Robotic Process Automation in Cyber Security Operations: Optimizing Workflows with AI-Driven Automation

Main Article Content

Dharmesh Dhabliya, Gauri Ghule, Deepti Khubalkar, Ravindra K Moje, Pranali S. Kshirsagar, Shailesh P. Bendale,

Abstract

It is very important for today's safety that a Domain-based Message Authentication, Reporting, and Conformance (DMARC) system is set up correctly. This outline sums up the main points of a thorough study that looked at many aspects of DMARC application. The goal was to find a good mix between strong email security and the smooth flow of official communications. The review looks at important factors like email delivery rates, spam protection, false positives, DMARC policy enforcement, alignment success, and issue reaction times. It does this through categorized tables. Collectively, these measures show how complicated DMARC execution is, stressing the need for a complete method. In addition to looking at how well the technology works technically, the study also looks at how well it works for people by looking at things like user education, knowledge, and the cost of implementation. All of these things work together in a complex way to make the system last and be successful overall. The strategic benefits of a well-run DMARC project are shown by the wider effects it has on brand image, return on investment, and customer trust. The results affect more than just safety; they also affect the company's reputation and ability to survive in a tough business world. In conclusion, the evaluation tables are useful tools that help businesses improve and tweak their email security plans. A good DMARC strategy not only protects against online dangers but also builds a culture of knowledge, trust, and organizational excellence. This sets the organization up for long-term success in a digital world that is always changing.

Article Details

Section
Articles
Author Biography

Dharmesh Dhabliya, Gauri Ghule, Deepti Khubalkar, Ravindra K Moje, Pranali S. Kshirsagar, Shailesh P. Bendale,

1Dharmesh Dhabliya

2Dr. Gauri Ghule

3Dr. Deepti Khubalkar

4Ravindra K Moje

5Pranali S. Kshirsagar

6Dr. Shailesh P. Bendale,

1Professor, Department of Information Technology, Vishwakarma Institute of Information Technology, Pune, Maharashtra, India Email: dharmesh.dhabliya@viit.ac.in

2Assistant Professor, Department of Electronics and Telecommunication, VIIT college of Engineering, Pune, Maharashtra, India. Email: gauri.ghule@viit.ac.in

3Assistant Professor, Symbiosis Law School, Nagpur Campus, Symbiosis International (Deemed University), Pune, India. Email: deeptik@slsnagpur.edu.in

4Department of Electronics and Telecommunication Engineering, Pune District Education Association's College of Engineering Manjari, Pune, Maharashtra, India. Email ID: ravindra.moje@gmail.com

5Department of Computer Engineering, Vishwakarma Institute of Information Technology ,Pune - India. Email: pranali.kshirsagar@viit.ac.in

6Head and Assistant Professor, Department of Computer Engineering, NBN Sinhgad School of Engineering, Pune, Maharashtra, India. Email: bendale.shailesh@gmail.com

Copyright © JES 2023 on-line : journal.esrgroups.org

References

Yazdinejad, A. Bohlooli, and K. Jamshidi, “Efficient design and hardware implementation of the openflow v1. 3 switch on the virtex-6 fpgaml605,” The Journal of Supercomputing, vol. 74, no. 3, pp. 1299–1320, 2018.

CyberArk Software, “What is Robotic Process Automation (RPA)? - Definition,” 9 2021.

A. Yazdinejad, R. M. Parizi, A. Dehghantanha, Q. Zhang, and K.-K. R. Choo, “An energy-efficient sdn controller architecture for iot networks with blockchain-based security,” IEEE Transactions on Services Computing, vol. 13, no. 4, pp. 625–638, 2020.

Limkar, Suresh, Ashok, Wankhede Vishal, Singh, Sanjeev, Singh, Amrik, Wagh, Sharmila K. & Ajani, Samir N.(2023) A mechanism to ensure identity-based anonymity and authentication for IoT infrastructure using cryptography, Journal of Discrete Mathematical Sciences and Cryptography, 26:5, 1597–1611

Ajani, S. N. ., Khobragade, P. ., Dhone, M. ., Ganguly, B. ., Shelke, N. ., & Parati, N. . (2023). Advancements in Computing: Emerging Trends in Computational Science with Next-Generation Computing. International Journal of Intelligent Systems and Applications in Engineering, 12(7s), 546–559.

Morzelona, R. (2021). Human Visual System Quality Assessment in The Images Using the IQA Model Integrated with Automated Machine Learning Model . Machine Learning Applications in Engineering Education and Management, 1(1), 13–18. Retrieved from http://yashikajournals.com/index.php/mlaeem/article/view/5

A. Yazdinejad, A. Dehghantanha, R. M. Parizi, M. Hammoudeh, H. Karimipour, and G. Srivastava, “Block hunter: Federated learning for cyber threat hunting in blockchain-based iiot networks,” IEEE Transactions on Industrial Informatics, 2022.

Yazdinejad, A. Dehghantanha, R. M. Parizi, G. Srivastava, and H. Karimipour, “Secure intelligent fuzzy blockchain framework: Effective threat detection in iot networks,” Computers in Industry, vol. 144, p. 103801, 2023.

S. Agostinelli, M. Mecella, G. Amato, and C. Gennaro, “Synthesis of strategies for robotic process automation.,” in SEBD, 2019.

Ajani, S. N. ., Potnurwar, P. V. ., Bongirwar, V. K. ., Potnurwar, A. V. ., Joshi, A. ., & Parati, N. . (2023). Dynamic RRT* Algorithm for Probabilistic Path Prediction in Dynamic Environment. International Journal of Intelligent Systems and Applications in Engineering, 11(7s), 263–271.

Himangi, Prof. (Dr.) Mukesh Singla. (2023). Optimizing the Failure Prediction in Deep Learning. International Journal of New Practices in Management and Engineering, 11(01), 61–67. Retrieved from https://www.ijnpme.org/index.php/IJNPME/article/view/195

Khetani, V. ., Gandhi, Y. ., Bhattacharya, S. ., Ajani, S. N. ., & Limkar, S. . (2023). Cross-Domain Analysis of ML and DL: Evaluating their Impact in Diverse Domains. International Journal of Intelligent Systems and Applications in Engineering, 11(7s), 253–262.

A. Vaseashta, “Applying resilience to hybrid threats in infrastructure, digital, and social domains using multisectoral, multidisciplinary, and wholeof-government approach,” in Building Cyber Resilience against Hybrid Threats, pp. 42–59, IOS Press, 2022.

K. Murugappan and T. Sree Kala, “An enhanced security framework for robotic process automation,” in Cyber Security and Digital Forensics (K. Khanna, V. V. Estrela, and J. J. P. C. Rodrigues, eds.), (Singapore), pp. 231–238, Springer Singapore, 2022.

A. Yazdinejad, B. Zolfaghari, A. Dehghantanha, H. Karimipour, G. Srivastava, and R. M. Parizi, “Accurate threat hunting in industrial internet of things edge devices,” Digital Communications and Networks, 2022.

M. Alfandi and S. U. Se¸ckiner, “Robotic process automation: A literature review on quantitative benefits,”

“RPA Security Best Practices: Balancing Digital Transformation While Managing RPA Security Risks,” 3 2021.

A. Yazdinejad, R. M. Parizi, A. Dehghantanha, H. Karimipour, G. Srivastava, and M. Aledhari, “Enabling drones in the internet of things with decentralized blockchain-based security,” IEEE Internet of Things Journal, vol. 8, no. 8, pp. 6406–6415, 2020.

A. Yazdinejad, R. M. Parizi, A. Dehghantanha, and K.-K. R. Choo, “Blockchain-enabled authentication handover with efficient privacy protection in sdn-based 5g networks,” IEEE Transactions on Network Science and Engineering, vol. 8, no. 2, pp. 1120–1132, 2019.

A. Yazdinejad, R. M. Parizi, A. Dehghantanha, and K.-K. R. Choo, “P4-toblockchain: A secure blockchain-enabled packet parser for software defined networking,” Computers & Security, vol. 88, p. 101629, 2020.

] A. Yazdinejad, M. Kazemi, R. M. Parizi, A. Dehghantanha, and H. Karimipour, “An ensemble deep learning model for cyber threat hunting in industrial internet of things,” Digital Communications and Networks, 2022.