Development of AI-Enhanced Intrusion Detection Systems for Securing Cloud-Native Distributed Architectures
Keywords:
Cloud-native, Intrusion Detection System, Artificial Intelligence, Cybersecurity, Microservices, Anomaly Detection, ContainersAbstract
This paper introduces an AI-driven framework for dynamic pricing of loan and credit products, tailored for real-time optimization in consumer-facing FinTech platforms. Traditional pricing mechanisms in lending lack responsiveness to market volatility, consumer behavior, and credit risk evolution. Our model integrates reinforcement learning, demand forecasting, and customer segmentation to dynamically adjust credit pricing at scale. Simulation results indicate improved loan approval efficiency, reduced default rates, and increased profitability through adaptive rate personalization.
References
Kim, Y., Kim, H., and Lee, J. “Deep Learning-Based Anomaly Detection for Cloud Traffic.” IEEE Transactions on Cloud Computing, 2018.
Gundaboina, A. (2022). Quantum computing and cloud security: Future-proofing healthcare data protection. International Journal for Multidisciplinary Research (IJFMR), 4(4), 1–12. https://doi.org/10.36948/ijfmr.2022.v04i04.61014
Shone, N., Ngoc, T. N., Phai, V. D., and Shi, Q. “A Deep Learning Approach to Network Intrusion Detection.” IEEE Transactions on Emerging Topics in Computational Intelligence, 2019.
Sharma, S., and Saini, J. R. “Decision Tree Based IDS for Cloud Computing.” Journal of Information Security and Applications, 2020.
Uppuluri, V. (2020). Integrating behavioral analytics with clinical trial data to inform vaccination strategies in the U.S. retail sector. Journal of Artificial Intelligence, Machine Learning & Data Science, 1(1), 3024–3030. https://doi.org/10.51219/JAIMLD/vijitha-uppuluri/625
Zhang, X., Lin, Y., and Wu, Y. “Federated Learning for Decentralized Anomaly Detection in Edge-Cloud Systems.” IEEE Internet of Things Journal, 2021.
Hussein, A., Al-Saidi, A., and Karim, S. “Reinforcement Learning for Adaptive IDS in Containerized Environments.” Computers & Security, 2022.
Potla, R.B. (2022). Hybrid integration for manufacturing finance: RTR controls, intercompany eliminations, and auditability across multi-ERP estates. ISCSITR–International Journal of ERP and CRM (ISCSITR-IJEC), 3(1), 11–38. https://doi.org/10.63397/ISCSITR-IJEC_03_01_002
Ali, M., and Raza, S. “CNN-Based Intrusion Detection for Kubernetes.” Future Generation Computer Systems, 2022.
Moustafa, Nour, and Jill Slay. “UNSW-NB15: A Comprehensive Data Set for Network Intrusion Detection Systems.” Military Communications and Information Systems Conference (MilCIS), IEEE, 2015.
Vallemoni, R.K. (2022). Canonical payment data models for merchant acquiring: Merchants, terminals, transactions, fees, and chargebacks. International Journal of Computer Science and Engineering (ISCSITR-IJCSE), 3(1), 42–66. https://doi.org/10.63397/ISCSITR-IJCSE_03_01_006
Tavallaee, Mahbod, et al. “A Detailed Analysis of the KDD CUP 99 Data Set.” Proceedings of the IEEE Symposium on Computational Intelligence in Security and Defense Applications, 2009.
Sommer, Robin, and Vern Paxson. “Outside the Closed World: On Using Machine Learning for Network Intrusion Detection.” IEEE Symposium on Security and Privacy, 2010.
Vallemoni, R.K. (2022). Authorization-to-settlement at scale: A reference data architecture for ISO 8583 / ISO 20022 coexistence. Journal of Computer Science and Technology Studies, 4, 88–98. https://doi.org/10.32996/jcsts.2022.4.1.11
Garcia-Teodoro, Pedro, et al. “Anomaly-Based Network Intrusion Detection: Techniques, Systems and Challenges.” Computers & Security, vol. 28, no. 1–2, 2009, pp. 18–28.
Nguyen, Tan T., and Grenville Armitage. “A Survey of Techniques for Internet Traffic Classification Using Machine Learning.” IEEE Communications Surveys & Tutorials, vol. 10, no. 4, 2008, pp. 56–76.
Modi, Chirag, et al. “A Survey of Intrusion Detection Techniques in Cloud.” Journal of Network and Computer Applications, vol. 36, no. 1, 2013, pp. 42–57.
Downloads
Published
Issue
Section
License
Copyright (c) 2023 George Louisa May (Author)

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
