Future Horizons: AI-Enhanced Threat Detection in Cloud Environments: Unveiling Opportunities for Research
DOI:
https://doi.org/10.47709/ijmdsa.v2i2.3452Keywords:
Keywords: case studies, ethical issues, future trends, strategic considerations, cyber security landscape, cloud security, artificial intelligence, evolution, obstacles, and AI-enhanced threat detectionAbstract
In this extensive and comprehensive review paper, we delve into the dynamic landscape of artificial intelligence (AI)-enhanced threat detection within cloud environments. The evolution of this field, from traditional methodologies to the seamless integration of AI, is meticulously explored, providing a nuanced understanding of the transformative potential of AI in bolstering cyber security measures. The exploration encompasses a myriad of crucial aspects, offering readers a holistic view of the subject. The revolutionary impact of AI is scrutinized, emphasizing its role in reshaping the conventional paradigms of threat detection and response. The paper meticulously addresses current challenges in cloud security, providing insights into the multifaceted nature of contemporary threats and how AI serves as a robust defense mechanism. As we navigate through the intricacies of this field, the review paper sheds light on ongoing research prospects, presenting a roadmap for future endeavors. Real-world case studies are examined to illustrate the practical applications of AI-enhanced threat detection, offering valuable lessons and perspectives for decision-makers, researchers, and practitioners in the realm of cyber security. Ethical considerations are given due attention, as the integration of AI in threat detection raises important questions surrounding privacy, bias, and accountability. By analyzing current trajectories and emerging technologies, the article provides readers with a forward-looking perspective, helping them anticipate the evolving landscape of cyber security. In addition to exploring the technological facets, the paper emphasizes the importance of a collaborative approach and ongoing adaptation. The interconnected nature of threats in the digital realm necessitates a collective effort from industry experts, researchers, and policymakers. The review paper advocates for a holistic strategy that integrates AI technologies with human expertise to create a resilient defense against the ever-evolving landscape of cyber threats.
References
A.K. Kar, P. S. Varsha, and S. Rajan, “Unravelling the impact of Generative Artificial intelligence (GAI) in Industrial Applications: A review of scientific and Grey literature,” Global Journal of Flexible Systems Management, vol. 24, no. 4, pp. 659–689, Sep. 2023, doi: 10.1007/s40171-023-00356-x. Available: https://doi.org/10.1007/s40171-023-00356-x
M. A. Ferrag, M. Debbah, and M. Al-Hawawreh, “Generative AI for Cyber Threat-Hunting in 6G-enabled IoT networks,” arXiv (Cornell University), Mar. 2023, doi: 10.48550/arxiv.2303.11751. Available: http://arxiv.org/abs/2303.11751
X. Shu et al., “Threat Intelligence Computing,” ACM DL, Oct. 2018, doi: 10.1145/3243734.3243829. Available: https://doi.org/10.1145/3243734.3243829
Chen, Q. V. Liao, J. Vaughan, and G. Bansal, “Understanding the Role of Human Intuition on Reliance in Human-AI Decision-Making with Explanations,” Proceedings of the ACM on Human-computer Interaction, vol. 7, no. CSCW2, pp. 1–32, Sep. 2023, doi: 10.1145/3610219. Available: https://doi.org/10.1145/3610219
Y. Wang, “Artificial intelligence in educational leadership: a symbiotic role of humanartificial intelligence decision-making,” Journal of Educational Administration, vol. 59, no. 3, pp. 256–270, Feb. 2021, doi: 10.1108/jea-10-2020-0216. Available: https://doi.org/10.1108/jea-10- 2020-0216
S. Qiu, Q. Liu, S. Zhou, and C. Wu, “Review of Artificial intelligence adversarial attack and defense technologies,” Applied Sciences, vol. 9, no. 5, p. 909, Mar. 2019, doi: 10.3390/app9050909. Available: https://doi.org/10.3390/app9050909
M. Brundage, “The Malicious Use of Artificial intelligence: Forecasting, Prevention, and Mitigation,” arXiv.org, Feb. 20, 2018. Available: https://arxiv.org/abs/1802.07228
Björk, “Social and economic impacts of Maritime Automated Surface Ships,” 2021. Available: https://hdl.handle.net/20.500.12380/302302
“Threat hunting and active cyber defense - ProQuest.” Available: https://www.proquest.com/docview/1900172347?pqorigsite=gscholar&fromopenview=true&sourcetype=Dissertations%20&%20Theses
M. R. Fatemi and A. A. Ghorbani, “Threat hunting in Windows using big security log data,” in Advances in information security, privacy, and ethics book series, 2020, pp. 168–188. doi: 10.4018/978-1-5225-9742-1.ch007. Available: https://doi.org/10.4018/978-1-5225-9742-1.ch007
M. R. Fatemi, “Threat-hunting in Windows environment using host-based log data,” 2019. Available: https://unbscholar.lib.unb.ca/items/de0a9682-d75b-4d3f-9c12-9078554140bf
M. A. Lozano, I. P. Llopis, and M. Domingo, “Threat hunting architecture using a machine learning approach for critical infrastructures protection,” Big Data and Cognitive Computing, vol. 7, no. 2, p. 65, Mar. 2023, doi: 10.3390/bdcc7020065. Available: https://doi.org/10.3390/bdcc7020065
A.H. Nursidiq and C. Lim, “Cyber Threat Hunting to Detect Unknown Threats in the Enterprise Network,” IEEE, Aug. 2023, doi: 10.1109/icocics58778.2023.10277438. Available: https://doi.org/10.1109/icocics58778.2023.10277438
A.Islam, M. A. Babar, R. Croft, and H. Janicke, “SmartValidator: A framework for automatic identification and classification of cyber threat data,” Journal of Network and Computer Applications, vol. 202, p. 103370, Jun. 2022, doi: 10.1016/j.jnca.2022.103370. Available: https://doi.org/10.1016/j.jnca.2022.103370
M. N. Al-Mhiqani et al., “A new intelligent multilayer framework for insider threat detection,” Computers & Electrical Engineering, vol. 97, p. 107597, Jan. 2022, doi: 10.1016/j.compeleceng.2021.107597. Available: https://doi.org/10.1016/j.compeleceng.2021.107597
Europe PMC, “Europe PMC.” Available: https://europepmc.org/article/NBK/nbk525302 [140] Johansen, Digital forensics and incident response: Incident response techniques and procedures to respond to modern cyber threats. Packt Publishing Ltd, 2020.
Y. Diogenes and E. Ozkaya, Cybersecurity – attack and defense strategies: Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals. Packt Publishing Ltd, 2019.
Steingartner, D. Galinec, and A. Kozina, “Threat Defense: Cyber Deception approach and Education for Resilience in Hybrid Threats model,” Symmetry, vol. 13, no. 4, p. 597, Apr. 2021, doi: 10.3390/sym13040597. Available: https://doi.org/10.3390/sym13040597
Rabieinejad, A. Yazdinejad, R. M. Parizi, and A. Dehghantanha, “Generative adversarial networks for cyber threat hunting in Ethereum blockchain,” Distributed Ledger Technologies Research and Practice, vol. 2, no. 2, pp. 1–19, Jun. 2023, doi: 10.1145/3584666. Available: https://doi.org/10.1145/3584666
Gupta, S. Tanwar, S. Tyagi, and N. Kumar, “Machine Learning Models for Secure Data Analytics: A taxonomy and threat model,” Computer Communications, vol. 153, pp. 406–440, Mar. 2020, doi: 10.1016/j.comcom.2020.02.008. Available: https://doi.org/10.1016/j.comcom.2020.02.008
Yuan and X. Wu, “Deep learning for insider threat detection: Review, challenges and opportunities,” Computers & Security, vol. 104, p. 102221, May 2021, doi: 10.1016/j.cose.2021.102221. Available: https://doi.org/10.1016/j.cose.2021.102221
P. F. Nardulli, S. L. Althaus, and M. Hayes, “A progressive supervised-learning approach to generating rich civil strife data,” Sociological Methodology, vol. 45, no. 1, pp. 148–183, May 2015, doi: 10.1177/0081175015581378. Available: https://doi.org/10.1177/0081175015581378
M. A. Lozano, I. P. Llopis, and M. Domingo, “Threat hunting architecture using a machine learning approach for critical infrastructures protection,” Big Data and Cognitive Computing, vol. 7, no. 2, p. 65, Mar. 2023, doi: 10.3390/bdcc7020065. Available: https://doi.org/10.3390/bdcc7020065
M. Shaukat, R. Amin, M. M. A. Muslam, A. H. Alshehri, and J. Xie, “A hybrid approach for alluring ads phishing attack detection using machine learning,” Sensors, vol. 23, no. 19, p. 8070, Sep. 2023, doi: 10.3390/s23198070. Available: https://doi.org/10.3390/s23198070
L. Li, “Application of Machine learning and data mining in Medicine: Opportunities and considerations,” in Artificial intelligence, 2023. doi: 10.5772/intechopen.113286. Available: https://doi.org/10.5772/intechopen.113286
Md. A. Talukder et al., “A dependable hybrid machine learning model for network intrusion detection,” Journal of Information Security and Applications, vol. 72, p. 103405, Feb. 2023, doi: 10.1016/j.jisa.2022.103405. Available: https://doi.org/10.1016/j.jisa.2022.103405
J. P. Bharadiya, “Machine learning in cybersecurity: Techniques and challenges,” European Journal of Technology, vol. 7, no. 2, pp. 1–14, Jun. 2023, doi: 10.47672/ejt.1486. Available: https://doi.org/10.47672/ejt.1486
V. O. Kayhan, M. Agrawal, and S. Shivendu, “Cyber threat detection: Unsupervised hunting of anomalous commands (UHAC),” Decision Support Systems, vol. 168, p. 113928, May 2023, doi: 10.1016/j.dss.2023.113928. Available: https://doi.org/10.1016/j.dss.2023.113928
“International Journal of Computing and Digital Systems,” International Journal of Computing and Digital Systems, Feb. 2019, doi: 10.12785/ijcds. Available: https://doi.org/10.12785/ijcds
Apruzzese et al., “The role of machine learning in cybersecurity,” Digital Threats, vol. 4, no. 1, pp. 1–38, Mar. 2023, doi: 10.1145/3545574. Available: https://doi.org/10.1145/3545574
M. Muneer, “Cyber Security event detection using machine learning technique,” Jun. 30, 2023. Available: http://ijcis.com/index.php/IJCIS/article/view/65
R. Konatham, “A secure and efficient IIoT anomaly detection approach using a hybrid deep learning technique,” 2023. Available: https://etd.ohiolink.edu/acprod/odb_etd/etd/r/1501/10?clear=10&p10_accession_num=wright169 3265848788066
H. Xie, S. Ma, H. Wang, N. Li, J. Zhu, and J. Wang, “Unsupervised clustering for the anomaly diagnosis of plunger lift operations,” Geoenergy Science and Engineering, vol. 231, p. 212305, Dec. 2023, doi: 10.1016/j.geoen.2023.212305. Available: https://doi.org/10.1016/j.geoen.2023.212305
M. Bahri, F. Salutari, A. Putina, and M. Sozio, “AutoML: state of the art with a focus on anomaly detection, challenges, and research directions,” International Journal of Data Science and Analytics, vol. 14, no. 2, pp. 113–126, Feb. 2022, doi: 10.1007/s41060-022-00309-0. Available: https://doi.org/10.1007/s41060-022-00309-0
R. Bhatia, S. Benno, J. Esteban, T. V. Lakshman, and J. Grogan, “Unsupervised machine learning for network-centric anomaly detection in IoT,” ACM Library, Dec. 2019, doi: 10.1145/3359992.3366641. Available: https://doi.org/10.1145/3359992.3366641
M. Guerreiro et al., “Anomaly Detection in Automotive Industry Using Clustering Methods—A Case Study,” Applied Sciences, vol. 11, no. 21, p. 9868, Oct. 2021, doi: 10.3390/app11219868. Available: https://doi.org/10.3390/app11219868
E. G. Lopes and M. De Sevilha Gosling, “Cluster Analysis in Practice: Dealing with Outliers in Managerial Research,” RAC: Revista De Administração Contemporânea, vol. 25, no. 1, Jan. 2021, doi: 10.1590/1982-7849rac2021200081. Available: https://doi.org/10.1590/1982- 7849rac2021200081
Downloads
Published
Issue
Section
License
Copyright (c) 2023 Haroon Arif, Aashesh Kumar, Muhammad Fahad, Hafiz Khawar Hussain

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.