Authors :
Isaac Kwame Antwi; Eric Akwei; Olanrewaju Ogundojutimi; Nicholas Donkor
Volume/Issue :
Volume 10 - 2025, Issue 5 - May
Google Scholar :
https://tinyurl.com/5fyzw268
DOI :
https://doi.org/10.38124/ijisrt/25may2294
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
This paper presents an AI-driven infrastructure protection framework to enhance the resilience of enterprise
networks. It integrates machine learning, threat intelligence, and cloud-native orchestration to detect threats, profile
behaviors, and automate responses. The architecture ingests network logs and telemetry, applies anomaly detection and risk
scoring, and correlates results with threat intelligence for real-time policy enforcement. Evaluation using CICIDS 2017 &
2020 datasets shows the framework outperforms traditional intrusion detection systems in accuracy and responsiveness.
LSTM and Random Forest models achieved the best results, confirmed through ROC and confusion matrix analysis. Feature
importance insights and a dynamic risk scoring engine support scalable and context-aware decision-making. This work
demonstrates the effectiveness of combining AI with cloud-native defense for proactive, intelligent cybersecurity. Future
extensions will explore explainable AI, federated learning, and adversarial robustness.
Keywords :
AI-Driven Cybersecurity, Enterprise Network Protection, Anomaly Detection, Threat Intelligence Correlation, Cloud- Native Defense.
References :
- Rehman, M. H. U., Khan, F. A., Anwar, F., & Awan, I. (2022). Machine learning for cybersecurity: A comprehensive survey. IEEE Access.
- Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cybersecurity intrusion detection. IEEE Communications Surveys & Tutorials.
- Zhou, Y., Cheng, S., & Chen, H. (2021). Zero Trust Cloud Security with Federated Learning. ACM Transactions on Internet Technology.
- Alazab, M., Shalaginov, A., & Awad, A. I. (2023). AI and Deep Learning for Insider Threat Detection in Cloud Systems. Computers & Security.
- National Institute of Standards and Technology. (2023). Special Publication 800-207 Rev. 1: Zero Trust Architecture.
- Barnum, S. (2012). Standardizing cyber threat intelligence information with STIX. MITRE.
- Wagner, C., Dulaunoy, A., Iklody, A., & Wagener, G. (2016). MISP: The design and implementation of a collaborative threat intelligence sharing platform. arXiv preprint arXiv:1609.05838.
- Spinola, J., & Montesi, F. (2021). Toward a Zero Trust Architecture for Cloud-Native Applications. Journal of Cloud Computing.
- Gartner. (2022). Market Guide for Cloud-Native Application Protection Platforms (CNAPP).
- Hussain, F., Hussain, R., Hassan, S. A., & Hossain, E. (2021). Machine learning in IoT security: current solutions and future challenges. IEEE Communications Surveys & Tutorials.
- Sarker, I. H., Kayes, A. S. M., & Watters, P. A. (2022). Cybersecurity data science: An overview from machine learning perspective. Journal of Big Data.
- Shapira, B., Rokach, L., & Tsur, H. (2021). Unsupervised anomaly detection using autoencoders with interpretable latent space. Computers & Security.
- Ahmed, M., Mahmood, A. N., & Hu, J. (2020). A survey of network anomaly detection techniques. Journal of Network and Computer Applications.
This paper presents an AI-driven infrastructure protection framework to enhance the resilience of enterprise
networks. It integrates machine learning, threat intelligence, and cloud-native orchestration to detect threats, profile
behaviors, and automate responses. The architecture ingests network logs and telemetry, applies anomaly detection and risk
scoring, and correlates results with threat intelligence for real-time policy enforcement. Evaluation using CICIDS 2017 &
2020 datasets shows the framework outperforms traditional intrusion detection systems in accuracy and responsiveness.
LSTM and Random Forest models achieved the best results, confirmed through ROC and confusion matrix analysis. Feature
importance insights and a dynamic risk scoring engine support scalable and context-aware decision-making. This work
demonstrates the effectiveness of combining AI with cloud-native defense for proactive, intelligent cybersecurity. Future
extensions will explore explainable AI, federated learning, and adversarial robustness.
Keywords :
AI-Driven Cybersecurity, Enterprise Network Protection, Anomaly Detection, Threat Intelligence Correlation, Cloud- Native Defense.