Threat Hunting in Cloud Infrastructure Using Behavioral Analytics and Machine Learning

Authors

  • Dr. Nidhi Sahema

Abstract

Proactive threat hunting is essential for identifying advanced persistent threats (APTs) in cloud infrastructure. This paper presents a threat-hunting framework that combines behavioral analytics with machine learning to detect and investigate suspicious activity. The framework analyzes user behavior, API calls, and network traffic to identify deviations from baseline patterns. Machine learning models are used to classify anomalies and generate actionable threat intelligence. Performance analysis shows that the framework reduces false positives and improves threat detection accuracy. The study concludes that behavioral-based threat hunting enhances the security posture of cloud environments by enabling early detection of sophisticated attacks.

References

Sadaram, G., Karaka, L. M., Maka, S. R., Sakuru, M., Boppana, S. B., & Katnapally, N. (2024). AI-Powered Cyber Threat Detection: Leveraging Machine Learning for Real-Time Anomaly Identification and Threat Mitigation. MSW Management Journal, 34(2), 788-803.

Krishna Madhav, J., Varun, B., Niharika, K., Srinivasa Rao, M., & Laxmana Murthy, K. (2023). Optimising Sales Forecasts in ERP Systems Using Machine Learning and Predictive Analytics. J Contemp Edu Theo Artific Intel: JCETAI-104.

Sadaram, G., Sakuru, M., Karaka, L. M., Reddy, M. S., Bodepudi, V., Boppana, S. B., & Maka, S. R. (2022). Internet of Things (IoT) Cybersecurity Enhancement through Artificial Intelligence: A Study on Intrusion Detection Systems. Universal Library of Engineering Technology, (2022).

Jha, K. M., Velaga, V., Routhu, K. K., Sadaram, G., & Boppana, S. B. (2025). Evaluating the Effectiveness of Machine Learning for Heart Disease Prediction in Healthcare Sector. J Cardiobiol, 9(1), 1.

Maka, S. R. (2023). Understanding the Fundamentals of Digital Transformation in Financial Services: Drivers and Strategic Insights. Available at SSRN 5116707.

Karaka, L. M. (2021). Optimising Product Enhancements Strategic Approaches to Managing Complexity. Available at SSRN 5147875.

KishanKumar Routhu, A. D. P. Risk Management in Enterprise Merger and Acquisition (M&A): A Review of Approaches and Best Practices.

Routhu, KishanKumar & Katnapally, Niharika & Sakuru, Manikanth. (2023). Machine Learning for Cyber Defense: A Comparative Analysis of Supervised and Unsupervised Learning Approaches. Journal for ReAttach Therapy and Developmental Diversities. 6. 10.53555/jrtdd.v6i10s(2).3481.

Chinta, Purna Chandra Rao & Moore, Chethan Sriharsha. (2023). Cloud-Based AI and Big Data Analytics for Real-Time Business Decision-Making. 36. 96-123. 10.47363/JAICC/2023.

Published

2025-01-14

How to Cite

Sahema, D. N. (2025). Threat Hunting in Cloud Infrastructure Using Behavioral Analytics and Machine Learning. German Journal of Advanced Research , 7(7). Retrieved from https://journals.mljce.in/index.php/GJAR/article/view/23

Issue

Section

Articles