AI-DRIVEN THREAT DETECTION IN DISTRIBUTED CLOUD SYSTEMS

Authors

  • Ravindrakumar Assistant Professor, Department of Computer Science, Government First Grade College Chitaguppa.

DOI:

https://doi.org/10.29121/shodhkosh.v4.i2.2023.3359

Keywords:

AI-Driven Security, Threat Detection, Distributed Cloud Systems, Machine Learning, Deep Learning, Advanced Persistent Threats, Federated Learning

Abstract [English]

Distributed cloud systems are getting more complicated, which means we need more advanced ways to find threats. AI-driven methods use machine learning and deep learning to find, predict, and stop cyber risks with a level of accuracy and speed that has never been seen before. This paper looks into how artificial intelligence can help protect distributed cloud infrastructures. It focusses on how AI can be used for threat intelligence, anomaly detection, and automated reaction. Different methods, like neural networks, natural language processing, and collaborative learning, are tested to see how well they can find complex attacks like Advanced Persistent Threats (APTs) and Distributed Denial of Service (DDoS) attacks. The study also talks about the problems that come up when you try to use AI to find threats, like uneven data, the need for a lot of computing power, and models that are hard to understand. Real-life examples show how AI is used in a wide range of fields, highlighting its transformative promise in cloud security. Future trends are looked at, such as quantum AI and security operations centres (SOC) that use AI. This research shows how AI technologies are changing the way threat monitoring works in distributed cloud systems, making them more resistant to new cyber threats.

References

Hinton, G. E., Osindero, S., & Teh, Y. W. (2023). A fast learning algorithm for deep belief nets. Neural Computation, 18(7), 1527-1554. DOI: https://doi.org/10.1162/neco.2006.18.7.1527

Laskov, P., & Lippmann, R. (2020). Machine learning in adversarial environments. Machine Learning, 81(2), 115- 119. DOI: https://doi.org/10.1007/s10994-010-5207-6

Liu, L., Ouyang, Y., & Wang, X. (2018). A survey of deep neural network architectures and their applications. Neurocomputing, 234, 11-26. DOI: https://doi.org/10.1016/j.neucom.2016.12.038

Lowe, G. (2002). Anomaly detection using real-time analytics and big data. Journal of Machine Learning Research, 3, 44-51.

Moustafa, N., & Slay, J. (2019). A hybrid intelligent system for generating simulated network datasets for the development of intrusion detection systems. IEEE Transactions on Emerging Topics in Computational Intelligence, 2(1), 14-25.

Nguyen, T. D., & Armitage, G. (2018). A survey of techniques for internet traffic classification using machine learning. IEEE Communications Surveys & Tutorials, 10(4), 56-76. DOI: https://doi.org/10.1109/SURV.2008.080406

Patel, A., Taghavi, M., Bakhtiyari, K., & Júnior, J. C. (2023). An intrusion detection and prevention system in cloud computing: A systematic review. Journal of Network and Computer Applications, 36(1), 25-41. DOI: https://doi.org/10.1016/j.jnca.2012.08.007

Wang, J., Wang, H., Zhou, Y., & Guo, M. (2017). AI based attack detection in cloud infrastructures. IEEE Cloud Computing, 4(6), 36-45. DOI: https://doi.org/10.1109/MCC.2016.130

Gupta, S., & Kumar, P. (2020). Cloud analytics: AIdriven framework for cloud threat intelligence. IEEE Transactions on Services Computing, 13(2), 242-255.

Jain, V., & Shah, S. (2019). AI and machine learning for cloud security. IEEE Cloud Computing, 6(1), 10- 20.

Ahmad, F., Adnane, A., & Baig, Z. (2018). Artificial intelligence in cybersecurity: An overview. IEEE Access, 6, 40420-40430.

Zhang, Y., Deng, R. H., & Xu, G. (2019). Deep learning for anomaly detection in cloud servers. IEEE Access, 7, 46756-46767.

Liu, X., Zhang, S., Wang, H., & Probst, C. W. (2018). A survey on the application of artificial intelligence in distributed cloud environments. IEEE Communications Surveys & Tutorials, 20(1), 395-427.

Singh, A., & Chatterjee, K. (2020). Machine learningbased threat detection in cloud environments. IEEE Transactions on Dependable and Secure Computing, 17(2), 341-354.

Tan, M., & Shu, Y. (2020). Deep learning models for cybersecurity in cloud computing environments. IEEE Network, 34(2), 126-133.

Khan, S., & Hamou-Lhadj, A. (2020). Techniques and applications of machine learning for network security: A comprehensive survey. IEEE Communications Surveys & Tutorials, 22(1), 498-523

Downloads

Published

2023-12-31

How to Cite

Ravindrakumar. (2023). AI-DRIVEN THREAT DETECTION IN DISTRIBUTED CLOUD SYSTEMS. ShodhKosh: Journal of Visual and Performing Arts, 4(2), 2138–2144. https://doi.org/10.29121/shodhkosh.v4.i2.2023.3359