Ai-Driven Threat Detection and Prevention in Cloud Computing Environments

Authors

DOI:

https://doi.org/10.54536/ajise.v4i3.5041

Keywords:

AI-Driven Cybersecurity, Cloud Security, Hybrid AI Models, Machine Learning, Reinforcement Learning, Supervised Learning, Threat Detection, Unsupervised Learning

Abstract

Cloud computing has become a cornerstone of modern IT infrastructure, offering scalability and efficiency but also exposing organizations to evolving cyber threats such as data breaches, insider threats, and advanced persistent threats (APTs). Traditional security mechanisms struggle to address these dynamic challenges, necessitating the integration of AI-driven threat detection and prevention strategies. This conceptual paper explores the comparative effectiveness of supervised learning, unsupervised learning, reinforcement learning, and hybrid AI models in cloud security. Supervised learning excels in identifying known attack patterns, while unsupervised learning is crucial for detecting zero-day threats and anomalies. Reinforcement learning enables self-adaptive security measures, and hybrid models offer a comprehensive, multi-layered approach to cloud security. However, AI-driven cybersecurity faces significant challenges, including data privacy risks, bias in threat detection, adversarial AI attacks, and lack of model interpretability. Emerging AI trends such as federated learning, quantum security, and explainable AI (XAI) are shaping the future of cloud security, while regulatory frameworks like GDPR, NIST AI Risk Management, and the EU AI Act play a crucial role in standardizing ethical AI use. This study provides insights into the strengths, weaknesses, and future directions of AI-driven cloud security, offering recommendations for researchers, policymakers, and cybersecurity practitioners to enhance AI resilience against emerging threats.

Downloads

Download data is not yet available.

References

Abdallah, A., Alkaabi, A., Alameri, G., Rafique, S. H., Musa, N. S., & Murugan, T. (2024). Cloud network anomaly detection using machine and deep learning techniques: Recent research advancements. IEEE Access, 12, 56749–56773. https://doi.org/10.1109/ACCESS.2024.3390844

Adako, O., Adeusi, O., & Alaba, P. (2024). Integrating AI tools for enhanced autism education: A comprehensive review. International Journal of Developmental Disabilities, 1–13. https://doi.org/10.1080/20473869.2024.2392983

Adeusi, O. C., Adebayo, Y. O., Ayodele, P. A., Onikoyi, T. T., Adebayo, K. B., & Adenekan, I. O. (2024). IT standardization in cloud computing: Security challenges, benefits, and future directions. World Journal of Advanced Research and Reviews, 22(3), 2050–2057.

Ahmed, Q. O. (2024). Machine learning for intrusion detection in cloud environments: A comparative study. Journal of Artificial Intelligence General Science (JAIGS), 6(1), 550–563. https://doi.org/10.60087/jaigs.v6i1.287

Ajala, O. A., Okoye, C. C., Ofodile, O. C., Arinze, C. A., & Daraojimba, O. D. (2024). Review of AI and machine learning applications to predict and thwart cyber-attacks in real time. Magna Scientia Advanced Research and Reviews, 10(1), 312–320.

Ajayi, A. M., Omokanye, A. O., Olowu, O., Adeleye, A. O., Omole, O. M., & Wada, I. U. (2024). Detecting insider threats in banking using AI-driven anomaly detection: A data science approach to cybersecurity. Unpublished manuscript.

Alzaabi, F. R., & Mehmood, A. (2024). A review of recent advances, challenges, and opportunities in malicious insider-threat detection using machine learning methods. IEEE Access, 12, 30907–30927. https://doi.org/10.1109/ACCESS.2024.3372277

Arif, H., Kumar, A., Fahad, M., & Hussain, H. K. (2024). Future horizons: AI-enhanced threat detection in cloud environments—Unveiling opportunities for research. International Journal of Multidisciplinary Sciences and Arts, 3(1), 242–251.

Ariyibi, K. O., Bello, O. F., Ekundayo, T. F., & Ishola, O. (2024). Leveraging artificial intelligence for enhanced tax fraud detection in modern fiscal systems. GSC Advanced Research and Reviews, 21(2), 129–137. https://doi.org/10.30574/gscarr.2024.21.2.0415

Artioli, P., Maci, A., & Magrì, A. (2024). A comprehensive investigation of clustering algorithms for user and entity behavior analytics. Frontiers in Big Data, 7, 1375818. https://doi.org/10.3389/fdata.2024.1375818

Azevedo, B. F., Rocha, A. M. A., & Pereira, A. I. (2024). Hybrid approaches to optimization and machine learning methods: A systematic literature review. Machine Learning, 113(7), 4055–4097. https://doi.org/10.1007/s10994-023-06467-x

Byatarayanapura Venkataswamy, S., Patil, K. S., Narayanaswamy, H. K., & Veerabadrappa, K. (2024). Access management based on deep reinforcement learning for effective cloud storage security. International Journal of System Assurance Engineering and Management, 15(8), 1–20. https://doi.org/10.1007/s13198-024-02596-1

Chen, J., Höhlein, K., & Lerch, S. (2025). Learning low-dimensional representations of ensemble forecast fields using autoencoder-based methods. arXiv. https://arxiv.org/abs/2502.04409

David, A. A., & Edoise, A. (2025). Cloud computing and machine learning for scalable predictive analytics and automation: A framework for solving real-world problems. Communications in Physical Sciences, 12(2), 406–416. https://dx.doi.org/10.4314/cps.v12i2.16

Ganguli, P. (2024). The rise of cybercrime-as-a-service: Implications and countermeasures (SSRN Working Paper No. 4959188). SSRN. https://ssrn.com/abstract=4959188

Gupta, R., & Srivastava, P. (2025). Artificial intelligence and machine learning in cybersecurity applications. In Cyber security solutions for protecting and building the future smart grid (pp. 271–296). Elsevier. https://doi.org/10.1016/B978-0-443-14066-2.00004-9

Hernández Rivas, A., Morales Rocha, V., & Sánchez Solís, J. P. (2024). Towards autonomous cybersecurity: A comparative analysis of agnostic and hybrid AI approaches for advanced persistent threat detection. In Innovative applications of artificial neural networks to data analytics and signal processing (pp. 181–219). Springer, Cham. https://doi.org/10.1007/978-3-031-69769-2_8

Hussain, H., Kainat, M., & Ali, T. (2025). Leveraging AI and machine learning to detect and prevent cybersecurity threats. Dialogue Social Science Review, 3(1), 881–895.

Ibrahim, N., Rajalakshmi, N. R., & Hammadeh, K. (2024). Exploration of defensive strategies, detection mechanisms, and response tactics against advanced persistent threats (APTs). Nanotechnology Perceptions, 20(S4), 439–455. https://doi.org/10.62441/nano-ntp.v20iS4.33

Kaliyaperumal, P., Periyasamy, S., Thirumalaisamy, M., Balusamy, B., & Benedetto, F. (2024). A novel hybrid unsupervised learning approach for enhanced cybersecurity in the IoT. Future Internet, 16(7), 253. https://doi.org/10.3390/fi16070253

Kheddar, H., Dawoud, D. W., Awad, A. I., Himeur, Y., & Khan, M. K. (2024). Reinforcement learning based intrusion detection in communication networks: A review. IEEE Communications Surveys & Tutorials, 27(4), 2420–2469. https://doi.org/10.1109/COMST.2024.3484491

Louati, F., Ktata, F. B., & Amous, I. (2024). Enhancing intrusion detection systems with reinforcement learning: A comprehensive survey of RL based approaches and techniques. SN Computer Science, 5(6), 665. https://doi.org/10.1007/s42979-024-03001-1

Marengo, A., & Pagano, A. (2024). Machine learning for cybersecurity for detecting and preventing cyber attacks. Machine Intelligence Research, 18(1), 672–689. https://doi.org/10.1016/j.mir.2023.11.015

Miao, Y., Zhang, S., Ding, L., Bao, R., Zhang, L., & Tao, D. (2025). INFORM: Mitigating reward hacking in RLHF via information theoretic reward modeling. In Advances in Neural Information Processing Systems, 37 (pp. 134387–134429).

Mohale, V. Z., & Obagbuwa, I. C. (2025). A systematic review on the integration of explainable artificial intelligence in intrusion detection systems: Enhancing transparency and interpretability in cybersecurity. Frontiers in Artificial Intelligence, 8, 1526221. https://doi.org/10.3389/frai.2025.1526221

Mohamed, A. A., Al Saleh, A., Sharma, S. K., & Tejani, G. G. (2025). Zero day exploits detection with adaptive WavePCA Autoencoder (AWPA) adaptive hybrid exploit detection network (AHEDNet). Scientific Reports, 15(1), 4036. https://doi.org/10.1038/s41598-025-87615-2

Mvula, P. K., Branco, P., Jourdan, G. V., & Viktor, H. L. (2024). A survey on the applications of semi supervised learning to cyber security. ACM Computing Surveys, 56(10), 1–41. https://doi.org/10.1145/3657647

Nnenna, J. O., Olaoye, S. A., & Samuel, A. A. (2025). Enhancing cybersecurity in communication networks using machine learning and AI: A case of 5G infrastructure security. World Journal of Advanced Research and Reviews, 26(1), 1210–1219. https://doi.org/10.30574/wjarr.2025.26.1.1098

Nnenna, J. O., Adesola, A. A., Samuel, A. A., & Rhoda, K. T. (2025). Federated learning for privacy preserving data analytics in mobile applications. World Journal of Advanced Research and Reviews, 26(1), 1220–1232. https://doi.org/10.30574/wjarr.2025.26.1.1099

Nwachukwu, C., Durodola Tunde, K., & Akwiwu Uzoma, C. (2024). AI driven anomaly detection in cloud computing environments. Unpublished manuscript.

Olabanji, S. O., Marquis, Y., Adigwe, C. S., Ajayi, S. A., Oladoyinbo, T. O., & Olaniyi, O. O. (2024). AI driven cloud security: Examining the impact of user behavior analysis on threat detection. Asian Journal of Research in Computer Science, 17(3), 57–74. https://doi.org/10.9734/ajrcos/2024/v17i3301

Olateju, O., Okon, S. U., Igwenagu, U., Salami, A. A., Oladoyinbo, T. O., & Olaniyi, O. O. (2024). Combating the challenges of false positives in AI driven anomaly detection systems and enhancing data security in the cloud. SSRN. https://ssrn.com/abstract=4859958

Olawale, A., Ajoke, O., & Adeusi, C. (2020). Quality assessment and monitoring of networks using a passive technique. Review of Computer Engineering Research, 7(2), 54–61. https://doi.org/10.18488/journal.76.2020.72.54.61

Olowu, O., Adeleye, A. O., Omokanye, A. O., Ajayi, A. M., Adepoju, A. O., Omole, O. M., & Chianumba, E. C. (2024). AI driven fraud detection in banking: A systematic review of data science approaches to enhancing cybersecurity. GSC Advanced Research and Reviews, 21(2), 227–237. https://doi.org/10.30574/gscarr.2024.21.2.0418

Oloyede, J. (2024). AI driven cybersecurity solutions: Enhancing defense mechanisms in the digital era. SSRN. https://ssrn.com/abstract=4976103

Pham, V. H., Do Hoang, H., Trung, P. T., To, T. N., & Duy, P. T. (2024). Raiju: Reinforcement learning guided post exploitation for automating security assessment of network systems. Computer Networks, 253, 110706. https://doi.org/10.1016/j.comnet.2024.110706

Saeed, M. M., & Alsharidah, M. (2024). Security, privacy, and robustness for trustworthy AI systems: A review. Computers & Electrical Engineering, 119, 109643. https://doi.org/10.1016/j.compeleceng.2024.109643

Sah, A. K., & Venkatesh, K. (2024, April). Anomaly based intrusion detection in network traffic using machine learning: A comparative study of decision trees and random forests. In 2024 2nd International Conference on Networking and Communications (ICNWC) (pp. 1–7). IEEE.

Salman, M., Ikram, M., & Kaafar, M. A. (2024). Investigating evasive techniques in SMS spam filtering: A comparative analysis of machine learning models. IEEE Access, 12, 24306–24324. https://doi.org/10.1109/ACCESS.2024.3364671

Sarker, I. H., Janicke, H., Mohsin, A., Gill, A., & Maglaras, L. (2024). Explainable AI for cybersecurity automation, intelligence, and trustworthiness in digital twin: Methods, taxonomy, challenges, and prospects. ICT Express. https://doi.org/10.1016/j.icte.2024.10.012

Sharma, A., & Singh, U. K. (2025). Cloud computing security through detection and mitigation of zero day attacks using machine learning techniques. In Natural Language Processing for Software Engineering (pp. 357–388). https://doi.org/10.1016/B978-0-443-25665-1.00014-7

Sharma, H. (2024). The evolution of cybersecurity challenges and mitigation strategies in cloud computing systems. International Journal of Computer Engineering and Technology, 15(4), 118–127. https://doi.org/10.5281/zenodo.13140593

Shehzadi, T. (2024). Reinforcement learning based autonomous systems for cyber threat detection and response. Eastern European Journal for Multidisciplinary Research, 1(1), 123–137.

Simanjuntak, T. (2024). Emerging cybersecurity threats in the era of AI and IoT: A risk assessment framework using machine learning for proactive threat mitigation. International Journal of Information System and Innovative Technology, 3(1), 15–22.

Soni, R., Bhatia, K., & Rajput, N. (2025). A thorough analysis of cloud computing technology: Present, past, and future. In Recent advances in sciences, engineering, information technology & management (pp. 137–145). CRC Press. https://doi.org/10.1201/9781003598152-19

Stranieri, F., Fadda, E., & Stella, F. (2024). Combining deep reinforcement learning and multi stage stochastic programming to address the supply chain inventory management problem. International Journal of Production Economics, 268, 109099. https://doi.org/10.1016/j.ijpe.2023.109099

Thapaliya, S., & Gurung, M. R. C. (2025). Mitigating insider threats and data breaches: Enhancing data loss prevention systems with behavioral analytics and NLP. International Journal of Multidisciplinary and Interdisciplinary Research, 2(1).

Yepmo, V., Smits, G., Lesot, M. J., & Pivert, O. (2024). Leveraging an isolation forest to anomaly detection and data clustering. Data & Knowledge Engineering, 151, 102302. https://doi.org/10.1016/j.datak.2024.102302

Ying, W., Wang, D., Hu, X., Zhou, Y., Aggarwal, C. C., & Fu, Y. (2024, August). Unsupervised generative feature transformation via graph contrastive pre training and multi objective fine tuning. In Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (pp. 3966–3976). https://doi.org/10.1145/3637528.3672015

Zada, I., Alatawi, M. N., Saqlain, S. M., Alshahrani, A., Alshamran, A., Imran, K., & Alfraihi, H. (2024). Fine tuning cyber security defenses: Evaluating supervised machine learning classifiers for Windows malware detection. Computers, Materials & Continua, 80(2), 2917–2939. https://doi.org/10.32604/cmc.2024.052835

Zideh, M. J., Khalghani, M. R., & Solanki, S. K. (2024). An unsupervised adversarial autoencoder for cyber attack detection in power distribution grids. Electric Power Systems Research, 232, 110407. https://doi.org/10.1016/j.epsr.2024.110407

Downloads

Published

2025-10-25

How to Cite

Eleweke, I., Umakor, M. F., Ndubuisi, C. W., Amomo, C. G., Adeniji, S., & Temidayo, M. (2025). Ai-Driven Threat Detection and Prevention in Cloud Computing Environments. American Journal of Innovation in Science and Engineering, 4(3), 49–56. https://doi.org/10.54536/ajise.v4i3.5041