AI-Driven Infrastructure Protection Framework for Resilient Enterprise Networks


Authors : Isaac Kwame Antwi; Eric Akwei; Olanrewaju Ogundojutimi; Nicholas Donkor

Volume/Issue : Volume 10 - 2025, Issue 5 - May


Google Scholar : https://tinyurl.com/5fyzw268

DOI : https://doi.org/10.38124/ijisrt/25may2294

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.


Abstract : This paper presents an AI-driven infrastructure protection framework to enhance the resilience of enterprise networks. It integrates machine learning, threat intelligence, and cloud-native orchestration to detect threats, profile behaviors, and automate responses. The architecture ingests network logs and telemetry, applies anomaly detection and risk scoring, and correlates results with threat intelligence for real-time policy enforcement. Evaluation using CICIDS 2017 & 2020 datasets shows the framework outperforms traditional intrusion detection systems in accuracy and responsiveness. LSTM and Random Forest models achieved the best results, confirmed through ROC and confusion matrix analysis. Feature importance insights and a dynamic risk scoring engine support scalable and context-aware decision-making. This work demonstrates the effectiveness of combining AI with cloud-native defense for proactive, intelligent cybersecurity. Future extensions will explore explainable AI, federated learning, and adversarial robustness.

Keywords : AI-Driven Cybersecurity, Enterprise Network Protection, Anomaly Detection, Threat Intelligence Correlation, Cloud- Native Defense.

References :

  1. Rehman, M. H. U., Khan, F. A., Anwar, F., & Awan, I. (2022). Machine learning for cybersecurity: A comprehensive survey. IEEE Access.
  2. Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cybersecurity intrusion detection. IEEE Communications Surveys & Tutorials.
  3. Zhou, Y., Cheng, S., & Chen, H. (2021). Zero Trust Cloud Security with Federated Learning. ACM Transactions on Internet Technology.
  4. Alazab, M., Shalaginov, A., & Awad, A. I. (2023). AI and Deep Learning for Insider Threat Detection in Cloud Systems. Computers & Security.
  5. National Institute of Standards and Technology. (2023). Special Publication 800-207 Rev. 1: Zero Trust Architecture.
  6. Barnum, S. (2012). Standardizing cyber threat intelligence information with STIX. MITRE.
  7. Wagner, C., Dulaunoy, A., Iklody, A., & Wagener, G. (2016). MISP: The design and implementation of a collaborative threat intelligence sharing platform. arXiv preprint arXiv:1609.05838.
  8. Spinola, J., & Montesi, F. (2021). Toward a Zero Trust Architecture for Cloud-Native Applications. Journal of Cloud Computing.
  9. Gartner. (2022). Market Guide for Cloud-Native Application Protection Platforms (CNAPP).
  10. Hussain, F., Hussain, R., Hassan, S. A., & Hossain, E. (2021). Machine learning in IoT security: current solutions and future challenges. IEEE Communications Surveys & Tutorials.
  11. Sarker, I. H., Kayes, A. S. M., & Watters, P. A. (2022). Cybersecurity data science: An overview from machine learning perspective. Journal of Big Data.
  12. Shapira, B., Rokach, L., & Tsur, H. (2021). Unsupervised anomaly detection using autoencoders with interpretable latent space. Computers & Security.
  13. Ahmed, M., Mahmood, A. N., & Hu, J. (2020). A survey of network anomaly detection techniques. Journal of Network and Computer Applications.

This paper presents an AI-driven infrastructure protection framework to enhance the resilience of enterprise networks. It integrates machine learning, threat intelligence, and cloud-native orchestration to detect threats, profile behaviors, and automate responses. The architecture ingests network logs and telemetry, applies anomaly detection and risk scoring, and correlates results with threat intelligence for real-time policy enforcement. Evaluation using CICIDS 2017 & 2020 datasets shows the framework outperforms traditional intrusion detection systems in accuracy and responsiveness. LSTM and Random Forest models achieved the best results, confirmed through ROC and confusion matrix analysis. Feature importance insights and a dynamic risk scoring engine support scalable and context-aware decision-making. This work demonstrates the effectiveness of combining AI with cloud-native defense for proactive, intelligent cybersecurity. Future extensions will explore explainable AI, federated learning, and adversarial robustness.

Keywords : AI-Driven Cybersecurity, Enterprise Network Protection, Anomaly Detection, Threat Intelligence Correlation, Cloud- Native Defense.

CALL FOR PAPERS


Paper Submission Last Date
31 - July - 2025

Video Explanation for Published paper

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe