AI-POWERED THREAT DETECTION IN CLOUD ENVIRONMENTS

Main Article Content

Sandeep Reddy Gudimetla
Niranjan Reddy Kotha

Abstract

This study assesses the effectiveness of artificial intelligence (AI) technologies in enhancing threat detection within cloud environments, a critical component given the escalating security challenges in cloud computing. Leveraging various AI methodologies, including machine learning models, deep learning, and anomaly detection techniques, the research aims to improve the accuracy and efficiency of security systems. These AI methods were applied to a series of simulated threat scenarios across diverse cloud platforms to evaluate their capability in real-time threat identification and mitigation. Results demonstrated a significant enhancement in detection rates and a decrease in false positives, indicating that AI can substantially improve the robustness of cloud security systems against sophisticated cyber threats. The study highlights the transformative potential of AI in cloud security, showing not only improvements in threat detection but also in the speed and reliability of responses to security incidents. Furthermore, the findings advocate for the integration of AI technologies into existing cloud security infrastructures to achieve more dynamic and adaptable security solutions. The conclusion points towards the need for ongoing research into advanced AI applications in cloud security, suggesting future directions such as the development of self-learning security systems and the exploration of AI's predictive capabilities in pre-empting security breaches. This research provides a foundation for further exploration and potential real-world application of AI in securing cloud environments against an increasingly complex landscape of cyber threats.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

Article Details

How to Cite
Gudimetla, S. R. ., & Kotha, N. R. . (2018). AI-POWERED THREAT DETECTION IN CLOUD ENVIRONMENTS. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 9(1), 638–642. https://doi.org/10.61841/turcomat.v9i1.14730
Section
Research Articles

References

Ahmed, M., & Hossain, M. A. (2017). A survey on deep learning advances on different 3D data representations. IEEE Access, 5, 16483-16507.

Barreno, M., Nelson, B., Sears, R., Joseph, A. D., & Tygar, J. D. (2010). Can machine learning be secure? ACM Symposium on Information, Computer and Communications Security, 16-25.

Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cybersecurity intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153-1176.

Costa, G., & Perez, J. (2019). Deep Learning for Anomaly Detection: A Survey. arXiv preprint arXiv:1901.03407.

Demme, J., Martin, M. D., Waksman, A., & Sethumadhavan, S. (2013). Side-channel vulnerability factors in a modern superscalar microprocessor. ACM Transactions on Architecture and Code Optimization, 10(4), 1-25.

Elkan, C. (2000). The foundations of cost-sensitive learning. International joint conference on artificial intelligence, 17(1), 973-978.

Garcia-Teodoro, P., Diaz-Verdejo, J., Macia-Fernandez, G., & Vazquez, E. (2009). Anomaly-based network intrusion detection: Techniques, systems and challenges. Computers & Security, 28(1-2), 18-28.

He, H., & Garcia, E. A. (2009). Learning from imbalanced data. IEEE Transactions on Knowledge and Data Engineering, 21(9), 1263-1284.

Hinton, G. E., Osindero, S., & Teh, Y. W. (2006). A fast learning algorithm for deep belief nets. Neural Computation, 18(7), 1527-1554.

Laskov, P., & Lippmann, R. (2010). Machine learning in adversarial environments. Machine Learning, 81(2), 115-119.

Liu, L., Ouyang, Y., & Wang, X. (2018). A survey of deep neural network architectures and their applications. Neurocomputing, 234, 11-26.

Lowe, G. (2002). Anomaly detection using real-time analytics and big data. Journal of Machine Learning Research, 3, 44-51.

Moustafa, N., & Slay, J. (2015). A hybrid intelligent system for generating simulated network datasets for the development of intrusion detection systems. IEEE Transactions on Emerging Topics in Computational Intelligence, 2(1), 14-25.

Nguyen, T. D., & Armitage, G. (2008). A survey of techniques for internet traffic classification using machine learning. IEEE Communications Surveys & Tutorials, 10(4), 56-76.

Patel, A., Taghavi, M., Bakhtiyari, K., & Júnior, J. C. (2013). An intrusion detection and prevention system in cloud computing: A systematic review. Journal of Network and Computer Applications, 36(1), 25-41.

Raghavan, S., & Dawson, E. (2010). An investigation into the detection and mitigation of denial of service (DoS) attacks: Critical information infrastructure protection. Springer.

Sommer, R., & Paxson, V. (2010). Outside the closed world: On using machine learning for network intrusion detection. IEEE Symposium on Security and Privacy, 305-316.

Tan, K. M. C., Killourhy, K. S., & Maxion, R. A. (2002). Undermining an anomaly-based intrusion detection system using common exploits. RAID Symposium, 54-73.

Vincent, P., Larochelle, H., Lajoie, I., Bengio, Y., & Manzagol, P. A. (2010). Stacked denoising autoencoders: Learning useful representations in a deep network with a local denoising criterion. Journal of Machine Learning Research, 11, 3371-3408.

Wang, W., Battiti, R., & Lee, H. (2007). Evolving networks by merging cliques. IEEE Transactions on Neural Networks, 18(5), 1386-1397.

Xu, M., & Low, B. K. (2005). Machine learning for intrusion detection: Modeling and analysis. IEEE Communications Letters, 6(3), 28-36.

Zeng, D., Guo, S., & Cheng, Z. (2018). A survey on deep learning for big data. Information Fusion, 42, 146-157.

Zhou, Y., & Jiang, X. (2004). An enhanced approach to anomaly detection using system call sequence. ACM Transactions on Information and System Security, 6(4), 282-314.

Zuech, R., Khoshgoftaar, T. M., & Wald, R. (2015). Intrusion detection and big heterogeneous data: A survey. Journal of Big Data, 2(1), 1-41.

Zykov, S. V., Demidova, L., & Nikolskiy, D. (2019). Big data analytics for network anomaly detection from an information security perspective. International Journal of Big Data Intelligence, 6(3/4), 213-224.