This is an unedited manuscript accepted for publication and provided as an Article in Press for early access at the author’s request. The article will undergo copyediting, typesetting, and galley proof review before final publication. Please be aware that errors may be identified during production that could affect the content. All legal disclaimers of the journal apply.
Nilesh Jain,
- Associate Professor, Department of Computer Sciences and Applications Mandsaur University Mandsaur, Daulatpura, Madhya Pradesh, India
Abstract
Software as a Service (SaaS) solution has revolutionized the contemporary business processes as scalable and service-on-demand solution on cloud networks. Yet, this expansion has brought in sophisticated cybersecurity risks because of a multi-tenant environment facing the internet in the SaaS environment. The key to assure the service availability and protection of the data stored off-site is effective threat detection in such dynamic ecosystems. This review article seeks to discuss the traditional and the advanced methods of threat detection within SaaS platforms with a focus on what goes wrong with the traditional methods of threat detection, including signature-based, anomaly-based based and others. It notes the trend to the AI-driven, machine learning-enabled, and context-sensitive detection leveraged to improve security monitoring in real-time and incident response. The research also refers to the concept of adaptive cloud security models that plan to apply dynamic configurations of cloud security settings in response to changing cyber threats. Components incorporated in these models include risk assessment engines, policy control module, and cryptographic services to ensure protection of the cloud holistically and robustly. Severe conversions of the literature give a clear appraisal of the current progress in intelligent invasion perceiving apparatus, dynamic access protocol, and security regulation driven by AI. The paper ends by addressing emerging challenges of scalability, model drift, and interoperability and gives future research directions to create autonomous, explainable, and adaptive security frameworks of next-generation SaaS infrastructures.
Keywords: SaaS Security, Threat Detection, Adaptive Cloud Security, cybersecurity, Machine Learning (ML) in Cloud Security, proactive defense, proactive defense
Nilesh Jain. Reviewing Threat Detection Methods in SaaS Platforms Through the Use of Adaptive Cloud Security Models. Journal of Artificial Intelligence Research & Advances. 2025; 12(03):-.
Nilesh Jain. Reviewing Threat Detection Methods in SaaS Platforms Through the Use of Adaptive Cloud Security Models. Journal of Artificial Intelligence Research & Advances. 2025; 12(03):-. Available from: https://journals.stmjournals.com/joaira/article=2025/view=228377
References
- Duary S, Choudhury P, Mishra S, Sharma V, Rao DD, Aderemi AP. Cybersecurity threats detection in intelligent networks using predictive analytics approaches. In2024 4th International Conference on Innovative Practices in Technology and Management (ICIPTM) 2024 Feb 21 (pp. 1-5). IEEE.
- Kumar, Ritesh. (2022). Cloud Cybersecurity: Navigating Evolving Threats and Architecting Resilient Defenses. Journal of Software Engineering and Simulation. 8. 21-29. 10.35629/3795-08082129.
- Prajapati NK. Federated Learning for Privacy-Preserving Cybersecurity: A Review on Secure Threat Detection. Int. J. Adv. Res. Sci. Commun. Technol. 2025 Apr:520-8.
- Shah SB. Machine Learning for Cyber Threat Detection and Prevention in Critical Infrastructure. Journal of Global Research in Electronics and Communication. 2025 Feb;2(2).
- Islam MR. Secure multi-cloud architectures: best practices for data protection. Journal of Artificial Intelligence General science (JAIGS) ISSN: 3006-4023. 2024 Dec 15;6(1):564-76.
- Khare P. Abhishek,“Cloud Security Challenges: Implementing Best Practices for Secure SaaS Application Development,”. Int. J. Curr. Eng. Technol. 2021;11(06).
- Abdel-Wahid, Thamer & Scholar II, Research. (2024). AI-POWERED CLOUD SECURITY: A STUDY ON THE INTEGRATION OF ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING FOR IMPROVED THREAT DETECTION AND PREVENTION. 13. 11-19.
- Singh A, Kolluri S, Modi TB. Security and Privacy Challenges in Cloud-Based Database Management: Strategies and Solutions. TECHNO REVIEW Journal of Technology and Management. 2021 Oct 5;1(1):32-40.
- Arora S, Thota SR. Automated Data Quality Assessment And Enhancement For Saas Based Data Applications. J. Emerg. Technol. Innov. Res. 2024;11(6):i207-18.
- Brohi SN, Bamiah MA. Challenges and benefits for adopting the paradigm of cloud computing. International Journal of Advanced Engineering Sciences and Technologies. 2011;8(2):286-90.
- Ang’udi JJ. Security challenges in cloud computing: A comprehensive analysis. World Journal of Advanced Engineering Technology and Sciences. 2023;10(2):155-81.
- Chippagiri S. A Study of Cloud Security Frameworks for Safeguarding Multi-Tenant Cloud Architectures. International Journal of Computer Applications. 2025;975:8887.
- Chippagiri S. A Study of Cloud Security Frameworks for Safeguarding Multi-Tenant Cloud Architectures. International Journal of Computer Applications. 2025;975:8887.
- Metibemu OC, Adesokan-Imran TO, Ajayi AJ, Tiwo OJ, Olutimehin AT, Olaniyi OO. Developing proactive threat mitigation strategies for cloud misconfiguration risks in financial SaaS applications. Journal of Engineering Research and Reports. 2025 Mar 15;27(3):393-413.
- Safari A. A New Quantitative‐Based Performance Management Framework for Service Operations. Knowledge and Process Management. 2016 Oct;23(4):307-19.
- Rao DD, Madasu S, Gunturu SR, D’britto C, Lopes J. Cybersecurity threat detection using machine learning in cloud-based environments: A comprehensive study. International Journal on Recent and Innovation Trends in Computing and Communication. 2024 Jan;12(1):285-90.
- Murri S, Chinta S, Jain S, Adimulam T. Advancing Cloud Data Architectures: A Deep Dive into Scalability, Security, and Intelligent Data Management for Next-Generation Applications. Well Testing Journal. 2024 Dec 29;33(S2):619-44.
- Shah SB, Boddu B, Prajapati N, Pahune SA. AI-Powered Advanced Intrusion Detection for Securing Cloud Environments Against Network Attacks. In2025 Global Conference in Emerging Technology (GINOTECH) 2025 May 9 (pp. 1-7). IEEE.
- Gudimetla SR, Kotha NR. Cloud security: Bridging the gap between cloud engineering and cybersecurity. Webology (ISSN: 1735-188X). 2018;15(2).
- Rawashdeh A, Alkasassbeh M, Al-Hawawreh M. An anomaly-based approach for DDoS attack detection in cloud environment. International Journal of Computer Applications in Technology. 2018;57(4):312-24.
- Thangaraju V. Enhancing Web Application Performance and Security Using AI-Driven Anomaly Detection and Optimization Techniques. Int. Res. J. Innov. Eng. Technol. 2025 Mar;9(3):8..
- Pan Z, Hariri S, Pacheco J. Context aware intrusion detection for building automation systems. Computers & Security. 2019 Aug 1;85:181-201.
- Basim I, Fakhfakh A, Makhlouf AM. A Hybrid Deep Learning Approach for Adaptive Cloud Threat Detection with Integrated CNNs and RNNs in Cloud Access Security Brokers. Journal of Robotics and Control (JRC). 2025 May 8;6(3):1128-40.
- Sola RP, Malali N, Madugula P. Cloud Database Security: Integrating Deep Learning and Machine Learning for Threat Detection and Prevention: 0. Notion Press; 2025 Feb 22.
- Prajapati N. The Role of Machine Learning in Big Data Analytics: Tools, Techniques, and Applications. ESP J. Eng. Technol. Adv. 2025;5(2):16-22.
- Majumder RQ. Machine Learning for Predictive Analytics: Trends and Future Directions. Available at SSRN 5267273. 2025 Feb 13.
- Anandharaj N. AI-powered cloud security: A study on the integration of artificial intelligence and machine learning for improved threat detection and prevention. J. Recent Trends Comput. Sci. Eng.(JRTCSE). 2024 Jul 25;12:21-30.
- Jeffrey N, Tan Q, Villar JR. A review of anomaly detection strategies to detect threats to cyber-physical systems. Electronics. 2023 Jul 30;12(15):3283.
- Narne H. Adaptive Security Model for Cloud Platforms Based on Information Security and Cryptographic Protocol. International Journal of Computing and Engineering. 2025 Mar 19.
- Sabbarwal E, Pandey DS. IoT based Data Protection Technique for Security and Privacy Preserving in Cloud ERP. In2023 International Conference on IoT, Communication and Automation Technology (ICICAT) 2023 Jun 23 (pp. 1-5). IEEE.
- Khalil IM, Khreishah A, Azeem M. Cloud computing security: A survey. Computers. 2014 Feb 3;3(1):1-35.
- Pillai V. Anomaly Detection for Innovators: Transforming Data into Breakthroughs. Libertatem Media Private Limited; 2022 Apr 22.
- Adee R, Mouratidis H. A dynamic four-step data security model for data in cloud computing based on cryptography and steganography. Sensors. 2022 Feb 1;22(3):1109..
- Agarwal P, Gupta A. Cybersecurity strategies for safe erp/crm implementation. In2024 3rd International Conference on Artificial Intelligence For Internet of Things (AIIoT) 2024 May 3 (pp. 1-6). IEEE.
- Ansari S, Akther S. A Novel Dynamic Access Security Protocol with Adaptive Cryptography and Event Controls for Cloud Data Sharing Across Various Security Levels. In2025 International Conference on Electronics and Renewable Systems (ICEARS) 2025 Feb 11 (pp. 984-994). IEEE..
- Paramesh J, Sriram KP, Anbalagan E, Sasikumar S, Kumar MG. Developing an Adaptive Security Framework for Real-Time Threat Detection and Response in Cloud-Network Systems. In2024 International Conference on Cybernation and Computation (CYBERCOM) 2024 Nov 15 (pp. 644-648). IEEE.
- Dhanush K, Azeez SA, Prasad KHNV, Kiran PMS, Kavitha S, Kavitha M. A Comprehensive Study on Misconfiguration-SAAS Security Threat. In: 2024 Second International Conference on Inventive Computing and Informatics (ICICI). IEEE; 2024. p. 433–8.
- Aljuhani A, Alamri A, Kumar P, Jolfaei A. An intelligent and explainable SaaS-based intrusion detection system for resource-constrained IoMT. IEEE Internet of Things Journal. 2023 Oct 24;11(15):25454-63.
- Kanagasabapathi K, Mahajan K, Ahamad S, Soumya E, Barthwal S. AI-enhanced multi-cloud security management: Ensuring robust cybersecurity in hybrid cloud environments. In2023 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES) 2023 Dec 14 (pp. 1-6). IEEE..
- Raturi A, Kumar S, Joshi A. Security Risk Assessment & Mitigation Framework for Cloud-based IT Systems. In2022 3rd International Conference on Computing, Analytics and Networks (ICAN) 2022 Nov 18 (pp. 1-5). IEEE.

Journal of Artificial Intelligence Research & Advances
| Volume | 12 |
| 03 | |
| Received | 19/06/2025 |
| Accepted | 29/07/2025 |
| Published | 29/09/2025 |
| Publication Time | 102 Days |
PlumX Metrics
