AI in Cybersecurity: A Systematic Review and Conceptual Audit Model

Authors

  • Ndaedzo Rananga University of Pretoria, South Africa
  • H.S Venter University of Pretoria, South Africa
Pages Icon

DOI:

https://doi.org/10.63158/journalisi.v8i2.1579

Keywords:

Cybersecurity auditing, Artificial intelligence, Generative AI, Risk-based auditing, Continuous auditing

Abstract

Technological advances, particularly in Artificial Intelligence (AI), are accelerating digital transformation while increasing system complexity and exposure to sophisticated cyber threats. These developments challenge traditional cybersecurity audit approaches, which are largely periodic, retrospective, and focused on binary control checks. In response, the adoption of generative AI (GenAI) and predictive AI (PredAI) in cybersecurity auditing is becoming increasingly important. Although AI can improve audit intelligence, scalability, timeliness, and effectiveness, its use also raises concerns about transparency, governance, and auditor independence. This study employed a two-stage methodology. First, a systematic literature review following PRISMA examined studies published between 2021 and 2026, yielding 36 eligible articles. The review found that hybrid AI approaches dominate the literature (58.3%), followed by GenAI (25.0%) and PredAI (16.7%). Despite this growing interest, the literature gives limited attention to risk-based auditing approaches that move beyond binary control confirmation toward context-aware, intelligence-driven cyber risk assessment. Second, using Design Science Research, the study developed the conceptual Anti-Sheriff cybersecurity auditing model. The model shifts auditing from compliance-driven enforcement to intelligence-supported risk governance, enabling continuous auditing, better risk prioritisation, and stronger organisational cyber resilience.

Downloads

Download data is not yet available.

References

[1] N. Rananga and H. S. Venter, “Beyond the Hype : Readiness Assessment of SMEs for AI-Driven Cybersecurity Audits,” 2025 Int. Conf. Intell. Comput. Next Gener. Networks, pp. 1–6, 2025, doi: 10.1109/ICNGN67480.2025.11413704.

[2] A. Calvo, S. Escuder, N. Ortiz, J. Escrig, and M. Compastié, “RBD24 : A labelled dataset with risk activities using log application data,” Comput. Secur., vol. 150, no. December 2024, p. 104290, 2025, doi: 10.1016/j.cose.2024.104290.

[3] L. Guan, H. Shi, H. Chen, and Y. Wang, “Dynamic Scheduling for Security Protection Re-2 Sources in Cloud–Edge Collaboration Scenarios Using Deep Reinforcement Learning,” Mathematics, vol. 13, no. 19, pp. 1–23, 2025, doi: 10.3390/math13193055.

[4] B. Faturoti, “Online learning during COVID19 and beyond: a human right based approach to internet access in Africa,” Int. Rev. Law, Comput. Technol., vol. 36, no. 1, pp. 68–90, 2022, doi: 10.1080/13600869.2022.2030027.

[5] S. Bharati, M. R. H. Mondal, and P. Podder, “A Review on Explainable Artificial Intelligence for Healthcare: Why, How, and When?,” IEEE Trans. Artif. Intell., vol. 5, no. 4, pp. 1429–1442, 2024, doi: 10.1109/TAI.2023.3266418.

[6] H. Hartono, “A Study on Competitiveness of ICT Adoption and Entrepreneurship Orientation on SMEs in Indonesia,” 2019 Int. Conf. Inf. Manag. Technol., vol. 1, no. August, pp. 53–57, 2019.

[7] H. Mo and S. Ouyang, “( Generative ) AI in Financial Economics ( Generative ) AI in Financial Economics,” J. Chinese Econ. Bus. Stud., vol. 23, no. 4, pp. 509–588, 2025, doi: 10.1080/14765284.2025.2569006.

[8] C. Rout, S. Sethi, J. C. Badajena, and R. K. Sahoo, “FSEGM: feature selection and ensemble generative model for adaptive cloud security,” J. Cloud Comput., vol. 15, no. 1, 2026, doi: 10.1186/s13677-025-00818-w.

[9] S. Biswal, “SCOUT: Surveillance and Cyber harassment Observation of Unseen Threats,” Proc. - 2024 Int. Conf. Artif. Intell. Metaverse Cybersecurity, ICAMAC 2024, pp. 1–6, 2024, doi: 10.1109/ICAMAC62387.2024.10828792.

[10] S. Guntuka and E. Shakshuki, “Application of Generative Artificial Intelligence in Minimizing Cyber Attacks on Vehicular Networks,” Procedia Comput. Sci., vol. 251, pp. 140–149, 2024, doi: 10.1016/j.procs.2024.11.094.

[11] N. Rananga and H. S. Venter, “Mobile Cloud Computing Adoption Model as a Feasible Response to Countries’ Lockdown as a Result of the COVID-19 Outbreak and beyond,” 2020 IEEE Conf. e-Learning, e-Management e-Services, IC3e 2020, no. Mcc, pp. 61–66, 2020, doi: 10.1109/IC3e50159.2020.9288402.

[12] S. Al-Eidi, O. Darwish, Y. Chen, M. Maabreh, and Y. Tashtoush, “A deep learning approach for detecting covert timing channel attacks using sequential data,” Cluster Comput., vol. 5, 2023, doi: 10.1007/s10586-023-04035-5.

[13] L. Morales-Navarro, M. Gan, E. Yu, L. Vogelstein, Y. B. Kafai, and D. Metaxa, “Learning AI Auditing: A Case Study of Teenagers Auditing a Generative AI Model,” Proc. ACM Human-Computer Interact., vol. 9, no. 7, pp. 0–29, 2025, doi: 10.1145/3757620.

[14] E. Hermann and S. Puntoni, “Artificial intelligence and consumer behavior: From predictive to generative AI,” J. Bus. Res., vol. 180, no. April, p. 114720, 2024, doi: 10.1016/j.jbusres.2024.114720.

[15] R. M. Skrynkovskyy, “An IT Audit as a Tool for Strategic Enterprise Management,” Probl. Ekon., vol. 1, no. 35, pp. 231–236, 2018.

[16] O. Ilori, C. I. Lawal, S. C. Friday, N. J. Isibor, and E. C. C.- Eke, “Cybersecurity Auditing in the Digital Age: A Review of Methodologies and Regulatory Implications,” J. Front. Multidiscip. Res., vol. 3, no. 1, pp. 174–187, 2022, doi: 10.54660/.ijfmr.2022.3.1.174-187.

[17] S. K. Jah Rizvi, K. F. Javed, and M. Moazam, “CAS - Attention based ISO/IEC 15408-2 Compliant Continuous Audit System for Insider Threat Detection,” 3rd IEEE Int. Conf. Artif. Intell. ICAI 2023, no. February, pp. 153–157, 2023, doi: 10.1109/ICAI58407.2023.10136657.

[18] R. Barton, P. W. C. Prasad, I. Seher, and A. Elchouemi, “Artificial Intelligence (AI) in Cybersecurity and Inhibitors to AI Adoption,” IEIR 2024 - Proc. 3rd Int. Conf. Intell. Educ. Intell. Res., pp. 1–10, 2024, doi: 10.1109/IEIR62538.2024.10959777.

[19] M. Nachouki, “AI-Augmented Financial Ratio Analysis for Early Warning , Monitoring , and Assurance,” 2025 8th Int. Conf. Signal Process. Inf. Secur., pp. 1–5, 2025, doi: 10.1109/ICSPIS67605.2025.11318382.

[20] M. Gupta, C. Akiri, K. Aryal, E. Parker, and L. Praharaj, “From ChatGPT to ThreatGPT: Impact of Generative AI in Cybersecurity and Privacy,” IEEE Access, vol. 11, no. August, pp. 80218–80245, 2023, doi: 10.1109/ACCESS.2023.3300381.

[21] M. Wessel et al., “Generative AI and its Transformative Value for Digital Platforms Generative AI and its Transformative Value for Digital Platforms,” J. Manag. Inf. Syst., vol. 42, no. 2, pp. 346–369, 2025, doi: 10.1080/07421222.2025.2487315.

[22] H. D. and E. G. Joe Devanny, Generative AI and Intelligence Assessment. 2023.

[23] S. Metta1 and & A. F. E. , Isaac Chang2, Jack Parker3, Michael P. Roman1, “Generative AI in Cybersecurity Shivani.”

[24] M. Roopesh, N. Nishat, I. Arif, and A. E. Bajwa, “a Comprehensive Review of Machine Learning and Deep Learning Applications in Cybersecurity: an Interdisciplinary Approach,” Acad. J. Sci. Technol. Eng. Math. Educ., vol. 4, no. 04, pp. 37–53, 2024, doi: 10.69593/ajsteme.v4i04.118.

[25] D. F. Voting, M. Edmore, S. Baror, and S. Makura, “The Indonesian Journal of Computer Science,” vol. 14, no. 6, pp. 10219–10237, 2025.

[26] J. Prümmer, T. van Steen, and B. van den Berg, “A systematic review of current cybersecurity training methods,” Comput. Secur., vol. 136, no. October 2023, p. 103585, 2024, doi: 10.1016/j.cose.2023.103585.

[27] L. S. Goecks, M. De Souza, T. P. Librelato, and L. R. Trento, “Design Science Research in practice: Review of applications in Industrial Engineering,” Gest. e Prod., vol. 28, no. 4, pp. 1–19, 2021, doi: 10.1590/1806-9649-2021v28e5811.

[28] R. Al Nafea and M. Amin Almaiah, “Cyber Security Threats in Cloud: Literature Review,” 2021 Int. Conf. Inf. Technol. ICIT 2021 - Proc., pp. 779–786, 2021, doi: 10.1109/ICIT52682.2021.9491638.

[29] S. Rananga, B. Isong, A. Modupe, and V. Marivate, “Misinformation Detection: A Review for High and Low-Resource Languages,” J. Inf. Syst. Informatics, vol. 6, no. 4, pp. 2892–2922, 2024, doi: 10.51519/journalisi.v6i4.931.

[30] M. Kamruzzaman, M. K. Bhuyan, R. Hasan, S. F. Farabi, S. I. Nilima, and M. A. Hossain, “Exploring the Landscape: A Systematic Review of Artificial Intelligence Techniques in Cybersecurity,” Proc. 2024 IEEE Int. Conf. Commun. Comput. Cybersecurity Informatics, CCCI 2024, pp. 1–6, 2024, doi: 10.1109/CCCI61916.2024.10736474.

[31] L. Ofusori, T. Bokaba, and S. Mhlongo, “Artificial Intelligence in Cybersecurity: A Comprehensive Review and Future Direction,” Appl. Artif. Intell., vol. 38, no. 1, 2024, doi: 10.1080/08839514.2024.2439609.

[32] A. Valente, M. Holanda, A. M. Mariano, R. Furuta, and D. Da Silva, “Analysis of Academic Databases for Literature Review in the Computer Science Education Field,” Proc. - Front. Educ. Conf. FIE, vol. 2022-Octob, pp. 1–7, 2022, doi: 10.1109/FIE56618.2022.9962393.

[33] P. Vareta, H. Muzenda, T. Nyamupaguma, and B. Ndlovu, “The Indonesian Journal of Computer Science,” vol. 14, no. 6, pp. 10072–10102, 2025.

[34] F. Carcassi and G. Sbardolini, “Assertion, denial, and the evolution of Boolean operators,” Mind Lang., vol. 38, no. 5, pp. 1187–1207, 2023, doi: 10.1111/mila.12448.

[35] A. A. Khan et al., “BDLT-IoMT—a novel architecture: SVM machine learning for robust and secure data processing in Internet of Medical Things with blockchain cybersecurity,” J. Supercomput., vol. 81, no. 1, pp. 1–22, 2025, doi: 10.1007/s11227-024-06782-7.

[36] V. Bolbot, K. Kulkarni, P. Brunou, O. V. Banda, and M. Musharraf, “Developments and research directions in maritime cybersecurity: A systematic literature review and bibliometric analysis,” Int. J. Crit. Infrastruct. Prot., vol. 39, no. October, 2022, doi: 10.1016/j.ijcip.2022.100571.

[37] A. Al-Dhaqm, S. A. Razak, R. A. Ikuesan, V. R. Kebande, and K. Siddique, “A review of mobile forensic investigation process models,” IEEE Access, vol. 8, pp. 173359–173375, 2020, doi: 10.1109/ACCESS.2020.3014615.

[38] J. Venable, J. Pries-Heje, and R. Baskerville, “A comprehensive framework for evaluation in design science research,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 7286 LNCS, no. 2012, pp. 423–438, 2012, doi: 10.1007/978-3-642-29863-9_31.

[39] J. vom Brocke, A. Hevner, and A. Maedche, “Introduction to Design Science Research,” no. November, pp. 1–13, 2020, doi: 10.1007/978-3-030-46781-4_1.

[40] N. H. A. Mutalib, A. Q. M. Sabri, A. W. A. Wahab, E. R. M. F. Abdullah, and N. AlDahoul, “Explainable deep learning approach for advanced persistent threats (APTs) detection in cybersecurity: a review,” Artif. Intell. Rev., vol. 57, no. 11, 2024, doi: 10.1007/s10462-024-10890-4.

[41] H. Suryotrisongko and Y. Musashi, “Evaluating hybrid quantum-classical deep learning for cybersecurity botnet DGA detection,” Procedia Comput. Sci., vol. 197, no. 2021, pp. 223–229, 2021, doi: 10.1016/j.procs.2021.12.135.

[42] H. Shi, “Network Security Situation Awareness Model and Empirical Re-search Based on Artificial Intelligence,” Proc. 2025 4th Int. Conf. Intell. Syst. Commun. Comput. Networks, ISCCN 2025, no. February 2025, pp. 77–84, 2025, doi: 10.1145/3732945.3732956.

[43] T. Bishtawi and R. Alzubi, “Cyber Security of Mobile Applications Using Artificial Intelligence,” 1st Int. Eng. Conf. Electr. Energy, Artif. Intell. EICEEAI 2022, pp. 1–6, 2022, doi: 10.1109/EICEEAI56378.2022.10050484.

[44] M. Pycka and M. Zastempowski, “Machine learning and artificial intelligence techniques adopted for IT audit,” Management, vol. 29, no. 1, pp. 65–87, 2025, doi: 10.58691/man/200768.

[45] M. J. Hossain, K. Alam, M. F. Monir, M. M. Hoque, and T. Ahmed, “Explainable AI Meets Synthetic Data: A Deep Learning Framework for Detecting Network Intrusion in NextG Network Infrastructure,” IEEE Access, vol. 13, no. July, pp. 114979–115001, 2025, doi: 10.1109/ACCESS.2025.3585783.

[46] S. M. Darwish, A. I. Salama, A. A. Elzoghabi, and N. A. El-Shoafy, “An intelligent memetic approach to detect online fraud for distributed fintech environments,” Electron. Commer. Res., 2025, doi: 10.1007/s10660-025-10050-y.

[47] S. Dambe, S. Gochhait, and S. Ray, “The Role of Artificial Intelligence in Enhancing Cybersecurity and Internal Audit,” 2023 3rd Int. Conf. Adv. Electron. Commun. Eng. AECE 2023, pp. 88–93, 2023, doi: 10.1109/AECE59614.2023.10428353.

[48] M. Y. Alzahrani and A. M. Bamhdi, “Hybrid deep-learning model to detect botnet attacks over internet of things environments,” Soft Comput., vol. 26, no. 16, pp. 7721–7735, 2022, doi: 10.1007/s00500-022-06750-4.

[49] M. Kumari, M. Gaikwad, and S. A. Chavan, “A secure IoT-edge architecture with data-driven AI techniques for early detection of cyber threats in healthcare,” Discov. Internet Things, vol. 5, no. 1, 2025, doi: 10.1007/s43926-025-00147-z.

[50] D. Chiba, H. Nakano, and T. Koide, “DomainDynamics: Advancing lifecycle-based risk assessment of domain names,” Comput. Secur., vol. 153, no. December 2024, p. 104366, 2025, doi: 10.1016/j.cose.2025.104366.

[51] T. Xin, Y. He, E. D. Zamani, M. Evans, and C. Luo, “A cyber risk economics model for organization-wide risk management (CYREM-ORM),” Comput. Secur., vol. 165, no. July 2025, 2026, doi: 10.1016/j.cose.2026.104873.

[52] L. Yuan et al., “FusionITD: enhanced cross-modal insider threat perception framework via behavior-semantic fusion,” Cybersecurity, vol. 9, no. 1, 2026, doi: 10.1186/s42400-026-00555-w.

[53] A. Reddy and A. Pradesh, “Innovative Approaches to Dark Web Monitoring for Cybersecurity Intelligence,” pp. 1–5, 2025.

[54] M. Shahin, F. F. Chen, A. Hosseinzadeh, H. Bouzary, and R. Rashidifar, “A deep hybrid learning model for detection of cyber attacks in industrial IoT devices,” Int. J. Adv. Manuf. Technol., vol. 123, no. 5–6, pp. 1973–1983, 2022, doi: 10.1007/s00170-022-10329-6.

[55] R. R. Irshad et al., “Enhancing Cloud-Based Inventory Management: A Hybrid Blockchain Approach With Generative Adversarial Network and Elliptic Curve Diffie Helman Techniques,” IEEE Access, vol. 12, no. January, pp. 25917–25932, 2024, doi: 10.1109/ACCESS.2024.3367445.

[56] S. Sathyakala and E. Anbalagan, “Comparative Analysis of Cyber Security Threat Detection Based on Artificial Intelligence Approaches,” 2024 Asian Conf. Intell. Technol. ACOIT 2024, pp. 1–8, 2024, doi: 10.1109/ACOIT62457.2024.10940025.

[57] Y. C. Tung, E. C. Liou, P. C. Hu, and C. H. Yu, “VWA-6G AI assisted continuous security monitoring over open RAN service management orchestration,” Comput. Secur., vol. 157, no. June, p. 104566, 2025, doi: 10.1016/j.cose.2025.104566.

[58] M. Repetto, “Cybersecurity Digital Twins: Concept, blueprint, and challenges for multi-ownership digital service chains,” J. Inf. Secur. Appl., vol. 96, no. November 2025, p. 104299, 2026, doi: 10.1016/j.jisa.2025.104299.

[59] W. Wei and L. Liu, “Trustworthy Distributed AI Systems: Robustness, Privacy, and Governance,” ACM Comput. Surv., vol. 57, no. 6, 2025, doi: 10.1145/3645102.

[60] A. E. Muhammad, K. C. Yow, N. Bačanin-Džakula, and M. A. Khan, L-xaids: A LIME-based eXplainable AI framework for intrusion detection systems, vol. 28, no. 10. 2025.

[61] R. Kumar, A. Aljuhani, D. Javeed, P. Kumar, S. Islam, and A. K. M. N. Islam, “Digital Twins-enabled Zero Touch Network: A smart contract and explainable AI integrated cybersecurity framework,” Futur. Gener. Comput. Syst., vol. 156, no. February, pp. 191–205, 2024, doi: 10.1016/j.future.2024.02.015.

[62] M. Malatji, “Augmented Intelligence Framework for Human–Artificial Intelligence Teaming in Cybersecurity,” Human-Centric Intell. Syst., vol. 5, no. 2, pp. 151–180, 2025, doi: 10.1007/s44230-025-00103-8.

[63] L. Alevizos, “Automated cybersecurity compliance and threat response using AI, blockchain and smart contracts,” Int. J. Inf. Technol., vol. 17, no. 2, pp. 767–781, 2025, doi: 10.1007/s41870-024-02324-9.

[64] W. Ibrar, D. Mahmood, A. S. Al-Shamayleh, G. Ahmed, S. Z. Alharthi, and A. Akhunzada, “Generative AI: a double-edged sword in the cyber threat landscape,” Artif. Intell. Rev., vol. 58, no. 9, 2025, doi: 10.1007/s10462-025-11285-9.

[65] N. Goel, “Federated Learning Framework for Risk diagnosis in Enterprise Information Security model,” 2025 Tenth Int. Conf. Sci. Technol. Eng. Math., pp. 1–6, doi: 10.1109/ICONSTEM65670.2025.11374875.

[66] X. Qiu and S. Zhang, “Application analysis of generative artificial intelligence in basic education,” no. December 2024, pp. 41–46, 2024, doi: 10.1145/3723420.3723428.

[67] J. Kim et al., “Anomaly detection based on traffic monitoring for secure blockchain networking,” IEEE Int. Conf. Blockchain Cryptocurrency, ICBC 2021, vol. 19, no. 3, pp. 3619–3632, 2021, doi: 10.1109/ICBC51069.2021.9461119.

[68] S. Islam, N. Basheer, S. Papastergiou, M. Ciampi, and S. Silvestri, “Intelligent dynamic cybersecurity risk management framework with explainability and interpretability of AI models for enhancing security and resilience of digital infrastructure,” J. Reliab. Intell. Environ., vol. 11, no. 3, pp. 1–25, 2025, doi: 10.1007/s40860-025-00253-3.

[69] H. A. Al-Hashimi, R. A. Khan, H. S. Alwageed, A. M. Algarni, S. Ayouni, and A. O. Almagrabi, “Exploring the role of generative AI in enhancing cybersecurity in software development life cycle,” Array, vol. 28, no. March, p. 100509, 2025, doi: 10.1016/j.array.2025.100509.

[70] M. Chen, F. Liu, D. Liang, S. Zhong, and Y. Li, “Entity Recognition for Power Equipment Data Based on Optional Word Vectors and Feature Fusion,” IEEE Access, vol. 13, no. June, pp. 143767–143780, 2025, doi: 10.1109/ACCESS.2025.3598316.

[71] R. Mohawesh, M. A. Ottom, and H. B. Salameh, “A data-driven risk assessment of cybersecurity challenges posed by generative AI,” Decis. Anal. J., vol. 15, no. January, p. 100580, 2025, doi: 10.1016/j.dajour.2025.100580.

[72] K. S. Kumavat and J. Gomes, “Multi-layer DDoS attacks detection with mitigation in IoT-enabled sensor network,” Cybersecurity, vol. 8, no. 1, pp. 1–24, 2025, doi: 10.1186/s42400-025-00378-1.

[73] R. Xu, D. Liao, H. Meng, and Z. Feng, “Research on Application of Artificial Intelligence Technology in Industrial Information Security,” Proc. 2021 IEEE 3rd Int. Conf. Civ. Aviat. Saf. Inf. Technol. ICCASIT 2021, pp. 683–686, 2021, doi: 10.1109/ICCASIT53235.2021.9633669.

[74] H. Alqahtani and G. Kumar, “A comprehensive review of generative AI techniques and their impact on cybersecurity,” Soft Comput., vol. 29, no. 13–14, pp. 4945–4982, 2025, doi: 10.1007/s00500-025-10702-z.

[75] V. Božić, “AI and Predictive Analytics,” J. Sport. Ind. Blockchain Technol., vol. 1, no. 1, p. 1, 2023.

[76] P. T. Ramazhamba and H. Venter, “Blockchain Forensics and Regulatory Technology for Crypto Tax Compliance: A State-of-the-Art Review and Emerging Directions in the South African Context,” Appl. Sci., vol. 16, no. 2, p. 799, 2026, doi: 10.3390/app16020799.

[77] B. P. David L. Cannon Timothy, Timothy S. Bergmann, CISA Certified Information Systems AuditorTM Study Guide, vol. 1, no. April. 2015.

[78] Z. L. Teo, C. W. N. Quek, J. L. Y. Wong, and D. S. W. Ting, “Cybersecurity in the generative artificial intelligence era,” Asia-Pacific J. Ophthalmol. , vol. 13, no. 4, p. 100091, 2024, doi: 10.1016/j.apjo.2024.100091.

[79] R. Roberts and C. Mcdermott, “Integrating Human Factors into Insider Threat Detection – A Systematic Review Integrating Human Factors into Insider Threat Detection – A Systematic Review,” no. February, pp. 0–37, 2026, doi: 10.1145/3798089.

[80] A. A. Vărzaru, “An Empirical Framework for Assessment of the Effects of Digital Technologies on Sustainability Accounting and Reporting in the European Union,” Electron., vol. 11, no. 22, 2022, doi: 10.3390/electronics11223812.

[81] S. Das Guptta, K. T. Shahriar, H. Alqahtani, D. Alsalman, and I. H. Sarker, “Modeling Hybrid Feature-Based Phishing Websites Detection Using Machine Learning Techniques,” Ann. Data Sci., 2022, doi: 10.1007/s40745-022-00379-8.

Downloads

Published

2026-04-22

Issue

Section

Articles

How to Cite

[1]
N. Rananga and H. Venter, “AI in Cybersecurity: A Systematic Review and Conceptual Audit Model”, journalisi, vol. 8, no. 2, pp. 2182–2247, Apr. 2026, doi: 10.63158/journalisi.v8i2.1579.