AI-Driven Threat Detection in DevSecOps Pipelines for Insurance Applications
Keywords:
DevSecOps, Threat, AI, InsuranceAbstract
As the insurance technology space continues to develop at a massive rate, security in continuous development environments must be guaranteed. In this paper, the author will demonstrate an AI-powered model of real-time threat detection implemented into DevSecOps pipelines specific to insurance applications. The framework can proactively discover the threats using machine learning, deep learning, and anomaly detection models and remains agile in terms of deployment. Clinical trials have shown a higher degree of accuracy, shorter time to detection and greater compliance. The strength of the system is facilitated by quantitative benchmarks and new visual analytics. The proposed study will provide a scalable and smart threat management solution according to the regulatory requirement and operational speed within the continuous integration and delivery pipeline in the insurance sector.
Downloads
References
Tatineni, S. (2023). AI-Infused threat detection and incident response in cloud security. International Journal of Science and Research (IJSR), 12(11), 998–1004. https://doi.org/10.21275/sr231113063646
Kumari, S., & Dhir, S. (2020). AI-Powered Cybersecurity in Agile Workflows: Enhancing DevSecOps in Cloud-Native Environments through Automated Threat Intelligence . Journal of Science & Technology, 1(1), 809–828. Retrieved from https://thesciencebrigade.com/jst/article/view/425
Fawzy, A. H., Wassif, K., & Moussa, H. (2023). Framework for automatic detection of anomalies in DevOps. Journal of King Saud University - Computer and Information Sciences, 35(3), 8–19. https://doi.org/10.1016/j.jksuci.2023.02.010
Nahar, N., Zhou, S., Lewis, G., & Kästner, C. (2021). Collaboration challenges in building ML-Enabled systems: communication, documentation, engineering, and process. arXiv (Cornell University). https://doi.org/10.48550/arxiv.2110.10234
Hulayyil, S. B., Li, S., & Xu, L. (2023). Machine-Learning-Based Vulnerability Detection and Classification in Internet of Things Device Security. Electronics, 12(18), 3927. https://doi.org/10.3390/electronics12183927
Chaganti, K. C. (2023). The role of AI in Secure DevOps: Preventing Vulnerabilities in CI/CD Pipelines. EPH - International Journal of Science and Engineering. https://doi.org/10.53555/ephijse.v9i4.284
Abri, F., Siami-Namini, S., Khanghah, M. A., Soltani, F. M., & Namin, A. S. (2019). The performance of machine and deep learning classifiers in detecting Zero-Day vulnerabilities. arXiv (Cornell University). https://doi.org/10.48550/arxiv.1911.09586
Mubarkoot, M., Altmann, J., Rasti-Barzoki, M., Egger, B., & Lee, H. (2022). Software Compliance Requirements, Factors, and Policies: A Systematic Literature Review. Computers & Security, 124, 102985. https://doi.org/10.1016/j.cose.2022.102985
Charmet, F., Tanuwidjaja, H. C., Ayoubi, S., Gimenez, P., Han, Y., Jmila, H., Blanc, G., Takahashi, T., & Zhang, Z. (2022). Explainable artificial intelligence for cybersecurity: a literature survey. Annals of Telecommunications, 77(11–12), 789–812. https://doi.org/10.1007/s12243-022-00926-7
Blake, H., Harvard University, & Colin, C. (2023). Cyber Threat Intelligence: AI-Based predictive analysis for proactive security measures. https://www.researchgate.net/publication/388634635_Cyber_Threat_Intelligence_AI-Based_Predictive_Analysis_for_Proactive_Security_Measures
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.