AI-POWERED CYBERSECURITY THREAT DETECTION IN CLOUD ENVIRONMENTS

Authors

  • Rajarshi Tarafdar JP Morgan Chase, USA. Author

DOI:

https://doi.org/10.34218/IJCET_16_01_266

Keywords:

AI, Cloud Computing, Cybersecurity, Threat Detection, Anomaly Detection, Deep Learning, Intrusion Detection, Risk Management, DevSecOps, Blockchain, Federated Learning

Abstract

The rapid evolution of cloud computing has revolutionized the digital landscape, offering scalable, on-demand resources for organizations worldwide. However, the extensive adoption of cloud environments has simultaneously introduced a plethora of cybersecurity threats ranging from data breaches and Advanced Persistent Threats (APTs) to sophisticated malware attacks. Traditional security defenses often reliant on static rule-based systems frequently prove inadequate for identifying and mitigating the complex, ever-evolving nature of modern cyber threats. Artificial Intelligence (AI) has emerged as a vital component of next-generation cybersecurity, enabling real-time threat detection, behavior-based anomaly recognition, and predictive analytics. In this paper, we explore cutting-edge AI-driven cybersecurity solutions specifically tailored for cloud infrastructures. We present a comprehensive framework for AI-based threat detection, analyze real-world use cases, discuss challenges in implementation, and propose future directions such as federated learning and blockchain integration. By demonstrating the effectiveness of AI in proactive threat hunting, automated incident response, and adaptive security measures, this research highlights AI’s transformative role in safeguarding cloud environments.

References

M. Ozaki, Y. Adachi, Y. Iwahori, and N. Ishii, "Application of fuzzy theory to writer recognition of Chinese characters," International Journal of Modelling and Simulation, 18(2), 1998, pp.112-116.

R.E. Moore, Interval Analysis, Englewood Cliffs, NJ: Prentice-Hall, 1966.

P.O. Bishop, "Neurophysiology of binocular vision," in J. Houseman (Ed.), Handbook of Physiology, 4, New York: Springer-Verlag, 1970, pp. 342-366.

D.S. Chan, "Theory and implementation of multidimensional discrete systems for signal processing," doctoral diss., Massachusetts Institute of Technology, Cambridge, MA, 1978.

W.J. Book, "Modeling design and control of flexible manipulator arms: A tutorial review,"Proc. 29th IEEE Conf. on Decision and Control, San Francisco, CA, 1990, pp. 500-506.

H. Ahmed, I. Traore, and A. Ghorbani, "Detecting Stealthy Malware Using Deep Autoencoders," IEEE Security & Privacy, 17(3), 2019, pp. 76-87.

P. Goel and V. Bhatnagar, "Fighting Distributed Denial of Service Attacks in Cloud Environment," Journal of Cloud Computing, 9(1), 2020, pp. 1-17.

C. Johnson, R. Mercado, and J. Merrick, "Federated Learning for Cybersecurity: A Survey of Methods and Opportunities," Cybersecurity Journal, 2(4), 2021, pp. 22-35.

M. Kourtellis et al., "Blockchain-based Solutions for Cloud Security: A Systematic Review," ACM Computing Surveys, 53(5), 2021, pp. 101-134.

Downloads

Published

2025-02-21

How to Cite

Rajarshi Tarafdar. (2025). AI-POWERED CYBERSECURITY THREAT DETECTION IN CLOUD ENVIRONMENTS. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING AND TECHNOLOGY, 16(01), 3858-3869. https://doi.org/10.34218/IJCET_16_01_266