Intelligent Fraud Detection in Cloud Computing Using AI-Enabled Machine Learning and Network Security Analytics

Authors

  • Oliver Patrick Whitfield Turner Senior Software Engineer, United Kingdom Author

DOI:

https://doi.org/10.15662/IJARCST.2024.0701804

Keywords:

Cloud security, fraud detection, machine learning, anomaly detection, intrusion detection systems (IDS), network telemetry, concept drift, explainable AI, adversarial robustness, federated learning

Abstract

Cloud computing platforms host a vast array of services and large-scale transactions, making them attractive targets for a spectrum of fraudulent activities — from account takeover and payment fraud to lateral movement and exfiltration. Traditional rule-based defenses and siloed network controls struggle to keep up with adversaries who exploit scale, automation, and new service models. This paper examines intelligent fraud detection at the intersection of machine learning (ML) and network security within cloud environments. We survey threat surfaces unique to clouds, characterize the data sources available (logs, network flows, API calls, telemetry), and review ML approaches — supervised, unsupervised, semi-supervised, and deep learning — that are applicable to cloud fraud detection. We present an end-to-end research methodology for building cloud-aware fraud detection systems, including data collection and labeling, feature engineering at multiple abstraction levels, model selection, concept-drift handling, online evaluation, interpretability, and deployment considerations (scalability, privacy, cost). Advantages (enhanced detection, automated adaptation) and disadvantages (data imbalance, adversarial evasion, privacy concerns, operational cost) are discussed. Results from representative experiments and literature benchmarks show that hybrid architectures combining network-level anomaly detection with transaction-level classification produce the best trade-offs between precision and recall in cloud settings. We conclude with recommendations and a prioritized agenda for future work: federated learning for multi-tenant privacy, adversarially robust models, and standardized evaluation benchmarks for cloud fraud.

References

1. Denning, D. E. (1987). An intrusion-detection model. IEEE Transactions on Software Engineering, SE-13(2), 222–232.

2. Jayaraman, S., Rajendran, S., & P, S. P. (2019). Fuzzy c-means clustering and elliptic curve cryptography using privacy preserving in cloud. International Journal of Business Intelligence and Data Mining, 15(3), 273-287.

3. Nagarajan, G. (2022). Advanced AI–Cloud Neural Network Systems with Intelligent Caching for Predictive Analytics and Risk Mitigation in Project Management. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 5(6), 7774-7781.

4. Anand, P. V., & Anand, L. (2023, December). An Enhanced Breast Cancer Diagnosis using RESNET50. In 2023 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES) (pp. 1-5). IEEE.

5. Kandula, N. (2023). Evaluating Social Media Platforms A Comprehensive Analysis of Their Influence on Travel Decision-Making. J Comp Sci Appl Inform Technol, 8(2), 1-9.

6. Adari, V. K. (2020). Intelligent Care at Scale AI-Powered Operations Transforming Hospital Efficiency. International Journal of Engineering & Extended Technologies Research (IJEETR), 2(3), 1240-1249.

7. Thangavelu, K., Sethuraman, S., & Hasenkhan, F. (2021). AI-Driven Network Security in Financial Markets: Ensuring 100% Uptime for Stock Exchange Transactions. American Journal of Autonomous Systems and Robotics Engineering, 1, 100-130.

8. Sudha, N., Kumar, S. S., Rengarajan, A., & Rao, K. B. (2021). Scrum Based Scaling Using Agile Method to Test Software Projects Using Artificial Neural Networks for Block Chain. Annals of the Romanian Society for Cell Biology, 25(4), 3711-3727.

9. Anuj Arora, “Analyzing Best Practices and Strategies for Encrypting Data at Rest (Stored) and Data in Transit (Transmitted) in Cloud Environments”, “INTERNATIONAL JOURNAL OF RESEARCH IN ELECTRONICS AND COMPUTER ENGINEERING”, VOL. 6 ISSUE 4 ( OCTOBER- DECEMBER 2018).

10. Panguluri, L. D., Mohammed, S. B., & Pichaimani, T. (2023). Synthetic Test Data Generation Using Generative AI in Healthcare Applications: Addressing Compliance and Security Challenges. Cybersecurity and Network Defense Research, 3(2), 280-319.

11. Das, D., Vijayaboopathy, V., & Rao, S. B. S. (2018). Causal Trace Miner: Root-Cause Analysis via Temporal Contrastive Learning. American Journal of Cognitive Computing and AI Systems, 2, 134-167.

12. Navandar, P. (2021). Developing advanced fraud prevention techniques using data analytics and ERP systems. International Journal of Science and Research (IJSR), 10(5), 1326–1329. https://dx.doi.org/10.21275/SR24418104835 https://www.researchgate.net/profile/Pavan-Navandar/publication/386507190_Developing_Advanced_Fraud_Prevention_Techniquesusing_Data_Analytics_and_ERP_Systems/links/675a0ecc138b414414d67c3c/Developing-Advanced-Fraud-Prevention-Techniquesusing-Data-Analytics-and-ERP-Systems.pdf

13. Kumar, R. K. (2023). AI‑integrated cloud‑native management model for security‑focused banking and network transformation projects. International Journal of Research Publications in Engineering, Technology and Management, 6(5), 9321–9329. https://doi.org/10.15662/IJRPETM.2023.0605006

14. Vasugi, T. (2022). AI-Enabled Cloud Architecture for Banking ERP Systems with Intelligent Data Storage and Automation using SAP. International Journal of Engineering & Extended Technologies Research (IJEETR), 4(1), 4319-4325.

15. Muthusamy, M. (2024). Cloud-Native AI metrics model for real-time banking project monitoring with integrated safety and SAP quality assurance. International Journal of Research and Applied Innovations (IJRAI), 7(1), 10135–10144. https://doi.org/10.15662/IJRAI.2024.0701005

Downloads

Published

2024-05-22

How to Cite

Intelligent Fraud Detection in Cloud Computing Using AI-Enabled Machine Learning and Network Security Analytics. (2024). International Journal of Advanced Research in Computer Science & Technology(IJARCST), 7(Special Issue 1), 26-33. https://doi.org/10.15662/IJARCST.2024.0701804