AI-Driven Cloud Security: Proactive Defense Against Evolving Cyber Threats
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32870
AI-Driven Cloud Security: Proactive Defense Against Evolving Cyber Threats

Authors: Ashly Joseph

Abstract:

Cloud computing has become an essential component of enterprises and organizations globally in the current era of digital technology. The cloud has a multitude of advantages, including scalability, flexibility, and cost-effectiveness, rendering it an appealing choice for data storage and processing. The increasing storage of sensitive information in cloud environments has raised significant concerns over the security of such systems. The frequency of cyber threats and attacks specifically aimed at cloud infrastructure has been increasing, presenting substantial dangers to the data, reputation, and financial stability of enterprises. Conventional security methods can become inadequate when confronted with ever intricate and dynamic threats. Artificial Intelligence (AI) technologies possess the capacity to significantly transform cloud security through their ability to promptly identify and thwart assaults, adjust to emerging risks, and offer intelligent perspectives for proactive security actions. The objective of this research study is to investigate the utilization of AI technologies in augmenting the security measures within cloud computing systems. This paper aims to offer significant insights and recommendations for businesses seeking to protect their cloud-based assets by analyzing the present state of cloud security, the capabilities of AI, and the possible advantages and obstacles associated with using AI into cloud security policies.

Keywords: Machine Learning, Natural Learning Processing, Denial-of-Service attacks, Sentiment Analysis, Cloud computing.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 61

References:


[1] Yaseen, Q., & Panda, B. (2012). Tackling insider threat in cloud relational databases. In 2012 IEEE Fifth International Conference on Utility and Cloud Computing (pp. 215-218). IEEE
[2] A. Gordon, The S cloud security professional. IEEE Cloud Comput. 3(1), 82–86 (2016). https://doi.org/10.1109/MCC.2016.21
[3] Joseph, A. (2023). 'Demystifying Full-Stack Observability: Mastering Visibility, Insight, and Action in the Modern Digital Landscape'. World Academy of Science, Engineering and Technology, Open Science Index 200, International Journal of Computer and Information Engineering, 17(8), 485 - 492.
[4] De Oliveira, P. A. (2017). Predictive analysis of cloud systems. In 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C) (pp. 483-484). IEEE.
[5] Sowmya, S. K., Deepika, P., & Naren, J. (2014). Layers of cloud–IaaS, PaaS and SaaS: a survey. International Journal of Computer Science and Information Technologies, 5(3), 4477-4480.
[6] Paulose, Jithu (2020). Innovative application of Additive Manufacturing in Biomedical Healthcare Technologies. International Journal of Advanced Research Trends in Engineering and Technology (IJARTET) Vol. 7, Issue 5.
[7] Joseph, A. (2023). 'A Holistic Framework for Unifying Data Security and Management in Modern Enterprises'. World Academy of Science, Engineering and Technology, Open Science Index 202, International Journal of Social and Business Sciences, 17(10), 596 - 603.
[8] Yasavur, U., Travieso, J., Lisetti, C., & Rishe, N. D. (2014, May). Sentiment analysis using dependency trees and named-entities. In The Twenty-Seventh International Flairs Conference.
[9] A. Qayyum et al (2020), Securing machine learning in the cloud: a systematic review of cloud machine learning security. Front. Big Data 3 https://doi.org/10.3389/fdata.2020.587139
[10] M. C. Horowitz, G. C. Allen, E. Saravalle, A. Cho, K. Frederick, and P. Scharre (2018), Artificial intelligence and international security. Center for a New American Security.
[11] S. Guha, S.S. Yau, A.B. Buduru, Attack detection in cloud infrastructures using artificial neural network with genetic feature selection, in 2016 IEEE 14th International Conference on Dependable, Autonomic and Secure Computing (2016), pp. 414–419. https://doi.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2016.32
[12] Abraham, Sherly. Exploring the effectiveness of information security training and persuasive messages. Diss. University at Albany. Department of Information Science, 2012.