Systematic Literature Review: Integration of Artificial Intelligence and Blockchain in Cybersecurity Enhancement Based on Industry Standards (NIST CSF, COBIT 5, and ISO/IEC27001)

Systematic Literature Review: Integration of Artificial Intelligence and Blockchain in Cybersecurity Enhancement Based on Industry Standards (NIST CSF, COBIT 5, and ISO/IEC27001)

Authors

  • Muhamad Deni Ramdani Universitas Sebelas April

Keywords:

Cybersecurity

Abstract

This Systematic Literature Review (SLR) analyzes the integration of Artificial Intelligence (AI) and Blockchain in cybersecurity enhancement, focusing on industry standard-based implementations such as NIST Cybersecurity Framework, COBIT 5, and ISO/IEC 27001. AI is proving essential for realtime detection and mitigation of complex cyber threats through machine learning and deep learning, despite challenges such as big data requirements and the risk of false positives. Meanwhile, Blockchain also strengthens data security with decentralization, transparency, and immutability, although it is vulnerable to specific attacks such as DDoS and Sybil Attacks. The integration of AI and Blockchain offers synergistic solutions for verified insights and faster responses. The implementation of comprehensive frameworks such as NIST CSF, ISO 27001, and COBIT is crucial in managing cyber risks in various sectors, especially banking and fintech. Cross-sector collaboration and user education are also important pillars for adaptive cyber defense in the future.

References

K. Siber, D. I. Masa, D. Tantangan, and D. A. N. Teknologi, “YANG DIBUTUHKAN,” no. November, pp. 1247–1254, 2024.

J. M. Polgan et al., “Peran Artificial Intelligence dalam Deteksi Dini Ancaman Keamanan Jaringan,” vol. 13, pp. 2044–2048, 2024.

A. G. Pongoh, R. A. Fahreza, B. Al Kindi, F. S. Pribadi, and R. Ajie, “Systematic Literature Review ( SLR ): Dampak Pemanfaatan Artificial Intelligence untuk Meningkatkan Cyber Security Systematic Literature Review ( SLR ): The Impact of Utilizing Artificial Intelligence to Enhance Cyber Security,” vol. 7, no. 1, pp. 34–41, 2024.

L. J. Su and B. A. Sekti, “Implementasi Artificial Intelligence dalam Meningkatkan Cyber Security : Analisis ancaman dan Pencegahan,” pp. 199-203.

A. Author, “An Evaluation Framework for Cybersecurity Maturity Aligned with the NIST CSF,”

Sensors, vol. 22, no. 1, p. 1001, 2022.

M. Wafiq and N. Angresti, “Comparative Analysis of Cybersecurity Maturity Frameworks: NIST‐CSF and C2M2,” J. Keamanan Siber, vol. 3, no. 1, pp. 13–21, 2024.

Y. Alvina, W. Sridayanti, and N. Azzahra, “Analisis Teknologi Blockchain Pada Cybersecurity Di Bidang Akuntansi: Sistematik Literatur Review Analysis of Blockchain Technology in Cybersecurity in the Field of Accounting: Systematic Literature Review,” J. Ris. Akunt., vol. 16, no. 1, pp. 42–57, 2024.

F. L. Caseba and T. Dewayanto, “Penerapan Artificial Intelligence, Big Data, Dan BlockchainDalam Fintech Payment Terhadap Risiko Penipuan Komputer(Computer Fraud Risk): a Systematic Literature Review,” Diponegoro J. Account., pp. 1–15, 2024.

S. Azizah et al., “Keamanan siber sebagai fondasi pengembangan aplikasi keuangan mobile : Studi literatur mengenai cybercrime dan mitigasinya kehidupan , aplikasi keuangan mobile telah menjadi salah satu inovasi terkemuka yang bisnis dalam mengakses dan mengelola keuangan s,” vol. 17, no. September, pp. 221–237, 2024.

E. Hariyanti et al., “Implementations of Artificial Intelligence in Various Domains of IT Governance: A Systematic Literature Review,” J. Inf. Syst. Eng. Bus. Intell., vol. 9, no. 2, pp. 305–319, 2023, doi:10.20473/jisebi.9.2.305-319.

R. Setiawan, “Digitalisasi Perbankan dan Ancaman Keamanan Siber : Tantangan dan Strategi Mitigasi Risiko Operasional,” vol. 1, no. 1, 2025.

E. Riana, M. E. S. Sulistyawati, and O. P. Putra, “Analisis Tingkat Kematangan (Maturity Level) Dan PDCA (Plan-Do-Check-Act) Dalam Penerapan

Audit Sistem Manajemen Keamanan Informasi Pada PT Indonesia Game Menggunakan Metode ISO 27001:2013,” J. Inf. Syst. Res., vol. 4, no. 2, pp. 632–640, 2023, doi: 10.47065/josh.v4i2.2552.

N. M. Farhan and B. Setiaji, “Indonesian Journal of Computer Science,” Indones. J. Comput. Sci., vol. 12, no. 2, pp. 284–301, 2023, [Online]. Available: http://ijcs.stmikindonesia.ac.id/ijcs/index.php/ijcs/article/view/3135

M. Mukhlisin and R. A. Firmansyah, “ZERO TRUST ARCHITECTURE : SOLUSI KEAMANAN DAN PRIVASI UNTUK INSTITUSI PENDIDIKAN , SYSTEMATIC LITERATURE REVIEW,” vol. 9, no. 4, pp. 6926–6935, 2025.

I. P. Agus, E. Pratama, I. M. O. Widyantara, and N. Gunantara, “Mapping Review Penerapan Artificial Intelligence pada Cyber Security untuk Meningkatkan Security Awareness,” pp. 343–350, 2024.

Helmiawan, M. A., & Wiharko, T. (2018). Application of Fingerprint Security System on Motorcycles using Arduino Microcontroller. J-Tin’s-Jurnal Teknik Informatika, 2(1).

Helmiawan, M. A., Juna, D. I., & Ramdhani, B. (2018). Pengamanan Sistem Dan Data E-Voting Berbasis Network. INTERNAL (Information System Journal), 1(1), 1–10.

Helmiawan, M. A., Firmansyah, E., Fadil, I., Sofivan, Y., Mahardika, F., & Guntara, A. (2020). Analysis of web security using open web application security project 10. 2020 8th International Conference on Cyber and IT Service Management

Helmiawan, M. A., Julian, E., Cahyan, Y., & Saeppani, A. (2021). Experimental evaluation of security monitoring and notification on network intrusion detection system for server security. 2021 9th International Conference on Cyber and IT Service Management (CITSM ….

Helmiawan, M. A., Fadil, I., Sofiyan, Y., & Firmansyah, E. (2021). Security model using intrusion detection system on cloud computing security management. 2021 9th International Conference on Cyber and IT Service Management (CITSM ….

Helmiawan, M. A., & Nasution, A. I. (2022). The Effect of Internet Banking Use and Customer Protection Against Cyber Crime at Bank Rakyat Indonesia. Journal of Islamic Economics and Business, 2(2), 170–183.

Published

2025-08-20
Loading...