AI-Based Threat Detection in Cloud Platforms

[{“box”:0,”content”:”n[if 992 equals=”Open Access”]n

n

n

n

Open Access

nn

n

n[/if 992]n[if 2704 equals=”Yes”]n

n

Notice

nThis is an unedited manuscript accepted for publication and provided as an Article in Press for early access at the author’s request. The article will undergo copyediting, typesetting, and galley proof review before final publication. Please be aware that errors may be identified during production that could affect the content. All legal disclaimers of the journal apply.n

n[/if 2704]n

n

Year : 2025 [if 2224 equals=””]24/09/2025 at 2:02 PM[/if 2224] | [if 1553 equals=””] Volume : 13 [else] Volume : 13[/if 1553] | [if 424 equals=”Regular Issue”]Issue : [/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] 03 | Page : 01 10

n

n

nn

n

n

n

    By

    n

    [foreach 286]n

    n

    Sanyam Jain,

    n t

  • n

    n[/foreach]

    n

n[if 2099 not_equal=”Yes”]n

    [foreach 286] [if 1175 not_equal=””]n t

  1. Student, Department of Computer Science Engineering, Rajasthan College of Engineering for Women, Jaipur, Rajasthan, India
  2. n[/if 1175][/foreach]

n[/if 2099][if 2099 equals=”Yes”][/if 2099]n

n

Abstract

n

n

nThis research work delves into the transformative role AI has come to assume for enhanced threat detection in the cloud ecosystem. The conventional security frameworks, which form the basis for many architectures, are several steps behind actualizing the rapidly evolving cyber threat landscape, exposing critical weaknesses in the areas of accuracy, adaptability, and speed of response. Initially, the study sets forth the problems with the old-school approaches to threat detection that more often than not are based on static rule sets and some form of signature, hence are rendered insufficient to countering newer and more sophisticated attack vectors. AI technologies, mainly machine learning models and behavioural analytics, are being credited for elevating the futuristic capacity of threat detection beyond the limits of conventional methods. These systems scour through large volumes of real-time data, looking for minute anomalies and patterns that threaten before the eyes of traditional instruments. It categorizes AI-empowered threat detection into anomaly detection, predictive modelling, automated incident response, and advanced user behaviour analytics. The study weighs heavily on the concept that AI systems do not merely confine themselves to passive monitoring, enabling organizations to take a proactive stance by forecasting potential threats and putting into automation remedial actions. A thorough case study lays emphasis on the practical application of these technologies, lending evidence to drastic increases in detection speed and accuracy. For instance, real-life cases have shown that machine learning models can detect intrusions 87% more accurately than rule-based systems; they also reduce the number of false-positive cases substantially and response time. Moreover, the study addresses how AI interacts with and penetrates often legacy security infrastructures, then proposes best practices for AI adoption. These include hybrid approaches with human oversight accompanying automated analysis; continuous retraining of AI models to withstand new ones generated through adversarial means; and ensuring transparency or explain ability into AI-related decisions. In conclusion, the findings signify that incorporating AI technologies into cloud security maximizes resistance against known and emerging cyber threats, thereby placing AI not just as a strengthening element but as an essential factor in solid cloud defence.nn

n

n

n

Keywords: Artificial intelligence, cloud security, threat detection, machine learning, anomaly detection, cybersecurity

n[if 424 equals=”Regular Issue”][This article belongs to Journal Of Network security ]

n

[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in Journal Of Network security (jons)][/if 424][if 424 equals=”Conference”]This article belongs to Conference [/if 424]

n

n

n

How to cite this article:
nSanyam Jain. [if 2584 equals=”][226 wpautop=0 striphtml=1][else]AI-Based Threat Detection in Cloud Platforms[/if 2584]. Journal Of Network security. 17/09/2025; 13(03):01-10.

n

How to cite this URL:
nSanyam Jain. [if 2584 equals=”][226 striphtml=1][else]AI-Based Threat Detection in Cloud Platforms[/if 2584]. Journal Of Network security. 17/09/2025; 13(03):01-10. Available from: https://journals.stmjournals.com/jons/article=17/09/2025/view=0

nn

n

n[if 992 equals=”Open Access”]Full Text PDF[/if 992]n

n

n[if 992 not_equal=”Open Access”]n

n

n[/if 992]n

nn

nnn

n[if 379 not_equal=””]nn

Browse Figures

n

n

n[foreach 379]

figures

[/foreach]n

n

n

n[/if 379]

n

n

n

n

n

References n

n[if 1104 equals=””]n

  1. Buczak AL, Guven E. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun Surv Tutor. 2015 Oct 26; 18(2): 1153–76.
  2. Kim G, Lee S, Kim S. A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Syst Appl. 2014 Mar 1; 41(4): 1690–700.
  3. Halbouni A, Gunawan TS, Habaebi MH, Halbouni M, Kartiwi M, Ahmad R. Machine learning and deep learning approaches for cybersecurity: A review. IEEE Access. 2022 Feb 11; 10: 19572–85.
  4. Tudesco DM, Deshpande A, Laghari AA, Khan AA, Lopes RT, Jenice Aroma R, Raimond K, Teng L, Khan A. Utilization of Deep Learning Models for Safe Human‐Friendly Computing in Cloud, Fog, and Mobile Edge Networks. Applying artificial intelligence in cybersecurity analytics and cyber threat detection. Wiley Data & Cybersecurity; New Jersey, USA. 2024 Jun 18; 221–48.
  5. Khan SH, Alahmadi TJ, Ullah W, Iqbal J, Rahim A, Alkahtani HK, Alghamdi W, Almagrabi AO. A new deep boosted CNN and ensemble learning based IoT malware detection. Comput Secur. 2023 Oct 1; 133: 103385.
  6. He Z, Chen P, Li X, Wang Y, Yu G, Chen C, Li X, Zheng Z. A spatiotemporal deep learning approach for unsupervised anomaly detection in cloud systems. IEEE Trans Neural Netw Learn Syst. 2020 Oct 16; 34(4): 1705–19.
  7. Alzaabi FR, Mehmood A. A review of recent advances, challenges, and opportunities in malicious insider threat detection using machine learning methods. IEEE Access. 2024 Feb 26; 12: 30907–27.
  8. Idhammad M, Afdel K, Belouch M. Dos detection method based on artificial neural networks. Int J Adv Comput Sci Appl. 2017; 8(4): 465–471.
  9. Azmoodeh A, Dehghantanha A, Conti M, Choo KK. Detecting crypto-ransomware in IoT networks based on energy consumption footprint. J Ambient Intell Humaniz Comput. 2018 Aug; 9(4): 1141–52.
  10. Apruzzese G, Laskov P, Montes de Oca E, Mallouli W, Brdalo Rapa L, Grammatopoulos AV, Di Franco F. The role of machine learning in cybersecurity. Digit Threats: Res Pract. 2023 Mar 7; 4(1): 1–38.
  11. Vinayakumar R, Soman KP, Poornachandran P. Applying deep learning approaches for network traffic prediction. In 2017 IEEE International Conference on Advances in Computing, Communications and Informatics (ICACCI). 2017 Sep 13; 2353–2358.
  12. Javaid A, Niyaz Q, Sun W, Alam M. A deep learning approach for network intrusion detection system. In Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS). 2016 May 24; 21–26.
  13. Mahmood F, Durr NJ. Deep learning and conditional random fields-based depth estimation and topographical reconstruction from conventional endoscopy. Med Image Anal. 2018 Aug 1; 48: 230–43.
  14. Wang Y, Cai WD, Wei PC. A deep learning approach for detecting malicious JavaScript code. Secur Commun Netw. 2016 Jul 25; 9(11): 1520–34.
  15. Almiani M, AbuGhazleh A, Al-Rahayfeh A, Atiewi S, Razaque A. Deep recurrent neural network for IoT intrusion detection system. Simul Model Pract Theory. 2020 May 1; 101: 102031.

nn[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

n


nn[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

[if 424 not_equal=””]Regular Issue[else]Published[/if 424] Subscription Review Article

n

n

n

n

n

Journal Of Network security

n

[if 344 not_equal=””]ISSN: 2395-6739[/if 344]

n

n

n

nn

n

[if 2146 equals=”Yes”][/if 2146][if 2146 not_equal=”Yes”][/if 2146]n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n[if 1748 not_equal=””]

[else]

[/if 1748]n

n[if 1746 equals=”Retracted”]n

n

n

n

[/if 1746]n[if 4734 not_equal=””]

n

n

n

[/if 4734]n

n

Volume 13
[if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] 03
Received 23/04/2025
Accepted 16/07/2025
Published 17/09/2025
Retracted
Publication Time 147 Days

n

n

nn


n

n
My IP
n

PlumX Metrics

nn

n

n

n[if 1746 equals=”Retracted”]n

[/if 1746]nnn

nnn”}]