ADOPTION OF AI-POWERED THREAT INTELLIGENCE IN CLOUD INFRASTRUCTURES FOR REAL-TIME RISK MITIGATION AND AUTOMATED ANOMALY DETECTION THROUGH PREDICTIVE SECURITY ANALYTICS

Authors

  • Mr. Anuj Aggarwal Cybersecurity Engineer, DFS Corporate Services LLC, Delaware, USA

DOI:

https://doi.org/10.29121/digisecforensics.v2.i1.2025.87

Keywords:

AI-Powered Threat Intelligence, Cloud Infrastructures, Real-Time Risk Mitigation, Automated Anomaly Detection, Predictive Security Analytics, Machine Learning, Cybersecurity, Data Breach Prevention

Abstract

The exponential growth of cloud infrastructures has amplified cybersecurity vulnerabilities, with breaches costing organizations an average of $4.88 million in 2024. This study investigates the adoption of AI-powered threat intelligence to enable real-time risk mitigation and automated anomaly detection via predictive security analytics. Utilizing a mixed-methods approach, including simulations on synthetic datasets mimicking 2023-2024 cloud traffic patterns and analysis of ML algorithms like LSTM and Isolation Forest, the research assesses AI's efficacy in preempting threats. Findings indicate a 68% reduction in detection latency and 75% improvement in false positive rates, alongside a 52% decrease in breach propagation risks. These results highlight AI's transformative potential in enhancing cloud resilience. The study concludes by advocating for integrated AI frameworks to foster proactive defenses, informing policy and practice for scalable, secure cloud ecosystems.

References

Alam, M., Khan, A., and Rehman, S. (2024). Blockchain-AI Hybrid for Cloud Threat Intelligence. IEEE Transactions on Information Forensics and Security, 19, 1234–1245. https://doi.org/10.1109/TIFS.2023.3321234

American Psychological Association. (2020). Publication Manual of the American Psychological Association (7th ed.).

Arora, P., and Bhardwaj, S. (2023). Examining Cloud Computing Data Confidentiality Techniques to Achieve Higher Security in Cloud Storage. International Journal of Multidisciplinary Research in Science, Engineering and Technology (IJMRSET), 6(10).

Arora, P., and Bhardwaj, S. (2023). Methods for Safe and Private Data Exchange in Cloud Computing for Medical Applications. International Journal of Advanced Research in Education and Technology (IJARETY), 10(1).

Arora, P., and Bhardwaj, S. (2023). Techniques to Implement Security Solutions and Improve Data Integrity and Security in Distributed Cloud Computing. International Journal of Multidisciplinary Research in Science, Engineering and Technology (IJMRSET), 6(6).

Arora, P., and Bhardwaj, S. (2024). Research on Various Security Techniques for Data Protection in Cloud Computing with Cryptography Structures. International Journal of Innovative Research in Computer and Communication Engineering, 12(1).

Cyble. (2024). AI-Powered Cloud Security Platforms.

Elsayed, M., and Zulkernine, M. (2020). PredictDeep: Anomaly Prediction in Clouds. IEEE Transactions on Cloud Computing, 8(3), 789–802. https://doi.org/10.1109/TCC.2018.2869384 DOI: https://doi.org/10.1109/ACCESS.2020.2977325

European Central Bank. (2024). Financial Stability Review.

Gupta, R., and Sharma, S. (2023). Explainable AI for Cloud Anomalies. Computers and Security, 125, Article 103234. https://doi.org/10.1016/j.cose.2023.103234

Khan, S., Ahmad, Z., and Ali, M. (2023). LSTM for Cloud Anomaly Detection. Future Generation Computer Systems, 142, 200–215. https://doi.org/10.1016/j.future.2022.12.012 DOI: https://doi.org/10.1016/j.future.2022.12.012

Microsoft. (2024). AI Transforming Cybersecurity.

Ponemon Institute. (2023). Cost of a Data Breach Report.

Rao, P., and Patel, V. (2024). GNN for Supply-Chain Risks. Journal of Cybersecurity, 10(2), 1–15.

Sharma, S. (2022). Enhancing Generative AI Models for Secure and Private Data Synthesis.

Sharma, S. (2022). Zero Trust Architecture: A Key Component of Modern Cybersecurity Frameworks.

Sharma, S. (2023). AI-Driven Anomaly Detection for Advanced Threat Detection.

Sharma, S. (2023). Homomorphic Encryption: Enabling Secure Cloud Data Processing.

Singh, R., Kumar, P., and Kaur, J. (2024). Multi-Modal DL for Anomalies. Neural Computing and Applications, 36(5), 2345–2360. https://doi.org/10.1007/s00521-023-08945-2

Tambi, V. K. (2021). Natural Language Understanding Models for Personalized Financial Services. International Journal of Current Engineering and Scientific Research, 8(1), 1–11.

Tambi, V. K. (2021). Serverless Frameworks for Scalable Banking App Backends. International Journal of Research in Electronics and Computer Engineering, 9(4), 103–112.

Tambi, V. K. (2022). Real-Time Compliance Monitoring in Banking Operations Using AI. International Journal of Current Engineering and Scientific Research (IJCESR), 9(9), 35–47.

Tambi, V. K. (2023). Real-Time Data Stream Processing with Kafka-Driven AI Models. International Journal of Current Engineering and Scientific Research (IJCESR).

Tambi, V. K., and Singh, N. (2021). New Applications of Machine Learning and Artificial Intelligence in Cybersecurity Vulnerability Management. International Journal of Advanced Research in Education and Technology (IJARETY), 8(2).

Tambi, V. K., and Singh, N. (2022). A New Framework and Performance Assessment Method for Distributed Deep Neural Network-Based Middleware for Cyberattack Detection in the Smart IoT Ecosystem. International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering (IJAREEIE), 11(5).

Tambi, V. K., and Singh, N. (2022). Creating J2EE Application Development Using a Pattern-Based Environment. International Journal of Innovative Research in Computer and Communication Engineering, 10(11).

Tambi, V. K., and Singh, N. (2023). Evaluation of Web Services Using Various Metrics for Mobile Environments and Multimedia Conferences Based on SOAP and REST Principles. International Journal of Multidisciplinary Research in Science, Engineering and Technology (IJMRSET), 6(2).

World Economic Forum. (2024). Global Risks Report. https://www.weforum.org

Downloads

Published

2025-06-30

How to Cite

Aggarwal, A. (2025). ADOPTION OF AI-POWERED THREAT INTELLIGENCE IN CLOUD INFRASTRUCTURES FOR REAL-TIME RISK MITIGATION AND AUTOMATED ANOMALY DETECTION THROUGH PREDICTIVE SECURITY ANALYTICS. Journal of Digital Security and Forensics, 2(1), 139–150. https://doi.org/10.29121/digisecforensics.v2.i1.2025.87