AI-DRIVEN THREAT DETECTION IN DISTRIBUTED CLOUD SYSTEMS
DOI:
https://doi.org/10.29121/shodhkosh.v4.i2.2023.3359Keywords:
AI-Driven Security, Threat Detection, Distributed Cloud Systems, Machine Learning, Deep Learning, Advanced Persistent Threats, Federated LearningAbstract [English]
Distributed cloud systems are getting more complicated, which means we need more advanced ways to find threats. AI-driven methods use machine learning and deep learning to find, predict, and stop cyber risks with a level of accuracy and speed that has never been seen before. This paper looks into how artificial intelligence can help protect distributed cloud infrastructures. It focusses on how AI can be used for threat intelligence, anomaly detection, and automated reaction. Different methods, like neural networks, natural language processing, and collaborative learning, are tested to see how well they can find complex attacks like Advanced Persistent Threats (APTs) and Distributed Denial of Service (DDoS) attacks. The study also talks about the problems that come up when you try to use AI to find threats, like uneven data, the need for a lot of computing power, and models that are hard to understand. Real-life examples show how AI is used in a wide range of fields, highlighting its transformative promise in cloud security. Future trends are looked at, such as quantum AI and security operations centres (SOC) that use AI. This research shows how AI technologies are changing the way threat monitoring works in distributed cloud systems, making them more resistant to new cyber threats.
References
Hinton, G. E., Osindero, S., & Teh, Y. W. (2023). A fast learning algorithm for deep belief nets. Neural Computation, 18(7), 1527-1554. DOI: https://doi.org/10.1162/neco.2006.18.7.1527
Laskov, P., & Lippmann, R. (2020). Machine learning in adversarial environments. Machine Learning, 81(2), 115- 119. DOI: https://doi.org/10.1007/s10994-010-5207-6
Liu, L., Ouyang, Y., & Wang, X. (2018). A survey of deep neural network architectures and their applications. Neurocomputing, 234, 11-26. DOI: https://doi.org/10.1016/j.neucom.2016.12.038
Lowe, G. (2002). Anomaly detection using real-time analytics and big data. Journal of Machine Learning Research, 3, 44-51.
Moustafa, N., & Slay, J. (2019). A hybrid intelligent system for generating simulated network datasets for the development of intrusion detection systems. IEEE Transactions on Emerging Topics in Computational Intelligence, 2(1), 14-25.
Nguyen, T. D., & Armitage, G. (2018). A survey of techniques for internet traffic classification using machine learning. IEEE Communications Surveys & Tutorials, 10(4), 56-76. DOI: https://doi.org/10.1109/SURV.2008.080406
Patel, A., Taghavi, M., Bakhtiyari, K., & Júnior, J. C. (2023). An intrusion detection and prevention system in cloud computing: A systematic review. Journal of Network and Computer Applications, 36(1), 25-41. DOI: https://doi.org/10.1016/j.jnca.2012.08.007
Wang, J., Wang, H., Zhou, Y., & Guo, M. (2017). AI based attack detection in cloud infrastructures. IEEE Cloud Computing, 4(6), 36-45. DOI: https://doi.org/10.1109/MCC.2016.130
Gupta, S., & Kumar, P. (2020). Cloud analytics: AIdriven framework for cloud threat intelligence. IEEE Transactions on Services Computing, 13(2), 242-255.
Jain, V., & Shah, S. (2019). AI and machine learning for cloud security. IEEE Cloud Computing, 6(1), 10- 20.
Ahmad, F., Adnane, A., & Baig, Z. (2018). Artificial intelligence in cybersecurity: An overview. IEEE Access, 6, 40420-40430.
Zhang, Y., Deng, R. H., & Xu, G. (2019). Deep learning for anomaly detection in cloud servers. IEEE Access, 7, 46756-46767.
Liu, X., Zhang, S., Wang, H., & Probst, C. W. (2018). A survey on the application of artificial intelligence in distributed cloud environments. IEEE Communications Surveys & Tutorials, 20(1), 395-427.
Singh, A., & Chatterjee, K. (2020). Machine learningbased threat detection in cloud environments. IEEE Transactions on Dependable and Secure Computing, 17(2), 341-354.
Tan, M., & Shu, Y. (2020). Deep learning models for cybersecurity in cloud computing environments. IEEE Network, 34(2), 126-133.
Khan, S., & Hamou-Lhadj, A. (2020). Techniques and applications of machine learning for network security: A comprehensive survey. IEEE Communications Surveys & Tutorials, 22(1), 498-523
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Ravindrakumar

This work is licensed under a Creative Commons Attribution 4.0 International License.
With the licence CC-BY, authors retain the copyright, allowing anyone to download, reuse, re-print, modify, distribute, and/or copy their contribution. The work must be properly attributed to its author.
It is not necessary to ask for further permission from the author or journal board.
This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.























