International Journal on Science and Technology
E-ISSN: 2229-7677
•
Impact Factor: 9.88
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Home
Research Paper
Submit Research Paper
Publication Guidelines
Publication Charges
Upload Documents
Track Status / Pay Fees / Download Publication Certi.
Editors & Reviewers
View All
Join as a Reviewer
Get Membership Certificate
Current Issue
Publication Archive
Conference
Publishing Conf. with IJSAT
Upcoming Conference(s) ↓
Conferences Published ↓
ALSDAHW-2025
Contact Us
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 17 Issue 2
April-June 2026
Indexing Partners
AI-Driven Behavioral Anomaly Detection for Identity Threat Monitoring in Cloud Platforms
| Author(s) | Ebubechukwu Edokwe |
|---|---|
| Country | United States |
| Abstract | As organizations increasingly move to the cloud, security risks associated with identity and access management (IAM) are increased in complexity. One of the most important problems is detecting identity-based threats in these dynamic, distributed environments. AI-driven behavioral anomaly detection has become an important tool to strengthen the identity threat monitoring capability in the cloud platforms, providing real time insights into suspicious activities and potentially malicious behaviors. This article discusses the role of artificial intelligence (AI) in detecting anomalies related to identity by analyzing user behaviors and identifying behavior departures from typical usage patterns. By harnessing machine learning algorithms, cloud platforms can proactively monitor and analyze large amounts of identity and access data, shortening the time it takes to detect and mitigate security threats. The paper also points out some of the key methodologies used for AI-based anomaly detection such as unsupervised learning, clustering, and neural networks, all of which can be used for knowledge of outliers and unusual access patterns. Additionally, the article assesses how well these AI techniques are functioning to detect new threats such as insider attacks, credential abuse and unauthorized access. The combining of behavioral anomaly detection with the current Zero Trust frameworks guarantees that security policies are dynamically enforced and continually monitored. Ultimately, this approach improves cloud security by delivering a more adaptive, efficient and scalable solution for identity threat monitoring to offer organizations greater protection from evolving and shifting cyber risks. |
| Keywords | AI-driven anomaly detection, Behavioral anomaly detection, Cloud security, Identity threat monitoring, Zero Trust architecture, Machine learning for security, Credential abuse detection, Privilege escalation, User behavior analytics (UBA), Unsupervised learning, Supervised learning, Deep learning for security, Auto encoder-based anomaly detection, Random Forest for anomaly detection |
| Field | Engineering |
| Published In | Volume 16, Issue 4, October-December 2025 |
| Published On | 2025-11-05 |
Share this

CrossRef DOI is assigned to each research paper published in our journal.
IJSAT DOI prefix is
10.71097/IJSAT
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.