Technical Approaches and Defense Mechanisms in Cyber Security: A Systematic Literature Review
English
Keywords:
Cybersecurity, SLR (Systematic Literature Review), technical approaches, defense mechanisms, IOT, SDN, AI, blockchainAbstract
Cybersecurity is a crucial foundation in
maintaining the integrity, confidentiality, and availability of
increasingly complex digital systems. As the cyber threat
landscape continues to evolve, innovation in technical approaches
and defense mechanisms becomes essential. This study presents a
systematic literature review (SLR) of scholarly articles focusing on
technical solutions and defense strategies in cybersecurity. The
goal of this SLR is to identify current trends, research gaps, and
effective defense mechanisms implemented to confront evolving
cyber threats. The selected articles were reviewed based on their
relevance to technical controls, distributed systems, and the
utilization of emerging technologies such as artificial intelligence
(AI) and blockchain. The review results indicate that SoftwareDefined Networking (SDN), Internet of Things (IoT), AI, and
blockchain play crucial roles in strengthening cybersecurity
defenses. In-depth analysis of selected studies reveals how these
technologies offer new capabilities for detection, prevention, and
response to threats, although challenges such as complexity and
scalability remain. This study aims to provide comprehensive
insights for researchers and practitioners in developing more
adaptive and resilient security solutions, and to identify areas for
future research.
References
S. Szymoniak, J. Piątkowski, and M. Kurkowski, “Defense and Security Mechanisms in the Internet of Things: A Review,” Jan. 01, 2025, Multidisciplinary Digital Publishing Institute (MDPI). doi:10.3390/app15020499.
B. Ayodele and V. Buttigieg, “SDN as a defence mechanism: a comprehensive survey,” in International Journal of Information Security,
Springer Science and Business Media Deutschland GmbH, Feb. 2024, pp. 141–185. doi:10.1007/s10207-023-00764-1.
J. Colton and Z. Anwar, “Cyber Defense Strategy Development: AI and Blockchain as Key Tools for Business Protection”, doi:10.13140/RG.2.2.20979.95528.
B. Kitchenham and S. M. Charters, “Guidelines for performing Systematic Literature Reviews in Software Engineering,” 2007. [Online]. Available: https://www.researchgate.net/publication/302924724
Helmiawan, M. A., & Wiharko, T. (2018). Application of Fingerprint Security System on Motorcycles using Arduino Microcontroller. J-Tin’s-Jurnal Teknik Informatika, 2(1).
Helmiawan, M. A., Juna, D. I., & Ramdhani, B. (2018). Pengamanan Sistem Dan Data E-Voting Berbasis Network. INTERNAL (Information System Journal), 1(1), 1–10.
Helmiawan, M. A., Firmansyah, E., Fadil, I., Sofivan, Y., Mahardika, F., & Guntara, A. (2020). Analysis of web security using open web application security project 10. 2020 8th International Conference on Cyber and IT Service Management
Helmiawan, M. A., Julian, E., Cahyan, Y., & Saeppani, A. (2021). Experimental evaluation of security monitoring and notification on network intrusion detection system for server security. 2021 9th International Conference on Cyber and IT Service Management (CITSM ….
Helmiawan, M. A., Fadil, I., Sofiyan, Y., & Firmansyah, E. (2021). Security model using intrusion detection system on cloud computing security management. 2021 9th International Conference on Cyber and IT Service Management (CITSM ….
Helmiawan, M. A., & Nasution, A. I. (2022). The Effect of Internet Banking Use and Customer Protection Against Cyber Crime at Bank Rakyat Indonesia. Journal of Islamic Economics and Business, 2(2), 170–183.