Volume 9, Issue 4, April – 2024 | Priyanka Neelakrishnan
The paper "AI-Driven Proactive Cloud Application Data Access Security" by Priyanka Neelakrishnan addresses the growing security challenges in cloud applications, particularly in the context of remote work. Traditional security measures struggle to keep up with the increasing volume of cloud applications and user activities, leading to potential threats. The proposed system leverages user activity tracking, Identity Provider (IdP) information, Natural Language Processing (NLP), and Machine Learning (ML) algorithms to build user baselines and detect deviations in real-time. This proactive approach aims to prevent data breaches and enhance visibility and control over cloud applications.
The system's architecture is divided into four planes: Activity Feeder, Aggregator, Analytics Engine, and Action Driver. Each plane scales horizontally and vertically to handle varying loads, ensuring efficient performance. The Activity Feeder plane collects and processes user, device, application, and log data. The Aggregator plane maps user and entity relationships, creating a comprehensive user graph. The Analytics Engine plane uses ML models to analyze user behavior, generate risk scores, and provide policy recommendations. The Action Driver plane implements real-time actions, such as adjusting permissions and sending notifications.
The system's effectiveness is demonstrated through various use cases, including potential attacker identification, privilege misuse, data exfiltration, and sensitive data breaches. The implementation uses Java, machine learning models, large language models, and NLP, ensuring robust and accurate detection. The system's key outcomes include detailed user activity tables, peer comparison graphs, and risk score trends, providing administrators with valuable insights for proactive security measures.
In conclusion, the proposed system offers a comprehensive and proactive approach to cloud data security, combining advanced technologies with real-time monitoring and response mechanisms. This integrated strategy helps organizations fortify their defenses against emerging threats and mitigate risks associated with sensitive data access and exfiltration.The paper "AI-Driven Proactive Cloud Application Data Access Security" by Priyanka Neelakrishnan addresses the growing security challenges in cloud applications, particularly in the context of remote work. Traditional security measures struggle to keep up with the increasing volume of cloud applications and user activities, leading to potential threats. The proposed system leverages user activity tracking, Identity Provider (IdP) information, Natural Language Processing (NLP), and Machine Learning (ML) algorithms to build user baselines and detect deviations in real-time. This proactive approach aims to prevent data breaches and enhance visibility and control over cloud applications.
The system's architecture is divided into four planes: Activity Feeder, Aggregator, Analytics Engine, and Action Driver. Each plane scales horizontally and vertically to handle varying loads, ensuring efficient performance. The Activity Feeder plane collects and processes user, device, application, and log data. The Aggregator plane maps user and entity relationships, creating a comprehensive user graph. The Analytics Engine plane uses ML models to analyze user behavior, generate risk scores, and provide policy recommendations. The Action Driver plane implements real-time actions, such as adjusting permissions and sending notifications.
The system's effectiveness is demonstrated through various use cases, including potential attacker identification, privilege misuse, data exfiltration, and sensitive data breaches. The implementation uses Java, machine learning models, large language models, and NLP, ensuring robust and accurate detection. The system's key outcomes include detailed user activity tables, peer comparison graphs, and risk score trends, providing administrators with valuable insights for proactive security measures.
In conclusion, the proposed system offers a comprehensive and proactive approach to cloud data security, combining advanced technologies with real-time monitoring and response mechanisms. This integrated strategy helps organizations fortify their defenses against emerging threats and mitigate risks associated with sensitive data access and exfiltration.