ASSESSING THE POTENTIAL OF USING ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING MODELS TO ENSURE THE SECURITY OF CLOUD ENVIRONMENTS AND AUTOMATED MANAGEMENT SYSTEMS FOR CONTAINERIZED APPLICATIONS
DOI:
https://doi.org/10.28925/2663-4023.2025.29.821Keywords:
artificial intelligence, machine learning, cloud security, anomaly detection, Kubernetes, DevSecOpsAbstract
Cloud computing and containerized environments have become foundational components of modern IT infrastructure, offering scalability and agility. However, their dynamic nature introduces significant security challenges, including anomalies in traffic, DDoS attacks, hidden crypto mining (cryptojacking), and credential compromise. Traditional signature-based security mechanisms often fail to address these rapidly evolving threats effectively. The objective of this study is to assess the potential of artificial intelligence (AI) and machine learning (ML) in enhancing cloud and container security. Specifically, it explores the effectiveness of AI/ML models for anomaly detection, threat classification, cryptojacking, and DDoS identification, deception-based defenses, and false positive reduction. The methodology involves a structured literature review of key scientific publications from 2023 to 2025. Comparative analysis is conducted on experimental solutions, including hybrid models (XGBoost, CNN, LSTM) in intrusion detection systems; eBPF-based syscalls tracing for container behavior profiling; ML classifiers for vulnerability prioritization in DevSecOps; and active defense platforms combining honeypots and adaptive monitoring loops (MAPE-K). Findings indicate that AI-powered security systems achieve detection accuracies above 99%, reduce false positive rates to around 2%, and enable real-time responsiveness without degrading system performance. Notably, systems that integrate multiple models and utilize low-level data (e.g., syscalls, network patterns) exhibit superior threat identification and resilience. In conclusion, integrating AI into cloud security architectures is essential for ensuring continuous and proactive defense in dynamic infrastructures. The paper also outlines future research challenges, such as the need for explainable AI (XAI), limited availability of high-quality training datasets, and vulnerability to adversarial inputs. The insights are relevant for cybersecurity researchers and practitioners seeking to deploy intelligent defense mechanisms in cloud-native ecosystems.
Downloads
References
Skorynovych, B.V., Lakh, Y.V. (2025). ANALYSIS OF METHODS FOR MONITORING SECURITY STATUS IN A CLOUD ENVIRONMENT. Modern Information Security, 61(1). https://doi.org/10.31673/2409-7292.2025.012256
Raju, S., & Nadella, D. (2024). Enhancing Cloud Vulnerability Management Using Machine Learning: Advancing Data Privacy and Security in Modern Cloud Environments. International Journal of Computer Trends and Technology, 72(9), 137–142. https://doi.org/10.14445/22312803/ijctt-v72i9p121
Chukwuemeka Nwachukwu, Kehinde Durodola-Tunde & Chukwuebuka Akwiwu-Uzoma. (2024). AI-driven anomaly detection in cloud computing environments. International Journal of Science and Research Archive, 13(2), 692–710. https://doi.org/10.30574/ijsra.2024.13.2.2184
Aly, A., Hamad, A. M., Al-Qutt, M., & Fayez, M. (2025). Real-time multi-class threat detection and adaptive deception in Kubernetes environments. Scientific Reports, 15(1). https://doi.org/10.1038/s41598-025-91606-8
Pasupathi, S., Kumar, R., & Pavithra, L. K. (2025). Proactive DDoS detection: integrating packet marking, traffic analysis, and machine learning for enhanced network security. Cluster Computing, 28(3). https://doi.org/10.1007/s10586-024-04849-x
Kim, R., Ryu, J., Kim, S., Lee, S., & Kim, S. (2025). Detecting cryptojacking containers using eBPF-based security runtime and machine learning. Electronics, 14(6), 1208. https://doi.org/10.3390/electronics14061208
Alzoubi, Y. I., Mishra, A., & Topcu, A. E. (2024). Research trends in deep learning and machine learning for cloud computing security. Artificial Intelligence Review, 57(5). https://doi.org/10.1007/s10462-024-10776-5
Kulyk Y.A., Lakh, Y.V. (2025). SECURITY ANALYSIS OF KUBERNETES NETWORK PLUGINS. Modern Information Security, 61(1). https://doi.org/10.31673/2409-7292.2025.015886
Fu, M., Pasuksmit, J., & Tantithamthavorn, C. (2025). AI for DevSecOps: A Landscape and Future Opportunities. ACM Transactions on Software Engineering and Methodology. https://doi.org/10.1145/3712190
Sajid, M., Malik, K. R., Almogren, A., Malik, T. S., Khan, A. H., Tanveer, J., & Rehman, A. U. (2024). Enhancing intrusion detection: a hybrid machine and deep learning approach. Journal of Cloud Computing, 13(1). https://doi.org/10.1186/s13677-024-00685-x
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Богдан Скоринович, Юрій Кулик, Юрій Лах

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.