The Evolution of Deepfake Threats in Cybersecurity: A Systematic Literature Review on AI and Blockchain-Based Defense Mechanisms

The Evolution of Deepfake Threats in Cybersecurity: A Systematic Literature Review on AI and Blockchain-Based Defense Mechanisms

Authors

  • Fadillah Universitas Sebelas April

Keywords:

Cyber Attack, Cyber Security

Abstract

Deepfake technology, powered by advanced artificial intelligence (AI), has introduced new and highly sophisticated threats in the cybersecurity domain. These synthetic media, generated primarily through deep learning models such as Generative Adversarial Networks (GANs), are being utilized in a range of malicious activities including misinformation, identity theft, voice phishing (vishing), and corporate fraud. This Systematic Literature Review (SLR) analyzes four recent scientific studies published between 2021 and 2024 that propose various detection and prevention mechanisms for deepfakes. Special focus is given to AI-based detection techniques and blockchain-integrated verification systems. The review highlights decentralized defense frameworks, federated learning approaches, and challenges in achieving real-time detection. This paper contributes to the growing body of knowledge by outlining technological trends, identifying current gaps, and proposing future directions in deepfake defense within cybersecurity.

References

D. Sarkar, “Decentralized Deepfake Detection Blockchain Network using Dynamic Algorithm Management,” arXiv preprint, arXiv:2311.18545, 2023. [Online]. Available: https://arxiv.org/pdf/2311.18545

Anonymous, “A Novel Blockchain-Based Deepfake Detection Method Using Federated Learning,” Cognitive Computation, Springer, 2024.

[Online]. Available: https://link.springer.com/content/pdf/10.1007/s12559-024-10255-7.pdf

N. Choi and H. Kim, “DDS: Deepfake Detection System through Collective Intelligence and Blockchain,” Applied Sciences, vol. 13, no. 4, p. 2122, 2021. doi: 10.3390/app13042122

W. Khimi, et al., “A Systematic Review on Deep Fake Image Generation, Detection Techniques, and Impacts,” International Journal of Computational Intelligence, vol. 3, no. 8, 2024. [Online]. Available: https://vsrp.co.uk/wp-content/uploads/4-IJCI-Vol.-3-No.-8-August-

2024-paper3-Ms.-Weeam.pdf

Helmiawan, M. A., Fadil, I., Sofiyan, Y., & Firmansyah, E. (2021). Security model using intrusion detection system on cloud computing security management. 2021 9th International Conference on Cyber and IT Service Management

Helmiawan, M. A., & Nasution, A. I. (2022). The Effect of Internet Banking Use and Customer Protection Against Cyber Crime at Bank Rakyat Indonesia. Journal of Islamic Economics and Business, 2(2), 170–183.

Helmiawan, M. A., Firmansyah, E., Fadil, I., Sofivan, Y., Mahardika, F., & Guntara, A. (2020). Analysis of web security using open web application security project 10. 2020 8th International Conference on Cyber and IT Service Management

Helmiawan, M. A., Julian, E., Cahyan, Y., & Saeppani, A. (2021). Experimental evaluation of security monitoring and notification on network intrusion detection system for server security. 2021 9th International Conference on Cyber and IT Service Management

Published

2026-02-17
Loading...