Chaitanya Vootkuri, 2024. "Neural Networks in Cloud Security: Advancing Threat Detection and Automated Response" ESP International Journal of Advancements in Computational Technology (ESP-IJACT) Volume 2, Issue 2: 142-151.
Cloud computing has dislocated many aspects of technological construction by providing flexible and inexpensive access to solutions. Nevertheless, increased and accelerated cloud adoption with the help of technological developments has become a higher risk of complex cyber threats. This article aims to analyze the use of neural networks in improving cloud computing security, with special reference to threat identification and the capacity for self-organization and response. Neural networks, through the concept of machine learning, can detect deviant behaviors, forecast likely risks, and even counteract in real time. Neural networks employed in cloud environments are described, advances in the topic are discussed, and a state-of-the-art analysis of security enhancement is provided. This research shows that neural networks also improve detection accuracy and substantially reduce the response time of security solutions, which is critical for contemporary cloud protection paradigms.
[1] Naved, M., Fakih, A. H., Venkatesh, A. N., Vijayakumar, P., & Kshirsagar, P. R. (2022, May). Supervise the data security and performance in the cloud using artificial intelligence. In AIP Conference Proceedings (Vol. 2393, No. 1). AIP Publishing.
[2] Yu, H., Powell, N., Stembridge, D., & Yuan, X. (2012, March). Cloud computing and security challenges. In Proceedings of the 50th Annual Southeast Regional Conference (pp. 298-302).
[3] Mather, T. (2009). Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance.
[4] Grobauer, B., Walloschek, T., & Stocker, E. (2010). Understanding cloud computing vulnerabilities. IEEE Security & privacy, 9(2), 50-57.
[5] Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation computer systems, 28(3), 583-592.
[6] Ristenpart, T., Tromer, E., Shacham, H., & Savage, S. (2009, November). Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACM conference on Computer and communications security (pp. 199-212).
[7] Sommer, R., & Paxson, V. (2010, May). Outside the closed world: On using machine learning for network intrusion detection. In 2010 IEEE symposium on security and privacy (pp. 305-316). IEEE.
[8] Ahmad, I., Namal, S., Ylianttila, M., & Gurtov, A. (2015). Security in software defined networks: A survey. IEEE Communications Surveys & Tutorials, 17(4), 2317-2346.
[9] Sarker, I. H. (2021). Machine learning: Algorithms, real-world applications and research directions. SN computer science, 2(3), 160.
[10] Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM computing surveys (CSUR), 41(3), 1-58.
[11] Hochreiter, S. (1997). Long Short-term Memory. Neural Computation MIT-Press.
[12] Krizhevsky, A., Sutskever, I., & Hinton, G. E. (2012). Imagenet classification with deep convolutional neural networks. Advances in neural information processing systems, 25.
[13] Hinton, G. E. (2006). A Fast Learning Algorithm for Deep Belief Nets. Neural Computation.
[14] Fraley, J. B., & Cannady, J. (2017, March). The promise of machine learning in cybersecurity. In SoutheastCon 2017 (pp. 1-6). IEEE.
[15] Podder, P., Bharati, S., Mondal, M., Paul, P. K., & Kose, U. (2021). Artificial neural network for cybersecurity: A comprehensive review. arXiv preprint arXiv:2107.01185.
[16] Pawlicki, M., Kozik, R., & Choraś, M. (2022). A survey on neural networks for (cyber-) security and (cyber-) security of neural networks. Neurocomputing, 500, 1075-1087.
[17] Yeboah-Ofori, A., Islam, S., Lee, S. W., Shamszaman, Z. U., Muhammad, K., Altaf, M., & Al-Rakhami, M. S. (2021). Cyber threat predictive analytics for improving cyber supply chain security. IEEE Access, 9, 94318-94337.
[18] Truvé, S. (2016, April). Temporal analytics for predictive cyber threat intelligence. In Proceedings of the 25th International Conference Companion on the World Wide Web (pp. 867-868).
[19] Galla, E. P., Rajaram, S. K., Patra, G. K., Madhavram, C., & Rao, J. (2022). AI-Driven Threat Detection: Leveraging Big Data for Advanced Cybersecurity Compliance. Available at SSRN 4980649.
[20] Yaseen, A. (2023). AI-driven threat detection and response: A paradigm shift in cybersecurity. International Journal of Information and Cybersecurity, 7(12), 25-43.
Cloud Security, Neural Networks, Threat Detection, Automated Response, Machine Learning, Anomaly Detection, Cybersecurity.