Anomaly Detection and Automated Mitigation for Microservices Security with AI

Authors

  • Vijay Ramamoorthi Independent Researcher

Keywords:

Microservices security, AI-driven security, intrusion detection, anomaly detection, unsupervised learning, reinforcement learning, firewall automation, automated mitigation

Abstract

Microservices are becoming increasingly fundamental to modern scalable applications, yet their distributed nature makes them susceptible to complex cyber-attacks. Traditional security solutions, especially static, rule-based systems, fail to keep up with the dynamic threats presented by these architectures. This paper proposes an AI-based framework for real-time intrusion detection and automated mitigation within microservices. By leveraging unsupervised learning for anomaly detection and reinforcement learning for dynamic firewall adjustments and service isolation, the framework adapts to evolving threats autonomously. Experimental evaluations demonstrate that AI-driven security solutions can significantly enhance detection accuracy, reduce response times, and maintain system availability while minimizing downtime in real-world microservice environments. This paper discusses the framework's architecture, highlights its implementation, and presents results that validate the efficacy of AI-driven security strategies for microservices.

Author Biography

Vijay Ramamoorthi, Independent Researcher

Vijay Ramamoorthi is a seasoned software architect with a background in artificial intelligence and machine learning. He has designed and implemented complex systems for Fortune 500 companies and has a passion for building scalable, reliable software solutions. His expertise spans cloud computing, microservices, and distributed systems. Vijay holds a Master's degree in Computer Science and a Bachelor's in Mathematics

Downloads

Published

2024-06-20

How to Cite

Ramamoorthi, V. . (2024). Anomaly Detection and Automated Mitigation for Microservices Security with AI. Applied Research in Artificial Intelligence and Cloud Computing, 7(6), 211–222. Retrieved from https://researchberg.com/index.php/araic/article/view/216