuliana
    Cucu, Cristian
    [J]. NEW TECHNOLOGIES AND REDESIGNING LEARNING SPACES, VOL I, 2019, : 452 - 461
  • [6] DomainPrio: Prioritizing Domain Name Investigations to Improve SOC Efficiency
    Chiba, Daiki
    Akiyama, Mitsuaki
    Otsuki, Yuto
    Hada, Hiroki
    Yagi, Takeshi
    Fiebig, Tobias
    Van Eeten, Michel
    [J]. IEEE ACCESS, 2022, 10 : 34352 - 34368
  • [7] An Easy-to-use Framework to Build and Operate AI-based Intrusion Detection for In-situ Monitoring
    Choi, Ikje
    Lee, Jun
    Kwon, Taewoong
    Kim, Kyuil
    Choi, Yoonsu
    Song, Jungsuk
    [J]. 2021 16TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2021), 2021, : 1 - 8
  • [8] Demertzis K., 2018, Big Data and Cognitive Computing, V2, P35, DOI DOI 10.3390/BDCC2040035
  • [9] Deyang Zhang, 2011, 2011 International Conference on Intelligent Computation Technology and Automation (ICICTA), P1214, DOI 10.1109/ICICTA.2011.584
  • [10] Grasp on next generation security operation centre (NGSOC): Comparative study
    Dun, Yau Ti
    Ab Razak, Mohd Faizal
    Zolkipli, Mohamad Fadli
    Bee, Tan Fui
    Firdaus, Ahmad
    [J]. INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 2021, 12 (02): : 869 - 895