International Research Journal of Library and Information Sciences

  1. Home
  2. Archives
  3. Vol. 2 No. 08 (2025): Volume 02 Issue 08
  4. Articles
International Research Journal of Library and Information Sciences

Article Details Page

Augmenting the Modern Security Operations Center: A Multidimensional Analysis of Generative AI, Automation, and Next-Generation Computing Architectures

Authors

  • Dr. Elias V. Thorne Department of Library & Information Science, Graduate School of Knowledge Science, University of Tsukuba, Ibaraki, Japan

Keywords:

Security Operations Center (SOC), Generative AI, Security Orchestration Automation and Response (SOAR), Neuromorphic Computing

Abstract

Background: The contemporary Security Operations Center (SOC) faces an existential crisis driven by exponential data growth and sophisticated, multi-vector cyber threats. Traditional Security Information and Event Management (SIEM) systems are increasingly insufficient, leading to alert fatigue and delayed response times.

Methods: This study proposes a novel "Cognitive SOC" framework that integrates Generative Artificial Intelligence (GenAI), Security Orchestration, Automation, and Response (SOAR), and emerging computing architectures. We employ a comparative analysis utilizing recent econometric syntheses and productivity studies to model the efficiency gains of AI-augmented security analysts. Furthermore, we evaluate the theoretical integration of neuromorphic computing and quantum algorithms for edge-based threat detection.

Results: Our analysis indicates that GenAI integration is associated with a significant reduction in investigation timelines, mirroring productivity gains observed in software development. Theoretical modeling suggests that neuromorphic architectures could reduce transaction processing latency in edge databases to near-zero levels, enhancing real-time anomaly detection.

 Conclusion: The transition to an AI-driven, potentially quantum-ready SOC is not merely an upgrade but a necessary evolution. While automation offers substantial efficiency improvements, it introduces new risks regarding privacy and operator complacency that must be managed through rigorous governance.

References

Prassanna R Rajgopal. (2025). AI-optimized SOC playbook for Ransomware Investigation. International Journal of Data Science and Machine Learning, 5(02), 41-55. https://doi.org/10.55640/ijdsml-05-02-04

Constantin, L. (2020, December 15). SolarWinds attack explained: And why it was so hard to detect. CSO Online.

Check Point (n.d.). What is a security operations

center (SOC)? Retrieved October 8, 2022.

Sarker, I. H. (2022). Machine learning for intelligent data analysis and automation in cybersecurity: Current and future prospects. Ann. Data. Sci., 10:1473–1498.

Noy, S., & Zhang, W. (2024). Experimental evidence on the productivity effects of generative artificial intelligence. Science, March 2024.

Peng, S., Kalliamvakou, E., Cihon, P., & Demirer,

M. (2023). The impact of AI on developer productivity: Evidence from Github Copilot. arXiv preprint arXiv: 2302.06590.

Khurana, R. (2022). Applications of quantum computing in telecom e-commerce: Analysis of qkd, qaoa, and qml for data encryption, speed optimization, and ai-driven customer experience. Quarterly Journal of Emerging Technologies and Innovations, 7(9), 1-15.

Murthy, P., & Mehra, A. (2021). Exploring neuromorphic computing for ultra-low latency transaction processing in edge database architectures. Journal of Emerging Technologies and Innovative Research, 8(1), 25–26.

Cobb, M. (n.d.). SIEM vs. SOAR vs. XDR:

Evaluate the differences. TechTarget. Retrieved February 4, 2023.

Collins, J., Schneider, M., & Shoard, P. (2021, October 19). SOC model guide. Gartner, ID G00754096.

Crowley, C. & Pescatore, J. (2018). The definition of SOC-cess? SANS 2018 Security Operations Center Survey, SANS Institute.

Sarker, I.H., Furhad M. Hasan, and Ra Nowrozy. (2021). Ai-driven cybersecurity: an overview, security intelligence modeling and research directions. SN Computer Science, 2(3): 1–18.

Microsoft. Microsoft copilot for security frequently asked questions, 2024.

Morgan, P. L., Collins, E. I. M., Spiliotopoulos, T., Greeno, D. J., & Jones, D. M. (2022). Reducing risk to security and privacy in the selection of trigger- action rules: Implicit vs. explicit priming for domestic smart devices. International Journal of Human-Computer Studies, 168:102902.

Roth, J., Sant’Anna, P. H. C., Bilinski, A., & Poe,

J. (2023). What’s trending in difference-in- differences? a synthesis of the recent econometrics literature. Journal of Econometrics, 235(2):2218–2244.

Downloads

Published

2025-08-20

How to Cite

Augmenting the Modern Security Operations Center: A Multidimensional Analysis of Generative AI, Automation, and Next-Generation Computing Architectures. (2025). International Research Journal of Library and Information Sciences, 2(08), 18-23. https://aimjournals.com/index.php/irjlis/article/view/357

How to Cite

Augmenting the Modern Security Operations Center: A Multidimensional Analysis of Generative AI, Automation, and Next-Generation Computing Architectures. (2025). International Research Journal of Library and Information Sciences, 2(08), 18-23. https://aimjournals.com/index.php/irjlis/article/view/357

Similar Articles

You may also start an advanced similarity search for this article.