AI-DRIVEN INTRUSION DETECTION SYSTEMS FOR MICROSERVICES IN B2B SALES PLATFORMS
Keywords:
Intrusion Detection System, B2B, Microservice, AI, LIMEAbstract
Due to the increase in cyberattacks, there is a need to enhance security measures, especially for B2B sales platforms that integrate microservices. Traditional IDS are ineffective in this environment, and the incorporation of artificial intelligence is implemented to improve the detection and prevention of threats. Machine learning-based IDS enhance the ability of the IDS to discover novelties, identify new forms of threats, and learn with them. This paper aims to uncover the possibility of the future application of AI in changing IDS for microservices in B2B sales platforms. It looks at the advantages of an IDS that is propelled by AI, where accuracy is enhanced, new threats are detected in real-time, and few false positives are experienced. The paper also considers specific examples of its functioning, in particular the identification of man-in-the-middle and injection attacks, combating DoS attacks and data leakage. It also highlights the need for xAI to establish trust and be able to understand how these AI systems make their decisions. The paper concludes, especially by emphasizing the importance of the AI-based IDS in protecting B2B sales platforms and the security of sensitive business transactions.
References
S. Ellerbeck, “Nearly half of organizations are being hit by economic crime, with cybercrime the gravest threat. What can they do about it?,” World Economic Forum, Jul. 26, 2022. https://www.weforum.org/agenda/2022/07/fraud-cybercrime-financial-business/
Y. Li and Q. Liu, “A comprehensive review study of cyber-attacks and cyber security; emerging trends and recent developments,” Energy Reports, vol. 7, no. 7, pp. 8176–8186, 2021, doi: https://doi.org/10.1016/j.egyr.2021.08.126.
L. Rosencrance, “What is B2B (business-to-business) commerce and how does it work?,” SearchCIO, Jun. 2021. https://www.techtarget.com/searchcio/definition/B2B
A. Alharbi et al., “Analyzing the Impact of Cyber Security Related Attributes for Intrusion Detection Systems,” Sustainability, vol. 13, no. 22, p. 12337, Jan. 2021, doi: https://doi.org/10.3390/su132212337.
S. Hamilton, “Impact of AI in Financial Services for Risk Management,” www.360factors.com. https://www.360factors.com/blog/unveiling-revolutionary-impact-ai-financial-services-risk-management/#:~:text=AI%2Ddriven%20data%20analytics%20and
T. Yarygina and C. Otterstad, “A Game of Microservices: Automated Intrusion Response,” Lecture notes in computer science, pp. 169–177, Jan. 2018, doi: https://doi.org/10.1007/978-3-319-93767-0_12.
A. Khraisat, I. Gondal, P. Vamplew, and J. Kamruzzaman, “Survey of intrusion detection systems: techniques, datasets and challenges,” Cybersecurity, vol. 2, no. 1, pp. 1–22, Jul. 2019, doi: https://doi.org/10.1186/s42400-019-0038-7.
D. Vishnyov , “Monolith vs Microservices: Which Is Better to Choose?,” IT Outposts, Sep. 15, 2021. https://itoutposts.com/blog/monolith-vs-microservices-which-is-better-to-choose/
A. Alsirhani, S. Sampalli, and P. Bodorik, “DDoS Detection System: Using a Set of Classification Algorithms Controlled by Fuzzy Logic System in Apache Spark,” IEEE Transactions on Network and Service Management, vol. 16, no. 3, pp. 936–949, Sep. 2019, doi: https://doi.org/10.1109/tnsm.2019.2929425.
S. Patil et al., “Explainable Artificial Intelligence for Intrusion Detection System,” Electronics, vol. 11, no. 19, p. 3079, Sep. 2022, doi: https://doi.org/10.3390/electronics11193079.
M. Wang, K. Zheng, Y. Yang, and X. Wang, “An Explainable Machine Learning Framework for Intrusion Detection Systems,” IEEE Access, vol. 8, pp. 73127–73141, 2020, doi: https://doi.org/10.1109/access.2020.2988359.