Applied Sciences | Open Access |

Cybersecurity, Artificial Intelligence, And Iot Integration: A Multilayered Framework For Secure Intelligent Systems

Johnathan A. Roberts , Global Institute of Cybersecurity Studies, New Haven, USA

Abstract

Effective cybersecurity in critical infrastructure systems has become an urgent global necessity. As industries increasingly deploy continuous integration/continuous deployment (CI/CD) pipelines, surge in interconnected systems, and pervasive use of artificial intelligence (AI), vulnerabilities proliferate in both software and operational layers. This paper presents a novel, integrated framework that synthesizes established cybersecurity standards with cutting‑edge AI-based vulnerability detection and demand forecasting models, aiming to secure CI/CD-powered critical infrastructure systems. Leveraging the principles of the National Institute of Standards and Technology (NIST) cybersecurity framework (NIST, 2018) as a foundational scaffold, the proposed methodology incorporates AI-driven code analysis, anomaly detection, resource demand forecasting, and continuous vulnerability management. We discuss theoretical underpinnings, detail a comprehensive methodology, and enumerate expected results. Our discussion explores potential limitations, ethical considerations, and a roadmap for future research. This work contributes to bridging the gap between standardized cybersecurity guidelines and dynamic, AI-enhanced defense in modern CI/CD and critical infrastructure environments.

Keywords

CI/CD security, AI-based vulnerability detection, NIST cybersecurity framework

References

NIST - National Institute of Standards and Technology. (2018). Framework for improving critical infrastructure cybersecurity. Retrieved from https://doi.org/10.6028/NIST.CSWP.04162018

Kumar, S., Jain, A., Rani, S., Ghai, D., Achampeta, S., & Raja, P. (2021, December). Enhanced SBIR based Re-Ranking and Relevance Feedback. In 2021 10th International Conference on System Modeling & Advancement in Research Trends (SMART) (pp. 7-12). IEEE.

Malik, G., Rahul Brahmbhatt, & Prashasti. (2025).

AI-Driven Security and Inventory Optimization: Automating Vulnerability Management and Demand Forecasting in CI/CD-Powered Retail Systems. International Journal of Computational and Experimental Science and Engineering, 11(3). https://doi.org/10.22399/ijcesen.3855

Jain, A., Singh, J., Kumar, S., Florin-Emilian, Ț., Traian Candin, M., & Chithaluru, P. (2022). Improved recurrent neural network schema for validating digital signatures in VANET. Mathematics, 10(20), 3895.

Kumar, S., Haq, M. A., Jain, A., Jason, C. A., Moparthi, N. R., Mittal, N., & Alzamil, Z. S. (2023). Multilayer Neural Network Based Speech Emotion Recognition for Smart Assistance. Computers, Materials & Continua, 75(1).

Misra, N. R., Kumar, S., & Jain, A. (2021, February). A review on E-waste: Fostering the need for green electronics. In 2021 international conference on computing, communication, and intelligent systems (ICCCIS) (pp. 1032-1036). IEEE.

Kumar, S., Shailu, A., Jain, A., & Moparthi, N. R. (2022). Enhanced method of object tracing using extended Kalman filter via binary search algorithm. Journal of Information Technology Management, 14(Special Issue: Security and Resource Management challenges for Internet of Things), 180-199.

Harshitha, G., Kumar, S., Rani, S., & Jain, A. (2021, November). Cotton disease detection based on deep learning techniques. In 4th Smart Cities Symposium (SCS 2021) (Vol. 2021, pp. 496-501). IET.

Jain, A., Dwivedi, R., Kumar, A., & Sharma, S. (2017). Scalable design and synthesis of 3D mesh network on chip. In Proceeding of International Conference on Intelligent Communication, Control and Devices: ICICCD 2016 (pp. 661-666). Springer Singapore.

Chen, T., et al. (2020). DeepCode: A Deep Learning Approach to Code Vulnerability Detection. IEEE Transactions on Software Engineering.

Ravindar Reddy Gopireddy. (2024). Securing the Future: The Convergence of Cybersecurity, AI, and IoT in a World Dominated by Intelligent Machines. European Journal of Advances in Engineering and Technology, 11(8), 91–95. https://doi.org/10.5281/zenodo.13753300

Szabó, Z., & Bilicki, V. (2023). A New Approach to Web Application Security: Utilizing GPT Language Models for Source Code Inspection. Future Internet. https://doi.org/10.3390/fi15100326

Ravindar Reddy Gopireddy. (2024). Securing AI Systems: Protecting Against Adversarial Attacks and Data Poisoning. Journal of Scientific and Engineering Research, 11(5), 276–281. https://doi.org/10.5281/zenodo.13253611

S, P., B, C., & Raju, L. (2022). Developer’s Roadmap to Design Software Vulnerability Detection Model Using Different AI Approaches. IEEE Access, 10, 75637-75656. https://doi.org/10.1109/access.2022.3191115

Ravindar Reddy Gopireddy. (2024). Ensuring Human-Centric AI: Ethical and Technical Safeguards for Collaborative Intelligence. European Journal of Advances in Engineering and Technology, 11(3), 125–130. https://doi.org/10.5281/zenodo.13253024

Borg, M., & Borg, M. (2023). Pipeline Infrastructure Required to Meet the Requirements on AI. IEEE Software, 40, 18-22. https://doi.org/10.1109/MS.2022.3211687

Gopireddy, R. R. (2018). MACHINE LEARNING FOR INTRUSION DETECTION SYSTEMS (IDS) AND FRAUD DETECTION IN FINANCIAL SERVICES [IJCEM Journal]. https://doi.org/10.5281/zenodo.13929200

Suneja, S., Zheng, Y., Zhuang, Y., Laredo, J., & Morari, A. (2020). Learning to map source code to software vulnerability using code-as-a-graph. ArXiv, abs/2006.08614

Article Statistics

Downloads

Download data is not yet available.

Copyright License

Download Citations

How to Cite

Johnathan A. Roberts. (2025). Cybersecurity, Artificial Intelligence, And Iot Integration: A Multilayered Framework For Secure Intelligent Systems. The American Journal of Applied Sciences, 7(11), 70–76. Retrieved from https://www.theamericanjournals.com/index.php/tajas/article/view/6962