Automated Real-Time Cybersecurity Framework for Oracle ERP Cloud Ecosystems with Integrated Electric Axle Testing and Data Governance
DOI:
https://doi.org/10.15662/IJARCST.2024.0702004Keywords:
Cybersecurity, Oracle ERP Cloud, Real-time analytics, Electric axle testing, Data governance, Automated threat detection, Cloud security, Industrial IoT, Machine learning, Compliance management, Adaptive analytics, Secure ERP integrationAbstract
The increasing complexity of Oracle ERP Cloud ecosystems necessitates robust, intelligent cybersecurity solutions capable of real-time threat mitigation and data governance. This paper introduces an Automated Real-Time Cybersecurity Framework designed specifically for Oracle ERP Cloud environments, integrating electric axle testing systems and advanced data governance mechanisms. The framework employs adaptive analytics, machine learning, and automated policy enforcement to monitor ERP transactions, detect anomalies, and ensure compliance across interconnected industrial and business processes. By incorporating electric axle testing data into the ERP security model, the system enhances operational visibility and secures critical IoT-linked manufacturing components. Additionally, the framework’s data governance layer ensures data accuracy, lineage, and regulatory adherence across distributed cloud nodes. Experimental implementation demonstrates improved cyber resilience, optimized testing automation, and secure integration between industrial IoT data and enterprise ERP operations.
References
1. Bakumenko, A., & Aivazian, V. (2022). Detecting anomalies in financial data using machine learning. Systems, 10(5), 130.
2. Nallamothu, T. K. (2023). Enhance Cross-Device Experiences Using Smart Connect Ecosystem. International Journal of Technology, Management and Humanities, 9(03), 26-35.
3. Adari, V. K., Chunduru, V. K., Gonepally, S., Amuda, K. K., & Kumbum, P. K. (2020). Explain ability and interpretability in machine learning models. Journal of Computer Science Applications and Information Technology, 5(1), 1-7.
4. M.Sabin Begum, R.Sugumar, "Conditional Entropy with Swarm Optimization Approach for Privacy Preservation of Datasets in Cloud", Indian Journal of Science and Technology, Vol.9, Issue 28, July 2016
5. Forrester Research. (2021). The state of zero trust adoption. Forrester Research.
6. Grabski, S. V., Leech, S. A., & Schmidt, P. J. (2011). A review of ERP research: a future agenda for accounting information systems. Journal of Information Systems, 25(1), 37–78.
7. ISACA. (2021). ERP security and controls (ISACA Professional Practices Paper).
8. Adari, Vijay Kumar, “Interoperability and Data Modernization: Building a Connected Banking Ecosystem,” International Journal of Computer Engineering and Technology (IJCET), vol. 15, no. 6, pp.653-662, Nov-Dec 2024. DOI:https://doi.org/10.5281/zenodo.14219429.
9. NIST. (2020). Rose, S., Borchert, O., Mitchell, S., & Connelly, S. Zero Trust Architecture (NIST Special Publication 800-207). National Institute of Standards and Technology.
10. Oracle Corporation. (2019). Secure critical data with Oracle Data Safe (White paper / technical report).
11. Shaffi, S. M. (2022). Enterprise Content Management and Data Governance Policies and Procedures Manual. International Journal of Science and Research (IJSR), 11(8), 1570–1576. https://doi.org/10.21275/sr220811091304.
12. Oracle Corporation. (2023). Cybersecurity guidance and best practices for Oracle Cloud (Oracle white paper).
13. Peng, G., Xiao, X., Li, D., et al. (2018). SAQL: A stream-based query system for real-time abnormal system behavior detection. arXiv preprint.
14. Sugumar R., et.al IMPROVED PARTICLE SWARM OPTIMIZATION WITH DEEP LEARNING-BASED MUNICIPAL SOLID WASTE MANAGEMENT IN SMART CITIES, Revista de Gestao Social e Ambiental, V-17, I-4, 2023.
15. SANS Institute. (2019). ERP security: Understanding and mitigating risks (white paper).
16. Subramanian, G. H. (2017). Cloud ERP implementation and the impact of cloud computing on ERP. International Journal of Enterprise Information Systems, 13(4), 21–34.
17. Vaidya, S., & Seetharaman, P. (2020). Artificial intelligence applications in ERP systems. Information Systems Frontiers, 22(2), 475–491.
18. Gandhi, S. T. (2023). RAG-Driven Cybersecurity Intelligence: Leveraging Semantic Search for Improved Threat Detection. International Journal of Research and Applied Innovations, 6(3), 8889-8897.
19. Wang, X., & Zhang, Y. (2022). Real-time fraud detection in financial systems: Techniques and systems. Journal of Financial Crime, 29(3), 874–896.
20. Adari, V. K., Chunduru, V. K., Gonepally, S., Amuda, K. K., & Kumbum, P. K. (2023). Ethical analysis and decision-making framework for marketing communications: A weighted product model approach. Data Analytics and Artificial Intelligence, 3(5), 44–53. https://doi.org/10.46632/daai/3/5/7
21. Yu, J., Kim, M., Oh, H., & Yang, J. (2021). Real-time abnormal insider event detection on enterprise resource planning systems via predictive auto-regression model. IEEE Access, 9, 62276–62284.
22. Pimpale, S. (2022). Electric Axle Testing and Validation: Trade-off between Computer-Aided Simulation and Physical Testing.
23. Zwilling, M., Lesjak, D., & Kovačič, A. (2020). Cyber security threats and vulnerabilities in ERP systems. Procedia Computer Science, 176, 2242–2250.
24. Arulraj AM, Sugumar, R., Estimating social distance in public places for COVID-19 protocol using region CNN, Indonesian Journal of Electrical Engineering and Computer Science, 30(1), pp.414-424, April 2023.
25. Komarina, G. B. (2024). Transforming Enterprise Decision-Making Through SAP S/4HANA Embedded Analytics Capabilities. Journal ID, 9471, 1297.
26. Karvannan, R. (2023). Real‑Time Prescription Management System Intake & Billing System. International Journal of Humanities and Information Technology, 5(02), 34-43.
27. Layer Seven Securities. (2019). ERP security survey results: Vulnerabilities and exposure statistics.


