E. Fenil, S. Nachiyappan, A. Subash Chandar, P. Mohan Kumar
{"title":"Securing Multicloud Environments With SAFIRE: A Federated and Adaptive Intelligence Approach","authors":"E. Fenil, S. Nachiyappan, A. Subash Chandar, P. Mohan Kumar","doi":"10.1002/nem.70040","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>Multicloud environments provide multicloud environment provision of cyber-attacks demands to have flexible security mechanisms, which can dynamically respond to evolving patterns of attacks. In this paper, a novel framework of Self-Adaptive Federated Intelligence known as Self-Adaptive Federated Intelligence of Real-time security Enforcement (SAFIRE) is introduced, which implements a combination of real-time security intelligence extraction, cross-cloud threat correlation, and adaptive learning to provide a more efficient security solution. This model uses a security insight system that trains itself to analyze multicloud attack patterns dynamically in order to provide real-time detection of advanced threats. A dynamic learning mechanism that provides changes in the dynamic trends in security decision-making is an important aspect of the model. A hierarchical classification module also divides the different types of attacks and corrects mitigation measures based on this. By employing an attention-based system of cross-cloud adaptation, the suggested system will enable a number of cloud service providers to collaborate toward greater levels of security in a noncentralized fashion. The key strength of this work is its potential to trace the pattern of multicloud attacks, adjust security policy in real-time situations, and enhance its threat detection with limited reliance on the centralized view of data accumulation. As experimental findings show, the proposed methodology is more accurate (98.9%), less prone to false positives (1.9), lower response time (180 ms), and less resource-intensive (4%). The findings indicate that the model takes minimal time to adapt to emerging cyber-attacks with high detection and low overhead rates and is therefore interesting as a solution to secure cloud infrastructure of the future.</p>\n </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"36 3","pages":""},"PeriodicalIF":2.6000,"publicationDate":"2026-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Network Management","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/nem.70040","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Multicloud environments provide multicloud environment provision of cyber-attacks demands to have flexible security mechanisms, which can dynamically respond to evolving patterns of attacks. In this paper, a novel framework of Self-Adaptive Federated Intelligence known as Self-Adaptive Federated Intelligence of Real-time security Enforcement (SAFIRE) is introduced, which implements a combination of real-time security intelligence extraction, cross-cloud threat correlation, and adaptive learning to provide a more efficient security solution. This model uses a security insight system that trains itself to analyze multicloud attack patterns dynamically in order to provide real-time detection of advanced threats. A dynamic learning mechanism that provides changes in the dynamic trends in security decision-making is an important aspect of the model. A hierarchical classification module also divides the different types of attacks and corrects mitigation measures based on this. By employing an attention-based system of cross-cloud adaptation, the suggested system will enable a number of cloud service providers to collaborate toward greater levels of security in a noncentralized fashion. The key strength of this work is its potential to trace the pattern of multicloud attacks, adjust security policy in real-time situations, and enhance its threat detection with limited reliance on the centralized view of data accumulation. As experimental findings show, the proposed methodology is more accurate (98.9%), less prone to false positives (1.9), lower response time (180 ms), and less resource-intensive (4%). The findings indicate that the model takes minimal time to adapt to emerging cyber-attacks with high detection and low overhead rates and is therefore interesting as a solution to secure cloud infrastructure of the future.
期刊介绍:
Modern computer networks and communication systems are increasing in size, scope, and heterogeneity. The promise of a single end-to-end technology has not been realized and likely never will occur. The decreasing cost of bandwidth is increasing the possible applications of computer networks and communication systems to entirely new domains. Problems in integrating heterogeneous wired and wireless technologies, ensuring security and quality of service, and reliably operating large-scale systems including the inclusion of cloud computing have all emerged as important topics. The one constant is the need for network management. Challenges in network management have never been greater than they are today. The International Journal of Network Management is the forum for researchers, developers, and practitioners in network management to present their work to an international audience. The journal is dedicated to the dissemination of information, which will enable improved management, operation, and maintenance of computer networks and communication systems. The journal is peer reviewed and publishes original papers (both theoretical and experimental) by leading researchers, practitioners, and consultants from universities, research laboratories, and companies around the world. Issues with thematic or guest-edited special topics typically occur several times per year. Topic areas for the journal are largely defined by the taxonomy for network and service management developed by IFIP WG6.6, together with IEEE-CNOM, the IRTF-NMRG and the Emanics Network of Excellence.