A Machine Learning Approach to Intrusion Detection in Multi-Cloud Environments: Enhancing Cybersecurity
Keywords:
Intrusion Detection, Multi-Cloud Security, Machine Learning, Anomaly Detection, CybersecurityAbstract
Cybersecurity concerns have grown in tandem with the use of multi-cloud environments, which enterprises are using to improve scalability and flexibility. As a result, organizations must have strong intrusion detection systems to protect themselves. This paper introduces a method for intrusion detection that uses machine learning and is specifically built for multi-cloud architectures. Its purpose is to detect and react to suspicious behaviors that occur across different cloud platforms that are connected. In order to identify cyber dangers and illegal access in real time, the suggested model examines massive volumes of data from cloud traffic using techniques including ensemble approaches, supervised learning, and anomaly detection. When tested in a multi-cloud environment, our machine learning strategy demonstrated to be more accurate, faster to respond, and more adaptable than conventional intrusion detection methods. enhances cybersecurity in multi-cloud settings by providing a solution that can grow with changing threat landscapes and proactively protects against new cyber threats.
Downloads
References
• Sowmith Daram, Dr. Shakeb Khan, & Er. Om Goel. (2024). Network Functions in Cloud: Kubernetes Deployment Challenges. Global International Research Thoughts, 12(2), 34–46. https://doi.org/10.36676/girt.v12.i2.118
• Tangudu, A., Jain, S., & Aggarwal, A. (2024). Best Practices for Ensuring Salesforce Application Security and Compliance. Journal of Quantum Science and Technology, 1(2), 88–101. https://doi.org/10.36676/jqst.v1.i2.18
• Sachin Bhatt. (2024). Best Practices for Designing Scalable REST APIs in Cloud Environments. Journal of Sustainable Solutions, 1(4), 48–71. https://doi.org/10.36676/j.sust.sol.v1.i4.26
• Charu Jain. (2024). Survey of Cloud Computing Security and Privacy Issues. Darpan International Research Analysis, 12(3), 160–171. https://doi.org/10.36676/dira.v12.i3.63
Downloads
Published
Issue
Section
License
Copyright (c) 2024 International Journal of Artificial Intelligence, Computer Science, Management and Technology

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.