Secure DevOps with AI-Enhanced Monitoring
DOI:
https://doi.org/10.15680/IJCTECE.2025.0805002Keywords:
DevOps, Artificial Intelligence, Vulnerability Scanning, Anomaly Detection, Machine Learning, Deep Learning, Security Automation, Predictive Analytics, Threat Detection, AI MonitoringAbstract
The adoption of Artificial Intelligence (AI) as a part of DevOps pipelines has proven to be a disruptive factor in improving software security. Using AI, organizations will be able to scale continuous vulnerability scanning and anomaly detection to automate their DevOps environments and make them more resilient and efficient. The machine learning and deep learning AI models can scan through large volumes of data in real-time to detect vulnerabilities and potential threats that other methods might fail to detect. In this paper, we will discuss how AI can be implemented in DevOps work, and how it can be used to simplify security processes, improve detection accuracy, and decrease the response time. The results also shed light on the massive influence of AI on the automation of security patches, real-time monitoring, and predictive threat analysis. It also found that there are obstacles to the adoption of AI, such as resource limitations and model optimization. Generally, AI-based surveillance should be used in order to have a positive impact on the security level in the contemporary DevOps setting and mitigate the appearance of new threats on a routine basis.
References
1. Ahmad, T., Adnan, M., Rafi, S., Muhammad Azeem Akbar, & Anwar, A. (2024). MLOps-enabled security strategies for next-generation operational technologies. https://doi.org/10.1145/3661167.3661283
2. Kancherla, V. M. (2024). AI-augmented DevOps: The future of automated security and governance in cloud infrastructure. International Journal of Artificial Intelligence, Data Science, and Machine Learning, 5, 65–74. https://doi.org/10.63282/3050-9262.ijaidsml-v5i2p108
3. Aiyenitaju, K. (2024). The role of automation in DevOps: A study of tools and best practices. Theseus.fi. http://www.theseus.fi/handle/10024/876681
4. Eggers, S. L., & Sample, C. (2020, December 1). Vulnerabilities in artificial intelligence and machine learning applications and data. Www.osti.gov. https://www.osti.gov/biblio/1846969
5. Gokarna, M., & Singh, R. (2021). DevOps: A historical review and future works. 2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). https://doi.org/10.1109/icccis51004.2021.9397235
6. Liu, L., De Vel, O., Han, Q.-L., Zhang, J., & Xiang, Y. (2018). Detecting and preventing cyber insider threats: A survey. IEEE Communications Surveys & Tutorials, 20(2), 1397–1417.
7. Nalage, P. (2024). Leveraging Generative AI for Code Refactoring: A Study on Efficiency, Maintainability, and Developer Productivity. Well Testing Journal, 33(S2), 733-753.
8. Rangineni, S., & Bhardwaj, A. K. (2023). Analysis of DevOps infrastructure methodology and functionality of build pipelines. OPAL (Open@LaTrobe) (La Trobe University). https://doi.org/10.36227/techrxiv.23896038
9. Lwakatare, L. E. (2017, November 20). DevOps adoption and implementation in software development practice: Concept, practices, benefits, and challenges. Jultika.oulu.fi. https://oulurepo.oulu.fi/handle/10024/34349
10. Nalage, P. (2025). Agentic Digital Twins: Self-Evolving Models for Autonomous Systems. Well Testing Journal, 34(S3), 227-244.
11. Tanikonda, A., Katragadda, S. R., Peddinti, S. R., & Pandey, B. K. (2025). Integrating AI-driven insights into DevOps practices. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.5102369