An Intelligent Cybersecurity Architecture for SAP Systems Using Risk-Aware Predictive Analytics for Financial Data Protection
Main Article Content
Abstract
The architecture combines real‑time log ingestion, feature engineering, machine learning‑based risk scoring, contextual correlation, and adaptive response mechanisms within a cloud‑compatible security fabric. By correlating SAP application logs, user behavior, configuration changes, and network/cloud telemetry, the system builds dynamic risk profiles and continuously assesses threat likelihood. Predictive models trained on historical incident patterns and unsupervised anomaly detection algorithms enable early identification of high‑risk events, improving detection accuracy and reducing response latency.
A modular, scalable design supports both on‑premises and hybrid cloud deployments, with auditability and governance aligned to compliance standards such as SOX and GDPR. Evaluation using simulated SAP threat scenarios demonstrates improved detection metrics (precision, recall) over traditional rule sets and underscores trade‑offs between model complexity, latency, and false positive rates. The paper concludes with insights on operational integration and future extensions.
Article Details
Section
How to Cite
References
1. Anderson, J. (2001). Security Engineering. Wiley.
2. Kusumba, S. (2024). Data Integration: Unifying Financial Data for Deeper Insight. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 7(1), 9939-9946.
3. Binu, C. T., Kumar, S. S., Rubini, P., & Sudhakar, K. (2024). Enhancing Cloud Security through Machine Learning-Based Threat Prevention and Monitoring: The Development and Evaluation of the PBPM Framework. https://www.researchgate.net/profile/Binu-C-T/publication/383037713_Enhancing_Cloud_Security_through_Machine_Learning-Based_Threat_Prevention_and_Monitoring_The_Development_and_Evaluation_of_the_PBPM_Framework/links/66b99cfb299c327096c1774a/Enhancing-Cloud-Security-through-Machine-Learning-Based-Threat-Prevention-and-Monitoring-The-Development-and-Evaluation-of-the-PBPM-Framework.pdf
4. Kanumarlapudi, P. K., Peram, S. R., & Kakulavaram, S. R. (2024). Evaluating Cyber Security Solutions through the GRA Approach: A Comparative Study of Antivirus Applications. International Journal of Computer Engineering and Technology (IJCET), 15(4), 1021-1040.
5. Poornima, G., & Anand, L. (2024, April). Effective strategies and techniques used for pulmonary carcinoma survival analysis. In 2024 1st International Conference on Trends in Engineering Systems and Technologies (ICTEST) (pp. 1-6). IEEE.
6. Adari, V. K. (2024). APIs and open banking: Driving interoperability in the financial sector. International Journal of Research in Computer Applications and Information Technology (IJRCAIT), 7(2), 2015–2024.
7. Sugumar, R. (2023, September). A Novel Approach to Diabetes Risk Assessment Using Advanced Deep Neural Networks and LSTM Networks. In 2023 International Conference on Network, Multimedia and Information Technology (NMITCON) (pp. 1-7). IEEE.
8. Vijayaboopathy, V., Rao, S. B. S., & Surampudi, Y. (2023). Strategic Modernization of Regional Health Plan Data Platforms Using Databricks and Advanced Analytics Algorithms. Los Angeles Journal of Intelligent Systems and Pattern Recognition, 3, 172-208.
9. Mani, R. (2024). Smart Resource Management in SAP HANA: A Comprehensive Guide to Workload Classes, Admission Control, and System Optimization through Memory, CPU, and Request Handling Limits. International Journal of Research and Applied Innovations, 7(5), 11388-11398.
10. Navandar, P. (2022). The Evolution from Physical Protection to Cyber Defense. International Journal of Computer Technology and Electronics Communication, 5(5), 5730-5752.
11. Praveen Kumar Reddy Gujjala. (2023). Advancing Artificial Intelligence and Data Science: A Comprehensive Framework for Computational Efficiency and Scalability. IJRCAIT, 6(1), 155-166.
12. Oleti, Chandra Sekhar. (2023). Credit Risk Assessment Using Reinforcement Learning and Graph Analytics on AWS. World Journal of Advanced Research and Reviews. 20. 1399-1409. 10.30574/wjarr.2023.20.1.2084.
13. Uddandarao, D. P., & Vadlamani, R. K. (2025). Counterfactual Forecasting of Human Behavior using Generative AI and Causal Graphs. arXiv preprint arXiv:2511.07484.
14. Mahajan, N. (2023). A predictive framework for adaptive resources allocation and risk-adjusted performance in engineering programs. Int. J. Intell. Syst. Appl. Eng, 11(11s), 866.
15. Rajurkar, P. (2024). Integrating AI in Air Quality Control Systems in Petrochemical and Chemical Manufacturing Facilities. International Journal of Innovative Research of Science, Engineering and Technology, 13(10), 17869 - 17873.
16. Christadoss, J., & Mani, K. (2024). AI-Based Automated Load Testing and Resource Scaling in Cloud Environments Using Self-Learning Agents. Journal of Artificial Intelligence General science (JAIGS) ISSN: 3006-4023, 6(1), 604-618.
17. Paul, D.; Soundarapandiyan, R.; Krishnamoorthy, G. Security-First Approaches to CI/CD in Cloud-Computing Platforms: Enhancing DevSecOps Practices. Aust. J. Mach. Learn. Res. Appl. 2021, 1, 184–225.
18. Vasugi, T. (2022). AI-Optimized Multi-Cloud Resource Management Architecture for Secure Banking and Network Environments. International Journal of Research and Applied Innovations, 5(4), 7368-7376.
19. Kumar, R. K. (2023). AI‑integrated cloud‑native management model for security‑focused banking and network transformation projects. International Journal of Research Publications in Engineering, Technology and Management, 6(5), 9321–9329. https://doi.org/10.15662/IJRPETM.2023.0605006
20. Nagarajan, G. (2023). AI-Integrated Cloud Security and Privacy Framework for Protecting Healthcare Network Information and Cross-Team Collaborative Processes. International Journal of Engineering & Extended Technologies Research (IJEETR), 5(2), 6292-6297.
21. Balaji, K. V., & Sugumar, R. (2023, December). Harnessing the Power of Machine Learning for Diabetes Risk Assessment: A Promising Approach. In 2023 International Conference on Data Science, Agents & Artificial Intelligence (ICDSAAI) (pp. 1-6). IEEE.
22. Adari, V. K., Chunduru, V. K., Gonepally, S., Amuda, K. K., & Kumbum, P. K. (2023). Ethical analysis and decision-making framework for marketing communications: A weighted product model approach. Data Analytics and Artificial Intelligence, 3 (5), 44–53.
23. HV, M. S., & Kumar, S. S. (2024). Fusion Based Depression Detection through Artificial Intelligence using Electroencephalogram (EEG). Fusion: Practice & Applications, 14(2).
24. Poornima, G., & Anand, L. (2024, May). Novel AI Multimodal Approach for Combating Against Pulmonary Carcinoma. In 2024 5th International Conference for Emerging Technology (INCET) (pp. 1-6). IEEE.
25. Meka, S. (2023). Empowering Members: Launching Risk-Aware Overdraft Systems to Enhance Financial Resilience. International Journal of Engineering & Extended Technologies Research (IJEETR), 5(6), 7517-7525.
26. Zerine, I., Hossain, A., Hasan, S., Rahman, K. A., & Islam, M. M. (2024). AI-Driven Predictive Analytics for Cryptocurrency Price Volatility and Market Manipulation Detection. Journal of Computer Science and Technology Studies, 6(2), 209-224.
27. Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011). Cloud computing — The business perspective. Decision Support Systems.