Dalarna University's logo and link to the university's website

du.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • chicago-author-date
  • chicago-note-bibliography
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
AI-Driven Security Monitoring: Perspective on Enhancing Threat Detection and Response in Cloud Environment
Dalarna University, School of Information and Engineering.
Dalarna University, School of Information and Engineering.
2025 (English)Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
Abstract [en]

Cloud computing currently powers a substantial portion of corporate IT. Because cloud services are distributed across multiple locations, attackers have additional opportunities to break in. As a result, several businesses are experimenting with AI-powered security monitoring, in which machine leaming leams normal activity and alerts to anything unusual. This thesis investigates the research question: How do cloud Security experts view the use of AI for spotting unusual behavior in reducing false alarms and improving reaction times, compared to signature-based methods. 

To respond, we used two ways. First, we analyzed previous research to determine what is already known and where gaps exist. Second, we conducted three semi-structured video interviews with Swedish cloud security professionals who have six, ten, and fifteen years of expertise. We classified their answers and compared them to literature. Firewalls, intrusion detection systems, and traditional SIEM all prevent known assaults, but they fail to identify zero-day vulnerabilities and overwhelm analysts with low-value wamings. AI analytics can quickly detect and respond to sluggish, quiet threats by combining logs from multiple sources. However, models must explain their cautions, avoid data poisoning, and remain under human supervision. We conclude that the most secure strategy is hybrid architecture. Maintain traditional controls for common hazards and incorporate explainable AI for anomalous behavior, with frequent retraining and professional monitoring. While the technical capabilities of AI are central, their real value ultimately depends on how security analysts, administrators and end-users interpret and act on the system's output. Understanding this human perspective is therefore as critical as measuring raw detection accuracy. 

Place, publisher, year, edition, pages
2025.
Keywords [en]
Al-driven Security Monitoring, Cloud Security, Traditional Security Approaches, Machine Leaming in Cloud Security, Artificial intelligence.
National Category
Computer Sciences Computer Systems
Identifiers
URN: urn:nbn:se:du-50750OAI: oai:DiVA.org:du-50750DiVA, id: diva2:1974408
Subject / course
Microdata Analysis
Available from: 2025-06-23 Created: 2025-06-23 Last updated: 2025-10-09

Open Access in DiVA

No full text in DiVA

By organisation
School of Information and Engineering
Computer SciencesComputer Systems

Search outside of DiVA

GoogleGoogle Scholar

urn-nbn

Altmetric score

urn-nbn
Total: 132 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • chicago-author-date
  • chicago-note-bibliography
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf