Key points are not available for this paper at this time.
This paper proposes an AI-enhanced anomaly detection pipeline for Java enterprise applications using Spring, Log4j, and AWS CloudWatch.The methodology utilizes historical logs from applications deployed on ECS and Lambda to train unsupervised ML models (e.g., Isolation Forests) to detect operational and security anomalies.Realtime inference is served via serverless endpoints, with threat scores visualized in CloudWatch Dashboards.Integration with AWS KMS and Secrets Manager enforces secure data handling.The study includes detection of synthetic attacks in a simulated financial workload, demonstrating how full-stack observability evolves into proactive cybersecurity.
Building similarity graph...
Analyzing shared references across papers
Loading...
Chandra Sekhar Oleti (Wed,) studied this question.
www.synapsesocial.com/papers/6a086764113ba5b476de23b2 — DOI: https://doi.org/10.34218/ijcet_15_01_015
Chandra Sekhar Oleti
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY
Building similarity graph...
Analyzing shared references across papers
Loading...