Engineering and Technology | Open Access | DOI: https://doi.org/10.37547/tajet/Volume07Issue11-07

AI-Supported Cybersecurity Monitoring in Enterprise Environments: Enhancing Threat Detection and Response

Natarajan Ravikumar , University of North Carolina at Charlotte, USA

Abstract

This article examines the transformative role of artificial intelligence in enterprise cybersecurity monitoring, addressing the fundamental challenges that traditional security operations centers face in managing the exponentially growing volume of security events across complex digital environments. The article explores how machine learning approaches for anomaly detection enable organizations to identify threats without explicit programming for each variant, while also addressing the critical problem of alert fatigue through intelligent prioritization and correlation mechanisms. The article analyzes emerging human-AI collaboration models that redefine security workflows and distribute cognitive load optimally between analysts and automated systems, emphasizing the importance of explainable AI for building appropriate trust. Finally, the article examines future directions toward autonomous security response, identifying current limitations and promising approaches for safe partial-automation while considering regulatory frameworks and adversarial adaptation. Throughout the analysis, the article demonstrates how AI integration represents not merely a technological evolution but a strategic necessity for maintaining viable security operations in an increasingly complex threat landscape.

Keywords

Artificial Intelligence, Cybersecurity Monitoring, Human-Machine Collaboration, Autonomous Response

References

Splunk, "State of Security 2024 Report Reveals Growing Impact of Generative AI on Cybersecurity Landscape," 2024. https://www.splunk.com/en_us/newsroom/press-releases/2024/state-of-security-2024-report-reveals-growing-impact-of-generative-ai-on-cybersecurity-landscape.html

Dinis Guarda, "The Human-Machine Frontier: Exploring Interactions in the Digital Age,” Business ABC, 2025. https://businessabc.net/the-human-machine-frontier-exploring-interactions-in-the-digital-age

Niladri Sekhar Dey et al., "Advancements in Machine Learning for Anomaly Detection in Cyber Security," Springer, 2024. https://link.springer.com/chapter/10.1007/978-3-031-74682-6_11

Giovanni Apruzzese et al., "The Role of Machine Learning in Cybersecurity," Digital Threats: Research and Practice, Volume 4, Issue 1, 2023. https://dl.acm.org/doi/full/10.1145/3545574

Splunk, "2023 Gartner® Market Guide for Security, Orchestration, Automation and Response Solutions," 2024. https://www.itsecuritydemand.com/whitepaper/security/2023-gartner-market-guide-for-security-orchestration-automation-and-response-solutions/

Orion Cassetto, "SOC Best Practices For Tackling Modern Threats [2025]," Radiant, 2025. https://radiantsecurity.ai/learn/soc-best-practices/

Business Reporter, "AI-Driven SOC: The Future of Human-Machine Collaboration in Cybersecurity," 2025. https://www.business-reporter.co.uk/white-papers/ai-driven-soc-the-future-of-human-machine-collaboration-in-cybersecurity-12863

Masike Malatji et al., "Human-Artificial Intelligence Teaming Model in Cybersecurity," IEEE, 2025. https://ieeexplore.ieee.org/document/10913351

AWS, Inc, "Automated Security Response on AWS," https://aws.amazon.com/solutions/implementations/automated-security-response-on-aws/

Rahul Kalva., "Next-Gen Cybersecurity with AI: Reshaping Digital Defense," CSA, 2025. https://cloudsecurityalliance.org/blog/2025/01/10/next-gen-cybersecurity-with-ai-reshaping-digital-defense

Article Statistics

Copyright License

Download Citations

How to Cite

Natarajan Ravikumar. (2025). AI-Supported Cybersecurity Monitoring in Enterprise Environments: Enhancing Threat Detection and Response. The American Journal of Engineering and Technology, 7(11), 55–64. https://doi.org/10.37547/tajet/Volume07Issue11-07