AI-POWERED THREAT DETECTION IN CLOUD ENVIRONMENTS
Main Article Content
Abstract
This study assesses the effectiveness of artificial intelligence (AI) technologies in enhancing threat detection within cloud environments, a critical component given the escalating security challenges in cloud computing. Leveraging various AI methodologies, including machine learning models, deep learning, and anomaly detection techniques, the research aims to improve the accuracy and efficiency of security systems. These AI methods were applied to a series of simulated threat scenarios across diverse cloud platforms to evaluate their capability in real-time threat identification and mitigation. Results demonstrated a significant enhancement in detection rates and a decrease in false positives, indicating that AI can substantially improve the robustness of cloud security systems against sophisticated cyber threats. The study highlights the transformative potential of AI in cloud security, showing not only improvements in threat detection but also in the speed and reliability of responses to security incidents. Furthermore, the findings advocate for the integration of AI technologies into existing cloud security infrastructures to achieve more dynamic and adaptable security solutions. The conclusion points towards the need for ongoing research into advanced AI applications in cloud security, suggesting future directions such as the development of self-learning security systems and the exploration of AI's predictive capabilities in pre-empting security breaches. This research provides a foundation for further exploration and potential real-world application of AI in securing cloud environments against an increasingly complex landscape of cyber threats.
Downloads
Metrics
Article Details
This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
References
Ahmed, M., & Hossain, M. A. (2017). A survey on deep learning advances on different 3D data representations. IEEE Access, 5, 16483-16507.
Barreno, M., Nelson, B., Sears, R., Joseph, A. D., & Tygar, J. D. (2010). Can machine learning be secure? ACM Symposium on Information, Computer and Communications Security, 16-25.
Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cybersecurity intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153-1176.
Costa, G., & Perez, J. (2019). Deep Learning for Anomaly Detection: A Survey. arXiv preprint arXiv:1901.03407.
Demme, J., Martin, M. D., Waksman, A., & Sethumadhavan, S. (2013). Side-channel vulnerability factors in a modern superscalar microprocessor. ACM Transactions on Architecture and Code Optimization, 10(4), 1-25.
Elkan, C. (2000). The foundations of cost-sensitive learning. International joint conference on artificial intelligence, 17(1), 973-978.
Garcia-Teodoro, P., Diaz-Verdejo, J., Macia-Fernandez, G., & Vazquez, E. (2009). Anomaly-based network intrusion detection: Techniques, systems and challenges. Computers & Security, 28(1-2), 18-28.
He, H., & Garcia, E. A. (2009). Learning from imbalanced data. IEEE Transactions on Knowledge and Data Engineering, 21(9), 1263-1284.
Hinton, G. E., Osindero, S., & Teh, Y. W. (2006). A fast learning algorithm for deep belief nets. Neural Computation, 18(7), 1527-1554.
Laskov, P., & Lippmann, R. (2010). Machine learning in adversarial environments. Machine Learning, 81(2), 115-119.
Liu, L., Ouyang, Y., & Wang, X. (2018). A survey of deep neural network architectures and their applications. Neurocomputing, 234, 11-26.
Lowe, G. (2002). Anomaly detection using real-time analytics and big data. Journal of Machine Learning Research, 3, 44-51.
Moustafa, N., & Slay, J. (2015). A hybrid intelligent system for generating simulated network datasets for the development of intrusion detection systems. IEEE Transactions on Emerging Topics in Computational Intelligence, 2(1), 14-25.
Nguyen, T. D., & Armitage, G. (2008). A survey of techniques for internet traffic classification using machine learning. IEEE Communications Surveys & Tutorials, 10(4), 56-76.
Patel, A., Taghavi, M., Bakhtiyari, K., & Júnior, J. C. (2013). An intrusion detection and prevention system in cloud computing: A systematic review. Journal of Network and Computer Applications, 36(1), 25-41.
Raghavan, S., & Dawson, E. (2010). An investigation into the detection and mitigation of denial of service (DoS) attacks: Critical information infrastructure protection. Springer.
Sommer, R., & Paxson, V. (2010). Outside the closed world: On using machine learning for network intrusion detection. IEEE Symposium on Security and Privacy, 305-316.
Tan, K. M. C., Killourhy, K. S., & Maxion, R. A. (2002). Undermining an anomaly-based intrusion detection system using common exploits. RAID Symposium, 54-73.
Vincent, P., Larochelle, H., Lajoie, I., Bengio, Y., & Manzagol, P. A. (2010). Stacked denoising autoencoders: Learning useful representations in a deep network with a local denoising criterion. Journal of Machine Learning Research, 11, 3371-3408.
Wang, W., Battiti, R., & Lee, H. (2007). Evolving networks by merging cliques. IEEE Transactions on Neural Networks, 18(5), 1386-1397.
Xu, M., & Low, B. K. (2005). Machine learning for intrusion detection: Modeling and analysis. IEEE Communications Letters, 6(3), 28-36.
Zeng, D., Guo, S., & Cheng, Z. (2018). A survey on deep learning for big data. Information Fusion, 42, 146-157.
Zhou, Y., & Jiang, X. (2004). An enhanced approach to anomaly detection using system call sequence. ACM Transactions on Information and System Security, 6(4), 282-314.
Zuech, R., Khoshgoftaar, T. M., & Wald, R. (2015). Intrusion detection and big heterogeneous data: A survey. Journal of Big Data, 2(1), 1-41.
Zykov, S. V., Demidova, L., & Nikolskiy, D. (2019). Big data analytics for network anomaly detection from an information security perspective. International Journal of Big Data Intelligence, 6(3/4), 213-224.