DevSecOps Pipelines with AI for Real-Time Vulnerability Remediation
Keywords:
DevSecOps, AI, vulnerability remediation, real-time security, machine learningAbstract
Security is automated and continuous in DevOps. These pipelines emphasize real-time vulnerability mitigation during security threats. AI automates vulnerability finding, evaluation, and remediation, boosting DevSecOps. Security teams can respond fast and accurately using ML and DL algorithms to analyze large data, discover patterns, and identify dangers. This paper evaluates AI's merits, drawbacks, and future in real-time DevSecOps pipeline vulnerability mitigation. We research AI-driven vulnerability assessment, anomaly detection, and decision-making systems that reduce cleaning and human intervention. Case studies and implementations demonstrate AI DevSecOps security. AI can enhance DevSecOps and minimize new dangers, according to this research.
Downloads
References
Madupati, Bhanuprakash. "Leveraging AI for Rural Development." Available at SSRN 5135045 (2024).
Madupati, Bhanuprakash. "Cyber Attacks in the Remote Work Era: An Analysis of Phishing, Ransomware, and Mitigation Strategies." Ransomware, and Mitigation Strategies (September 30, 2024) (2024).
Kalluri, Kartheek. "Scalable fine-tunning strategies for llms in finance domain-specific application for credit union." 2024,
Kasula, Vinay Kumar, et al. "Enhancing Vulnerability Detection in Smart Contracts Using Transformer-Based Embeddings and Graph Neural Networks." 2024 34th International Conference on Computer Theory and Applications (ICCTA). IEEE, 2024.
Nair, Sreejith Sreekandan, et al. "Safeguarding Tomorrow-Fortifying Child Safety in Digital Landscape." 2024 International Conference on Computing, Sciences and Communications (ICCSC). IEEE, 2024.
Madupati, Bhanuprakash. "The Role of AI in the Public Sector: A Technical Perspective." Available at SSRN 5076600 (2024).
Pillai, Vinayak. Anomaly Detection for Innovators: Transforming Data into Breakthroughs. Libertatem Media Private Limited, 2022.
Kalluri, K. "AI-Driven Risk Assessment Model for Financial Fraud Detection: a Data Science Perspective." International Journal of Scientific Research and Management 12.12 (2024): 1764-1774.
Kasula, Vinay Kumar, et al. "Enhancing Smart Contract Vulnerability Detection using Graph-Based Deep Learning Approaches." 2024 International Conference on Integrated Intelligence and Communication Systems (ICIICS). IEEE, 2024.
Shankeshi, Raghu Murthy. "The Role of AI in Enhancing Data Security and Compliance in Oracle Cloud Infrastructures." American Journal of Data Science and Artificial Intelligence Innovations 3 (2023): 53-67.
Kalluri, Kartheek. "Low-Code BPM meets IoT: A Framework for Real-Time Industrial Automation." 2024,
Vududala, Santosh Kumar. "Enhancing Anti-Money Laundering (AML) Compliance using NICE Actimize: A Data driven Approach."
Madupati, Bhanuprakash. "AI-Driven Threat Detection in Cybersecurity." Available at SSRN 5076610 (2024).
Konda, Bhargavi, et al. "A Public Key Searchable Encryption Scheme Based on Blockchain Using Random Forest Method." International Journal Of Research In Electronics And Computer Engineering 12.1 (2024): 77-83.
Kalluri, Kartheek. "Integrating Pega's AI-Driven Workflows for End-to-End Process Optimization in Financial Services." North American Journal of Engineering Research 5.3 (2024).
Vududala, Santosh Kumar. "International Journal of Multidisciplinary Research and Growth Evaluation."
Madupati, Bhanuprakash. "The Role of Cybersecurity in Combating Digital Crime-A Technical Perspective." Available at SSRN 5076618 (2024).
Kasula, Vinay Kumar, et al. "Fortifying cloud environments against data breaches: A novel AI-driven security framework." World J. Adv. Res. Rev 24 (2024): 1613-1626.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.