AI-Powered System for an Efficient and Effective Cyber Incidents Detection and Response in Cloud Environments

Farzaan, M.A.M., Ghanem, M., El Hajjar, A. and Ratnayake, D.N. 2025. AI-Powered System for an Efficient and Effective Cyber Incidents Detection and Response in Cloud Environments. IEEE Transactions on Machine Learning in Communications and Networking. 3, pp. 623-643. https://doi.org/10.1109/TMLCN.2025.3564912

TitleAI-Powered System for an Efficient and Effective Cyber Incidents Detection and Response in Cloud Environments
TypeJournal article
AuthorsFarzaan, M.A.M., Ghanem, M., El Hajjar, A. and Ratnayake, D.N.
Abstract

The growing complexity and frequency of cyber threats in cloud environments call for innovative and automated solutions to maintain effective and efficient incident response. This study tackles this urgent issue by introducing a cutting-edge AI-driven cyber incident response system specifically designed for cloud platforms. Unlike conventional methods, our system employs advanced Artificial Intelligence (AI) and Machine Learning (ML) techniques to provide accurate, scalable, and seamless integration with platforms like Google Cloud and Microsoft Azure. Key features include an automated pipeline that integrates Network Traffic Classification, Web Intrusion Detection, and Post-Incident Malware Analysis into a cohesive framework implemented via a Flask application. To validate the effectiveness of the system, we tested it using three prominent datasets: NSL-KDD, UNSW-NB15, and CIC-IDS-2017. The Random Forest model achieved accuracies of 90%, 75%, and 99%, respectively, for the classification of network traffic, while it attained 96% precision for malware analysis. Furthermore, a neural network-based malware analysis model set a new benchmark with an impressive accuracy rate of 99%. By incorporating deep learning models with cloud-based GPUs and TPUs, we demonstrate how to meet high computational demands without compromising efficiency. Furthermore, containerisation ensures that the system is both scalable and portable across a wide range of cloud environments. By reducing incident response times, lowering operational risks, and offering cost-effective deployment, our system equips organizations with a robust tool to proactively safeguard their cloud infrastructure. This innovative integration of AI and containerised architecture not only sets a new benchmark in threat detection but also significantly advances the state-of-the-art in cybersecurity, promising transformative benefits for critical industries. This research makes a significant contribution to the field of AI-powered cybersecurity by showcasing the powerful combination of AI models and cloud infrastructure to fill critical gaps in cyber incident response. Our findings emphasise the superior performance of Random Forest and deep learning models in accurately identifying and classifying cyber threats, setting a new standard for real-world deployment in cloud environments.

KeywordsCyber incident
Digital forensics
Artificial Intelligence
Machine Learning
Cloud Security
Incident Response
NSL-KDD
UNSW-NB15
CIC-IDS-2017
JournalIEEE Transactions on Machine Learning in Communications and Networking
Journal citation3, pp. 623-643
ISSN2831-316X
Year2025
PublisherIEEE
Publisher's version
License
CC BY 4.0
File Access Level
Open (open metadata and files)
Digital Object Identifier (DOI)https://doi.org/10.1109/TMLCN.2025.3564912
Publication dates
Published28 Apr 2025

Related outputs

An experimental study on the performance of post-Quantum lightweight cryptosystems in the context of IoT/NFC
Alonso India, J., El Hajjar, A. and Kiss, T. 2024. An experimental study on the performance of post-Quantum lightweight cryptosystems in the context of IoT/NFC. The 25th International Web Information Systems Engineering Conference (WISE 2024). Doha, Qatar 02 - 05 Dec 2024 Springer. https://doi.org/0.1007/978-981-96-1483-7_2

Key-Pre Distribution for the Internet of Things Challenges, Threats and Recommendations
El Hajjar, A. 2023. Key-Pre Distribution for the Internet of Things Challenges, Threats and Recommendations. in: Wireless Networks: Cyber Security Threats and Countermeasures Switzerland Springer. pp. 1-42

A proactive approach to protect cloud computing environment against DDoS attack
Md. Mamun Ahmed and Ayman El Hajjar 2023. A proactive approach to protect cloud computing environment against DDoS attack. in: Hamid Jahankhani, Arshad Jamal and Guy Brown (ed.) AI, Blockchain and Self-Sovereign Identity in Higher Education Switzerland Springer. pp. 243-278

Secure routing in IoT networks with SISLOF
El Hajjar, A., Roussos, G. and Paterson, M. 2017. Secure routing in IoT networks with SISLOF. Global IoT Summit. Geneva, Switzerland 06 - 09 Jun 2017 IEEE . https://doi.org/10.1109/GIOTS.2017.8016278

Securing the Internet of Things Devices Using Pre-Distributed Keys
El Hajjar, A. 2016. Securing the Internet of Things Devices Using Pre-Distributed Keys. 2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW). Berlin, Germany 04 - 08 Apr 2016 IEEE . https://doi.org/10.1109/IC2EW.2016.22

On the Performance of Key Pre-distribution for RPL-based IoT Networks
El Hajjar, A., Roussos, G. and Paterson, M. 2016. On the Performance of Key Pre-distribution for RPL-based IoT Networks. Interoperability, Safety and Security in IoT. Paris, France 26 - 27 Oct 2016 Springer. https://doi.org/10.1007/978-3-319-52727-7_9

Permalink - https://westminsterresearch.westminster.ac.uk/item/x0v0x/ai-powered-system-for-an-efficient-and-effective-cyber-incidents-detection-and-response-in-cloud-environments


Share this

Usage statistics

1 total views
2 total downloads
These values cover views and downloads from WestminsterResearch and are for the period from September 2nd 2018, when this repository was created.