The Rise of Cognitive SOCs: A Systematic Literature Review on AI Approaches

被引:0
作者
Binbeshr, Farid [1 ]
Imam, Muhammad [1 ,2 ]
Ghaleb, Mustafa [1 ]
Hamdan, Mosab [4 ]
Rahim, Mussadiq Abdul [1 ]
Hammoudeh, Mohammad [3 ]
机构
[1] King Fahd Univ Petr & Minerals, Interdisciplinary Res Ctr Intelligent Secure Syst, Dhahran 31261, Saudi Arabia
[2] King Fahd Univ Petr & Minerals, Dept Comp Engn, Dhahran 31261, Saudi Arabia
[3] King Fahd Univ Petr & Minerals, Dept Informat & Comp Sci, Dhahran 31261, Saudi Arabia
[4] Natl Coll Ireland, Sch Comp, Dublin D02 VY45, Ireland
来源
IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY | 2025年 / 6卷
关键词
Artificial intelligence; Security; Systematic literature review; Real-time systems; Automation; Threat assessment; Taxonomy; Surveys; Petroleum; Natural language processing; Artificial intelligence (AI); cognitive computing; cybersecurity; deep learning; explainable AI; human-AI collaboration; machine learning; natural language processing; network security; security automation; security information and event management (SIEM); security operations center (SOC); threat detection; threat intelligence; zero trust security;
D O I
10.1109/OJCS.2025.3536800
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing sophistication of cyber threats has led to the evolution of Security Operations Centers (SOCs) towards more intelligent and adaptive systems. This review explores the integration of Artificial Intelligence (AI) in SOCs, focusing on their current state, challenges, opportunities, and advantages over traditional methods. We address three key questions: (1) What are the current AI approaches in SOCs? (2) What challenges and opportunities exist with these approaches? (3) What benefits do AI models offer in SOC environments compared to traditional methods? We analyzed 38 studies using a structured methodology involving database searches, quality checks, and data extraction. Our findings show that Machine Learning (ML) techniques dominate SOC research, with a trend towards multi-approach AI methods. We classified these into ML, Natural Language Processing, multi-approach, and others, forming a detailed taxonomy of AI applications in SOCs. Challenges include data quality, model interpretability, legacy system integration, and the need for constant adaptation. Opportunities involve task automation, enhanced threat detection, real-time analysis, and adaptive learning. AI-driven SOCs show better accuracy, reduced false positives, greater scalability, and predictive capabilities than traditional approaches. This review defines Cognitive SOCs, emphasizing their ability to mimic human-like processes. We offer practical insights for SOC designers and managers on implementing AI to improve security operations. Finally, we suggest future research directions in explainable AI, human-AI collaboration, and privacy-preserving AI for SOCs.
引用
收藏
页码:360 / 379
页数:20
相关论文
共 55 条
[41]  
ReportLinker, 2025, Tech. Rep.
[42]   A Comparative Study on Cyber Threat Intelligence: The Security Incident Response Perspective [J].
Schlette, Daniel ;
Caselli, Marco ;
Pernul, Gunther .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2021, 23 (04) :2525-2556
[43]   Adaptive Alert Management for Balancing Optimal Performance among Distributed CSOCs using Reinforcement Learning [J].
Shah, Ankit ;
Ganesan, Rajesh ;
Jajodia, Sushil ;
Samarati, Pierangela ;
Cam, Hasan .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2020, 31 (01) :16-33
[44]   Integrated Network and Security Operation Center: A Systematic Analysis [J].
Shahjee, Deepesh ;
Ware, Nilesh .
IEEE ACCESS, 2022, 10 :27881-27898
[45]  
Shibahara T, 2019, PROCEEDINGS OF THE 12TH ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, AISEC 2019, P59, DOI 10.1145/3338501.3357367
[46]  
Shutock M, 2022, Hawaii Int Con Sys S, P7555
[47]   IRP2API: Automated Mapping of Cyber Security Incident Response Plan to Security Tools' APIs [J].
Sworna, Zarrin Tasnim ;
Babar, Muhammad Ali ;
Sreekumar, Anjitha .
2023 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION AND REENGINEERING, SANER, 2023, :546-557
[48]   APIRO: A Framework for Automated Security Tools API Recommendation [J].
Sworna, Zarrin Tasnim ;
Islam, Chadni ;
Babar, Muhammad Ali .
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2023, 32 (01)
[49]  
Tseng P., 2024, arXiv, DOI [10.48550/arXiv.2407.13093, DOI 10.48550/ARXIV.2407.13093]
[50]   Stream clustering guided supervised learning for classifying NIDS alerts [J].
Vaarandi, Risto ;
Guerra-Manzanares, Alejandro .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2024, 155 :231-244