A Systematic Review of Technical Approaches to Enhance Cybersecurity: Anomaly Detection, Blockchain Integration, and Data Encryption

A Systematic Review of Technical Approaches to Enhance Cybersecurity: Anomaly Detection, Blockchain Integration, and Data Encryption

Authors

  • Muhammad Raihan Abdul Mughni UNIVERSITAS SEBELAS APRIL SUMEDANG

Keywords:

Cybersecurity, Anomaly Detection, Blockchain, Encryption, IOT, Cloud Computing

Abstract

Cybersecurity is a major challenge in the increasingly complex digital era. This study aims to identify the latest technical approaches to improve cybersecurity through the Systematic Literature Review (SLR) method. Three main approaches reviewed include: machine learning-based anomaly detection for IoT networks, the use of blockchain in cloud data sharing security, and analysis of AES encryption modes for data protection. The results show that strategic application of these technologies can strengthen the defense system against cyber threats. This study provides in-depth insights for the development of future cybersecurity solutions.

References

I. Ullah and Q. H. Mahmoud, “Design and Development of a Deep Learning-Based Model for Anomaly Detection in IoT Networks,” IEEE Access, vol. 9, pp. 52614–52625, 2021.

Z. Rayyan et al., “Blockchain-based Secure Data Sharing in Cloud Computing,” Proceedings of ICISTECH, 2023.

J. Chen, P. Singh, and D. Kim, “Comparative Analysis of AES Modes of Operation for Data Security,” Journal of Cryptographic

Helmiawan, M. A., & Wiharko, T. (2018). Application of Fingerprint Security System on Motorcycles using Arduino Microcontroller. J-Tin’s-Jurnal Teknik Informatika, 2(1).

Helmiawan, M. A., Juna, D. I., & Ramdhani, B. (2018). Pengamanan Sistem Dan Data E-Voting Berbasis Network. INTERNAL (Information System Journal), 1(1), 1–10.

Helmiawan, M. A., Firmansyah, E., Fadil, I., Sofivan, Y., Mahardika, F., & Guntara, A. (2020). Analysis of web security using open web application security project 10. 2020 8th International Conference on Cyber and IT Service Management

Helmiawan, M. A., Julian, E., Cahyan, Y., & Saeppani, A. (2021). Experimental evaluation of security monitoring and notification on network intrusion detection system for server security. 2021 9th International Conference on Cyber and IT Service Management (CITSM ….

Helmiawan, M. A., Fadil, I., Sofiyan, Y., & Firmansyah, E. (2021). Security model using intrusion detection system on cloud computing security management. 2021 9th International Conference on Cyber and IT Service Management (CITSM ….

Helmiawan, M. A., & Nasution, A. I. (2022). The Effect of Internet Banking Use and Customer Protection Against Cyber Crime at Bank Rakyat Indonesia. Journal of Islamic Economics and Business, 2(2), 170–183.

Published

2025-08-20
Loading...