Harnessing AI-Driven Server Architectures to Enhance Cybersecurity in U.S. Web Applications
Keywords:
AI, Server Architectures, Cybersecurity, U.S. Web Applications.Abstract
The increasing prevalence of advanced cyber-attacks targeting web applications in the U S requires a new approach to server architecture design and security management. The paper examines the application of AI-enhanced server architectures as a pro-active and dynamic response for US-based web applications’ security challenges. With implementation of machine learning-based algorithms, the anomaly detection, and smart threat response mechanisms, the AI-driven server solutions help in identifying, predicting, and managing security threats in real time. The methodology is hybrid, combining architecture analysis, case studies analysis, and performance measurements to evaluate the impact of AI on threat prevention, the time of detecting (detection latency) and the accuracy of the response to the incident. Experimental results against a variety of attacks on standard test web environments show a significantly lower number of false positives, as well as better resilience and recovery capacity. This paper adds to the emerging knowledge on intelligent cybersecurity infrastructure and is a scalable, artificial intelligence (AI)-centered reference for developers, and security architects working in high-risks digital ecosystems. As more organizations increasingly turn toward modern web architecture, the results have implications for federal compliance, zero trust deployment and the future of cybersecurity in a rapidly changing application environment.
Downloads
References
D. Gümüşbaş, T. Yıldırım, A. Genovese, and F. Scotti, “A Comprehensive Survey of Databases and Deep Learning Methods for Cybersecurity and Intrusion Detection Systems,” IEEE Systems Journal, vol. 15, no. 2, pp. 1717–1731, Jun. 2021, doi: 10.1109/JSYST.2020.2992966.
S. Zeadally, E. Adi, Z. Baig, and I. A. Khan, “Harnessing Artificial Intelligence Capabilities to Improve Cybersecurity,” IEEE Access, vol. 8, pp. 23817–23837, 2020, doi: 10.1109/ACCESS.2020.2968045.
S. M. Mathews, “Explainable Artificial Intelligence Applications in NLP, Biomedical, and Malware Classification: A Literature Review,” in Intelligent Computing, Cham, 2019, pp. 1269–1292. doi: 10.1007/978-3-030-22868-2_90.
M. Ma, L. Han, and C. Zhou, “Research and application of artificial intelligence based webshell detection model: A literature review,” arXiv preprint arXiv:2405.00066, 2024.arxiv.org
Z. Zhang, H. Al Hamadi, E. Damiani, C. Y. Yeun, and F. Taher, “Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research,” arXiv preprint arXiv:2208.14937, 2022.arxiv.org
G. Srivastava et al., “XAI for Cybersecurity: State of the Art, Challenges, Open Issues and Future Directions,” arXiv preprint arXiv:2206.03585, 2022.arxiv.org
V. Babaey and A. Ravindran, “GenXSS: an AI-Driven Framework for Automated Detection of XSS Attacks in WAFs,”
J. Rundle, “The AI Effect: Amazon Sees Nearly 1 Billion Cyber Threats a Day,” The Wall Street Journal, Nov. 21, 2024. [Online]. Available: https://www.wsj.com/articles/the-ai-effect-amazon-sees-nearly-1-billion-cyber-threats-a-day-15434eddwsj.com
Zambrano, P.; Torres, J.; Tello-Oquendo, L.; Yánez, Á.; Velásquez, L. On the modeling of cyber-attacks associated with social engineering: A parental control prototype. J. Inf. Secur. Appl. 2023, 75, 103501.
Thomas, K.; Li, F.; Zand, A.; Barrett, J.; Ranieri, J.; Invernizzi, L.; Markov, Y.; Comanescu, O.; Eranti, V.; Moscicki, A.; et al. Data breaches, phishing, or malware? Understanding the risks of stolen credentials. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, USA, 30 October–3 November 2017; pp. 1421–1434.
Aldawood, H.; Skinner, G. Educating and raising awareness on cyber security social engineering: A literature review. In Proceedings of the 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE), Wollongong, NSW, Australia, 4–7 December 2018; pp. 62–68.
Pethers, B.; Bello, A. Role of attention and design cues for influencing cyber-sextortion using social engineering and phishing attacks. Future Internet 2023, 15, 29.
Khan, N.F.; Ikram, N.; Murtaza, H.; Asadi, M.A. Social media users and cybersecurity awareness: Predicting self-disclosure using a hybrid artificial intelligence approach. Kybernetes 2023, 52, 401–421.
Edwards, L.; Zahid Iqbal, M.; Hassan, M. A multi-layered security model to counter social engineering attacks: A learning-based approach. Int. Cybersecur. Law Rev. 2024, 5, 313–336.
Aun, Y.; Gan, M.L.; Wahab, N.; Guan, G.H. Social engineering attack classifications on social media using deep learning. Comput. Mater. Contin 2023, 74, 4917–4931.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.