Autonomous AI-Powered Cloud-Native Platforms for Continuous Authentication Intrusion Detection Digital Banking Analytics and Secure DevSecOps

Main Article Content

Daniele Nardi

Abstract

The rapid evolution of digital banking ecosystems demands intelligent, autonomous, and resilient security infrastructures capable of defending against sophisticated cyber threats while ensuring seamless customer experiences. Traditional perimeter-based defenses and static authentication models are inadequate in modern cloud-native environments characterized by distributed microservices, API-driven integrations, and real-time financial transactions. This paper proposes an Autonomous AI-Powered Cloud-Native Platform integrating Continuous Authentication, Intrusion Detection Systems (IDS), Digital Banking Analytics, and Secure DevSecOps automation. The framework leverages machine learning models for behavioral biometrics, anomaly detection, fraud prediction, and adaptive risk scoring. Cloud-native principles such as containerization, orchestration, service mesh security, and API gateways ensure scalable and secure deployment. DevSecOps pipelines embed automated vulnerability scanning, compliance validation, and policy-as-code enforcement into continuous integration and delivery workflows. The proposed architecture enables real-time threat detection, intelligent response orchestration, and privacy-preserving analytics across distributed banking systems. Experimental modeling demonstrates improved fraud detection accuracy, reduced incident response time, and enhanced regulatory compliance. This research contributes a comprehensive autonomous security framework tailored for next-generation digital banking platforms operating in dynamic multi-cloud environments.

Article Details

Section

Articles

How to Cite

Autonomous AI-Powered Cloud-Native Platforms for Continuous Authentication Intrusion Detection Digital Banking Analytics and Secure DevSecOps. (2026). International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 9(1), 169-177. https://doi.org/10.15662/IJRPETM.2026.0901022

References

1. Kamadi, S. (2025). Zero trust architecture implementation in hybrid financial technology ecosystems: A comprehensive framework for regulated environments. International Journal for Multidisciplinary Research, 7(3), 1–17.

2. Parvin, A. (2025). Comparative analysis of child development approaches across different education systems globally. Journal of Humanities and Social Sciences Studies, 7(4), 95-113.

3. Rana, M., Srinivas, S., Jamili, L. K., Jaiswal, I. A., Nakka, S., & Kasetti, S. (2025, May). Real-Time Monitoring and Prediction of Blood Sugar Levels in Diabetic Patients with Functional Models. In 2025 International Conference on Engineering, Technology & Management (ICETM) (pp. 1-6). IEEE.

4. Akhtaruzzaman, K., MdAbulKalam, A., Mohammad Kabir, H., & KM, Z. (2024). Driving US Business Growth with AI-Driven Intelligent Automation: Building Decision-Making Infrastructure to Improve Productivity and Reduce Inefficiencies. American Journal of Engineering, Mechanics and Architecture, 2(11), 171–198.

5. Vishwarup, S., et al. (2020). Automatic Person Count Indication System using IoT in a Hotel Infrastructure. In 2020 International Conference on Computer Communication and Informatics (ICCCI) (pp. 1–4). IEEE.

6. Ganesan, G. B. K. (2023). A Governance-Driven PGP Key Lifecycle Framework for Compliant B2B Data Exchange. International Journal of Computer Technology and Electronics Communication, 6(1), 6365–6375.

7. Gopinathan, V. R. (2024). Cyber-Resilient Digital Banking Analytics Using AI-Driven Federated Machine Learning on AWS. International Journal of Engineering & Extended Technologies Research, 6(4), 8419–8426.

8. Muthusamy, P., Muthirevula, G. R., & Mohammed, A. S. (2025). Zero-Touch Continuous Audit with Hybrid Symbolic-Neural Reasoning. Newark Journal of Human-Centric AI and Robotics Interaction, 5, 80–111.

9. Gangina, P. (2024). Generative AI integration patterns in enterprise microservices ecosystems. International Journal of Science, Research and Technology, 7(6), 13153–13165.

10. Ambati, K. C. (2024). Enterprise-wide procurement consolidation: Ivalua-SAP-EDW integration architecture for global supply chain excellence. IJRPETM, 7(4), 14309–14318.

11. Sammy, F., et al. (2025). Deep Learning-Driven Visual Analytics Framework for Next-Generation Environmental Monitoring. Journal of Applied Science and Technology Trends, 114–122.

12. Garg, V. K., Soundappan, S. J., & Kaur, E. M. (2020). Enhancement in intrusion detection system for WLAN using genetic algorithms. South Asian Research Journal of Engineering and Technology, 2(6), 62–64.

13. Sanepalli, U. R. (2023). Cognitive goal-driven financial infrastructure: A cloud-native, AI-orchestrated architecture for investment trade settlement and risk management systems. World Journal of Advanced Research and Reviews, 19(1), 1659–1667.

14. Sarraf, G. (2023). Autonomous Ransomware Forensics: Advanced ML Techniques for Attack Attribution and Recovery. IJARSCT, 3(3), 1377–1390.

15. Kiran, A., Rubini, P., & Kumar, S. S. (2025). Comprehensive review of privacy, utility and fairness offered by synthetic data. IEEE Access.

16. Panda, S. S. (2024). Managing BSL Implementation: A TPM’s Guide to Robust Data Centers. International Journal of Technology, Management and Humanities, 10(01), 33–38.

17. Kamisetty, A. (2025). Autonomous cyber defense using RL in distributed networks. International Journal of Engineering & Extended Technologies Research (IJEETR), 7(6), 11141–11151.

18. Sriramoju, S. (2025). Designing API-Driven Robotic Process Automation Systems: Architectural Frameworks, Challenges, and Best Practices. International Journal of Computer Technology and Electronics Communication, 8(6), 11779-11790.

19. Gaddapuri, N. S. (2025). Cloud-Native Twin Systems for Real-Time Risk and Compliance Simulation in FinHealth Converged Ecosystems. ISCSITR-INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND ENGINEERING (ISCSITR-IJCSE)-ISSN: 3067-7394, 6(4), 77-94.

20. Adari, V. K. (2025). Architectural Frameworks for AI-Enhanced Cloud Systems in Large-Scale Enterprise Deployments Vijay Kumar Adari Cognizant Technology Solutions, USA. International Journal of Computer Technology and Electronics Communication, 8(6), 11791-11798.

21. Ramidi, M. (2025). Designing Secure Cross-Platform Mobile Architectures for Regulated Healthcare Systems. Journal Of Multidisciplinary, 5(8), 371–379.

22. Ireddy, R. K. (2024). Cybersecurity framework for banking systems: A multi-layer defense architecture using ML, microservices, and zero-trust principles. World Journal of Advanced Research and Reviews, 24(3), 3629–3638.

23. Genne, S. (2024). Designing composable enterprise web architecture using headless CMS. IJFIST, 7(6), 13865–13875.

24. Bapatla, S. K. S. (2025). Generative AI in Clinical Decision Support: From Diagnosis to Personalized Care Pathways. Journal Of Engineering And Computer Sciences, 4(7), 194-203.

25. Ponnoju, S. C., & Venkatachalam, D. (2024). Containerization Efficiency in Financial Services using Kubernetes (EKS) and CI/CD Pipelines. Essex Journal of AI Ethics and Responsible Innovation, 4, 129–168.

26. Grandhe, K. (2025). Leveraging SAP S/4HANA and embedded analytics for real-time financial reporting. IJMRGE, 6(4), 1446–1448.

27. Konda, S. K. (2024). Sustainable energy optimization through cloud-native building automation and predictive analytics integration. World Journal of Advanced Research and Reviews, 24(3), 3619–3628.

28. Vijayaboopathy, V., et al. (2023). Agile-driven Quality Assurance Framework using ScalaTest and JUnit. Los Angeles Journal of Intelligent Systems and Pattern Recognition, 3, 245–285.

29. Suganthi, M., et al. (2019). Physiochemical Analysis of Ground Water used for Domestic needs. International Research Journal of Multidisciplinary Technovation, 630–635.

30. Jabed, M. M. I., Sarwar, J., Afrin, S., & Gupta, A. B. (2026). Machine Learning-Driven Cyber Defense: Enhancing US Critical Infrastructure Resilience. International Journal of Innovative Science and Research Technology (IJISRT), 11(01), 1874-1885.

31. Mudunuri, P. R. (2024). Operational transparency as a compliance mechanism in federal DevOps ecosystems. IJEETR, 6(3), 8131–8142.

32. Suddala, V. R. A. K. (2024). Driving Innovation and Compliance in Global Payment Platforms. IJARCST, 7(4), 10662–10672.

33. Anumula, S. R. (2024). Ethical design frameworks for automated decision-making platforms. IJFIST, 7(1), 12035–12047.

34. Aakula, R. (2025). Real-Time AI Dashboards for ICU Monitoring and Alerting. European Journal of Computer Science and Information Technology, 13(12), 15-23..

35. Prasanna, D., et al. (2024). Cloud based automatically human document authentication processes. In ICIICS 2024 (pp. 1–7). IEEE.

36. Ram Kumar, R. P., et al. (2024). Enhanced heart disease prediction through hybrid CNN-TLBO-GA optimization. Cogent Engineering, 11(1), 2384657.

37. Ande, B. R. (2025). AI-Driven Continuous Authentication. In International Conference on Data Science and Big Data Analysis (pp. 478–490). Springer.

38. Jovith, A. A., et al. (2024). Industrial IoT Sensor Networks and Cloud Analytics. In ICCSP 2024 (pp. 1356–1361). IEEE.

39. Mulla, F. A. (2024). Modern Mobile Testing Tools. IJSCSEIT, 10(6).

40. Sarwar, J., et al. (2025). Intelligent Cybersecurity Systems to Safeguard US National Interests. Research Journal of Engineering and Medical Science, 1(2), 1–13.

41. Gadige, C. D. (2025). Evolution of user interface development in Salesforce. IJRPETM, 8(5), 12883–12890.

42. Karthikeyan, K., & Umasankar, P. (2025). Buck-Boost Modified Series Forward converter. Ain Shams Engineering Journal, 16(10), 103557.

43. Gowda, M. K. S. (2025). Comprehensive Audit Data Pipeline Architecture. IJARCST, 8(1), 11590–11597.