Residual Neural Networks and Gray Relational Analytics for Cloud-Native Security AI-Driven Multivariate Fraud Detection, Adaptive Threat Prevention, and Kubernetes Migration
Main Article Content
Abstract
The system incorporates an adaptive threat-prevention module that dynamically adjusts model thresholds, cost-sensitive loss functions, and risk-level parameters based on real-time telemetry, drift detection, and behavioral indicators. To ensure scalability and operational resilience, a Kubernetes-centric migration strategy is employed, containerizing preprocessing pipelines, GRA engines, model training workflows, and inference services within zero-trust, autoscaling clusters. This approach supports secure multi-tenant isolation, CI/CD automation, and rapid rollback during model lifecycle updates. Experimental evaluations using large-scale financial transaction datasets show that the combined GRA–ResNet architecture outperforms traditional baselines by 20–35% in F1-score and reduces false positives while maintaining low-latency inference. The results demonstrate that fusing interpretable GRA-driven feature weighting with deep residual learning and Kubernetes-native deployment provides a scalable, adaptive, and production-ready solution for modern cloud security ecosystems.
Article Details
Section
How to Cite
References
1. Deng Julong. Grey relational analysis. In Grey System Theory (original definition, 1982). Wikipedia
2. Anand, P. V., & Anand, L. (2023, December). An Enhanced Breast Cancer Diagnosis using RESNET50. In 2023 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES) (pp. 1-5). IEEE.
3. Girdhar, P., Virmani, D., & Saravana Kumar, S. (2019). A hybrid fuzzy framework for face detection and recognition using behavioral traits. Journal of Statistics and Management Systems, 22(2), 271-287.
4. Bhuiyan, M. S. M., Al Rafi, M., Rodrigues, G. N., Mir, M. N. H., Abir, M. G. R., Mridha, M. F., & Shin, J. (2024, December). Predicting Hospital Length of Stay Using Residual Neural Networks with Self-Attention: A Deep Learning Approach. In 2024 27th International Conference on Computer and Information Technology (ICCIT) (pp. 2267-2272). IEEE.
5. Kumar, R., Bhatnagar, V., Jain, A., Singh, M., Kareem, Z. H., & Sugumar, R. (2022). [Retracted] CNN‐Based Cross‐Modal Residual Network for Image Synthesis. BioMed Research International, 2022(1), 6399730.
6. Ramakrishna, S. (2022). AI-augmented cloud performance metrics with integrated caching and transaction analytics for superior project monitoring and quality assurance. International Journal of Engineering & Extended Technologies Research (IJEETR), 4(6), 5647–5655. https://doi.org/10.15662/IJEETR.2022.0406005
7. Moustafa, N., Creech, G., Sitnikova, E., & Keshk, M. Collaborative Anomaly Detection Framework for handling Big Data of Cloud Computing. (2017). arXiv
8. Alsafi, H. M., Abduallah, W. M., & Pathan, A.-S. K. IDPS: An Integrated Intrusion Handling Model for Cloud. (2012). arXiv
9. Kandula N (2023). Gray Relational Analysis of Tuberculosis Drug Interactions A Multi-Parameter Evaluation of Treatment Efficacy. J Comp Sci Appl Inform Technol. 8(2): 1-10.
10. Amuda, K. K., Kumbum, P. K., Adari, V. K., Chunduru, V. K., & Gonepally, S. (2024). Evaluation of crime rate prediction using machine learning and deep learning for GRA method. Data Analytics and Artificial Intelligence, 4 (3).
11. Murugamani, C., Saravanakumar, S., Prabakaran, S., & Kalaiselvan, S. A. (2015). Needle insertion on soft tissue using set of dedicated complementarily constraints. Advances in Environmental Biology, 9(22 S3), 144-149.
12. Muthusamy, M. (2022). AI-Enhanced DevSecOps architecture for cloud-native banking secure distributed systems with deep neural networks and automated risk analytics. International Journal of Research Publication and Engineering Technology Management, 6(1), 7807–7813. https://doi.org/10.15662/IJRPETM.2022.0506014
13. Divyasree I. R., Selvamani K., Riasudheen H. Detection of Colluded Black-hole and Grey-hole attacks in Cloud Computing. (2020). arXiv
14. Kumar, R., Al-Turjman, F., Anand, L., Kumar, A., Magesh, S., Vengatesan, K., ... & Rajesh, M. (2021). Genomic sequence analysis of lung infections using artificial intelligence technique. Interdisciplinary Sciences: Computational Life Sciences, 13(2), 192-200.
15. Acevedo-Viloria, J. D., Roa, L., Adeshina, S., Olazo, C. C., Rodríguez-Rey, A., Ramos, J. A., & Correa-Bahnsen, A. Relational Graph Neural Networks for Fraud Detection in a Super-App environment. (2021). arXiv
16. Wali, M. et al. Hybrid Cyber Threat (HCT) modeling and detection using AI and Grey Relational Analysis. (2022). As discussed in hybrid threat detection survey. TechScience
17. Peddamukkula, P. K. (2023). The role of AI in personalization and customer experience in the financial and insurance industries. International Journal of Innovative Research in Computer and Communication Engineering, 11(12), 12041–12048. https://doi.org/10.15680/IJIRCCE.2023.1112002
18. Pichaimani, T., & Ratnala, A. K. (2022). AI-driven employee onboarding in enterprises: using generative models to automate onboarding workflows and streamline organizational knowledge transfer. Australian Journal of Machine Learning Research & Applications, 2(1), 441-482.
19. Devan, M., Althati, C., & Perumalsamy, J. (2023). Real-Time Data Analytics for Fraud Detection in Investment Banking Using AI and Machine Learning: Techniques and Case Studies. Cybersecurity and Network Defense Research, 3(1), 25-56.
20. Adari, V. K., Chunduru, V. K., Gonepally, S., Amuda, K. K., & Kumbum, P. K. (2024). Artificial Neural Network in Fibre-Reinforced Polymer Composites using ARAS method. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 7(2), 9801-9806.
21. M. A. Alim, M. R. Rahman, M. H. Arif, and M. S. Hossen, “Enhancing fraud detection and security in banking and e-commerce with AI-powered identity verification systems,” 2020.
22. Konda, S. K. (2024). AI Integration in Building Data Platforms: Enabling Proactive Fault Detection and Energy Conservation. International Journal of Advanced Research in Computer Science & Technology (IJARCST), 7(3), 10327-10338.
23. Kumar, R. K. (2023). Cloud-integrated AI framework for transaction-aware decision optimization in agile healthcare project management. International Journal of Computer Technology and Electronics Communication (IJCTEC), 6(1), 6347–6355. https://doi.org/10.15680/IJCTECE.2023.0601004
24. Vasugi, T. (2023). AI-empowered neural security framework for protected financial transactions in distributed cloud banking ecosystems. International Journal of Advanced Research in Computer Science & Technology, 6(2), 7941–7950. https://doi.org/0.15662/IJARCST.2023.0602004
25. Nagarajan, G. (2022). An integrated cloud and network-aware AI architecture for optimizing project prioritization in healthcare strategic portfolios. International Journal of Research and Applied Innovations, 5(1), 6444–6450. https://doi.org/10.15662/IJRAI.2022.0501004
26. Singh, H. (2025). AI-Powered Chatbots Transforming Customer Support through Personalized and Automated Interactions. Available at SSRN 5267858.
27. Arora, Anuj. "Challenges of Integrating Artificial Intelligence in Legacy Systems and Potential Solutions for Seamless Integration." The Research Journal (TRJ), vol. 6, no. 6, Nov.–Dec. 2020, pp. 44–51. ISSN 2454-7301 (Print), 2454-4930 (Online).
28. Zubair, K. M., Akash, T. R., & Chowdhury, S. A. (2023). Autonomous Threat Intelligence Aggregation and Decision Infrastructure for National Cyber Defense. Frontiers in Computer Science and Artificial Intelligence, 2(2), 26-51.
29. Sharma, A., Kabade, S., & Kagalkar, A. (2024). AI-Driven and Cloud-Enabled System for Automated Reconciliation and Regulatory Compliance in Pension Fund Management. International Journal of Emerging Research in Engineering and Technology, 5(2), 65-73.
30. Thangavelu, K., Muthirevula, G. R., & Mallareddi, P. K. D. (2023). Kubernetes Migration in Regulated Industries: Transitioning from VMware Tanzu to Azure Kubernetes Service (AKS). Los Angeles Journal of Intelligent Systems and Pattern Recognition, 3, 35-76.
31. Mohile, A. (2021). Performance Optimization in Global Content Delivery Networks using Intelligent Caching and Routing Algorithms. International Journal of Research and Applied Innovations, 4(2), 4904-4912.
32. Jaikrishna, G., & Rajendran, S. (2020). Cost-effective privacy preserving of intermediate data using group search optimisation algorithm. International Journal of Business Information Systems, 35(2), 132-151.
33. Dharmateja Priyadarshi Uddandarao. (2024). Counterfactual Forecastingof Human Behavior using Generative AI and Causal Graphs. International Journal of Intelligent Systems and Applications in Engineering, 12(21s), 5033 –. Retrievedfrom https://ijisae.org/index.php/IJISAE/article/view/7628
34. Adejumo, E. O. Cross-Sector AI Applications: Comparing the Impact of Predictive Analytics in Housing, Marketing, and Organizational Transformation. https://www.researchgate.net/profile/Ebunoluwa-Adejumo/publication/396293578_Cross-Sector_AI_Applications_Comparing_the_Impact_of_Predictive_Analytics_in_Housing_Marketing_and_Organizational_Transformation/links/68e5fdcae7f5f867e6ddd573/Cross-Sector-AI-Applications-Comparing-the-Impact-of-Predictive-Analytics-in-Housing-Marketing-and-Organizational-Transformation.pdf
35. Predictive analytics with AI for cloud security risk management. World Journal of Advanced Engineering Technology and Sciences, 2023. wjaets.com