Harnessing AI-Driven Server Architectures to Enhance Cybersecurity in U.S. Web Applications

Authors

  • Arun Kumar Nagula

Keywords:

AI, Server Architectures, Cybersecurity, U.S. Web Applications.

Abstract

The increasing prevalence of advanced cyber-attacks targeting web applications in the U S requires a new approach to server architecture design and security management. The paper examines the application of AI-enhanced server architectures as a pro-active and dynamic response for US-based web applications’ security challenges. With implementation of machine learning-based algorithms, the anomaly detection, and smart threat response mechanisms, the AI-driven server solutions help in identifying, predicting, and managing security threats in real time. The methodology is hybrid, combining architecture analysis, case studies analysis, and performance measurements to evaluate the impact of AI on threat prevention, the time of detecting (detection latency) and the accuracy of the response to the incident. Experimental results against a variety of attacks on standard test web environments show a significantly lower number of false positives, as well as better resilience and recovery capacity. This paper adds to the emerging knowledge on intelligent cybersecurity infrastructure and is a scalable, artificial intelligence (AI)-centered reference for developers, and security architects working in high-risks digital ecosystems. As more organizations increasingly turn toward modern web architecture, the results have implications for federal compliance, zero trust deployment and the future of cybersecurity in a rapidly changing application environment.

Downloads

Download data is not yet available.

References

D. Gümüşbaş, T. Yıldırım, A. Genovese, and F. Scotti, “A Comprehensive Survey of Databases and Deep Learning Methods for Cybersecurity and Intrusion Detection Systems,” IEEE Systems Journal, vol. 15, no. 2, pp. 1717–1731, Jun. 2021, doi: 10.1109/JSYST.2020.2992966.

S. Zeadally, E. Adi, Z. Baig, and I. A. Khan, “Harnessing Artificial Intelligence Capabilities to Improve Cybersecurity,” IEEE Access, vol. 8, pp. 23817–23837, 2020, doi: 10.1109/ACCESS.2020.2968045.

S. M. Mathews, “Explainable Artificial Intelligence Applications in NLP, Biomedical, and Malware Classification: A Literature Review,” in Intelligent Computing, Cham, 2019, pp. 1269–1292. doi: 10.1007/978-3-030-22868-2_90.

M. Ma, L. Han, and C. Zhou, “Research and application of artificial intelligence based webshell detection model: A literature review,” arXiv preprint arXiv:2405.00066, 2024.arxiv.org

Z. Zhang, H. Al Hamadi, E. Damiani, C. Y. Yeun, and F. Taher, “Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research,” arXiv preprint arXiv:2208.14937, 2022.arxiv.org

G. Srivastava et al., “XAI for Cybersecurity: State of the Art, Challenges, Open Issues and Future Directions,” arXiv preprint arXiv:2206.03585, 2022.arxiv.org

V. Babaey and A. Ravindran, “GenXSS: an AI-Driven Framework for Automated Detection of XSS Attacks in WAFs,”

J. Rundle, “The AI Effect: Amazon Sees Nearly 1 Billion Cyber Threats a Day,” The Wall Street Journal, Nov. 21, 2024. [Online]. Available: https://www.wsj.com/articles/the-ai-effect-amazon-sees-nearly-1-billion-cyber-threats-a-day-15434eddwsj.com

Zambrano, P.; Torres, J.; Tello-Oquendo, L.; Yánez, Á.; Velásquez, L. On the modeling of cyber-attacks associated with social engineering: A parental control prototype. J. Inf. Secur. Appl. 2023, 75, 103501.

Thomas, K.; Li, F.; Zand, A.; Barrett, J.; Ranieri, J.; Invernizzi, L.; Markov, Y.; Comanescu, O.; Eranti, V.; Moscicki, A.; et al. Data breaches, phishing, or malware? Understanding the risks of stolen credentials. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, USA, 30 October–3 November 2017; pp. 1421–1434.

Aldawood, H.; Skinner, G. Educating and raising awareness on cyber security social engineering: A literature review. In Proceedings of the 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE), Wollongong, NSW, Australia, 4–7 December 2018; pp. 62–68.

Pethers, B.; Bello, A. Role of attention and design cues for influencing cyber-sextortion using social engineering and phishing attacks. Future Internet 2023, 15, 29.

Khan, N.F.; Ikram, N.; Murtaza, H.; Asadi, M.A. Social media users and cybersecurity awareness: Predicting self-disclosure using a hybrid artificial intelligence approach. Kybernetes 2023, 52, 401–421.

Edwards, L.; Zahid Iqbal, M.; Hassan, M. A multi-layered security model to counter social engineering attacks: A learning-based approach. Int. Cybersecur. Law Rev. 2024, 5, 313–336.

Aun, Y.; Gan, M.L.; Wahab, N.; Guan, G.H. Social engineering attack classifications on social media using deep learning. Comput. Mater. Contin 2023, 74, 4917–4931.

Downloads

Published

30.12.2024

How to Cite

Arun Kumar Nagula. (2024). Harnessing AI-Driven Server Architectures to Enhance Cybersecurity in U.S. Web Applications. International Journal of Intelligent Systems and Applications in Engineering, 12(23s), 3687 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/7840

Issue

Section

Research Article