AI-POWERED CYBERSECURITY THREAT DETECTION IN CLOUD ENVIRONMENTS
DOI:
https://doi.org/10.34218/IJCET_16_01_266Keywords:
AI, Cloud Computing, Cybersecurity, Threat Detection, Anomaly Detection, Deep Learning, Intrusion Detection, Risk Management, DevSecOps, Blockchain, Federated LearningAbstract
The rapid evolution of cloud computing has revolutionized the digital landscape, offering scalable, on-demand resources for organizations worldwide. However, the extensive adoption of cloud environments has simultaneously introduced a plethora of cybersecurity threats ranging from data breaches and Advanced Persistent Threats (APTs) to sophisticated malware attacks. Traditional security defenses often reliant on static rule-based systems frequently prove inadequate for identifying and mitigating the complex, ever-evolving nature of modern cyber threats. Artificial Intelligence (AI) has emerged as a vital component of next-generation cybersecurity, enabling real-time threat detection, behavior-based anomaly recognition, and predictive analytics. In this paper, we explore cutting-edge AI-driven cybersecurity solutions specifically tailored for cloud infrastructures. We present a comprehensive framework for AI-based threat detection, analyze real-world use cases, discuss challenges in implementation, and propose future directions such as federated learning and blockchain integration. By demonstrating the effectiveness of AI in proactive threat hunting, automated incident response, and adaptive security measures, this research highlights AI’s transformative role in safeguarding cloud environments.
References
M. Ozaki, Y. Adachi, Y. Iwahori, and N. Ishii, "Application of fuzzy theory to writer recognition of Chinese characters," International Journal of Modelling and Simulation, 18(2), 1998, pp.112-116.
R.E. Moore, Interval Analysis, Englewood Cliffs, NJ: Prentice-Hall, 1966.
P.O. Bishop, "Neurophysiology of binocular vision," in J. Houseman (Ed.), Handbook of Physiology, 4, New York: Springer-Verlag, 1970, pp. 342-366.
D.S. Chan, "Theory and implementation of multidimensional discrete systems for signal processing," doctoral diss., Massachusetts Institute of Technology, Cambridge, MA, 1978.
W.J. Book, "Modeling design and control of flexible manipulator arms: A tutorial review,"Proc. 29th IEEE Conf. on Decision and Control, San Francisco, CA, 1990, pp. 500-506.
H. Ahmed, I. Traore, and A. Ghorbani, "Detecting Stealthy Malware Using Deep Autoencoders," IEEE Security & Privacy, 17(3), 2019, pp. 76-87.
P. Goel and V. Bhatnagar, "Fighting Distributed Denial of Service Attacks in Cloud Environment," Journal of Cloud Computing, 9(1), 2020, pp. 1-17.
C. Johnson, R. Mercado, and J. Merrick, "Federated Learning for Cybersecurity: A Survey of Methods and Opportunities," Cybersecurity Journal, 2(4), 2021, pp. 22-35.
M. Kourtellis et al., "Blockchain-based Solutions for Cloud Security: A Systematic Review," ACM Computing Surveys, 53(5), 2021, pp. 101-134.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Rajarshi Tarafdar (Author)

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.