Generative AI for Real-Time Cloud Security: Advanced AnomalyDetection Using GPT Models

Authors

  • Mrs. Sadia Kausar Assistant Professor, Dept. of CSE-AIML, Lords Institute of Engineering and Technology Author
  • Ms. Munazzah Khan, Ms. Nashrah Fariha, Ms. Humera Fatima B.E Student Dept. of CSE-AIML, Lords Institute of Engineering and Technology Author

DOI:

https://doi.org/10.62647/

Keywords:

AI, GPT

Abstract

Cloud infrastructures are becoming
increasingly complex, creating a strong need for
advanced real-time security solutions. Traditional
anomaly detection systems, which rely on
predefined rules and signature-based methods,
often fail to detect novel and sophisticated cyber
threats. This paper explores the use of generative AI
models, including LLaMA and GPT architectures,
to enhance cloud security through real-time
anomaly detection. The proposed framework
leverages the pattern recognition and adaptive
learning capabilities of these models to analyze
large-scale cloud data such as logs, network traffic,
user behavior, and system activities. By
continuously learning from new data, the system
improves its ability to identify previously unknown
threats. This approach addresses key limitations in
existing cloud security methods by introducing a
scalable and adaptive solution. The use of
generative AI enables more accurate and timely
detection of anomalies in dynamic cloud
environments. Furthermore, the framework
demonstrates how GPT-based models can generate
meaningful insights from diverse inputs. The study
highlights the potential of integrating generative AI
into cloud security systems for enhanced protection.
It also evaluates the feasibility of deploying such
models in large-scale infrastructures. Overall, the
research emphasizes improved resilience,
adaptability, and efficiency in modern cloud
security frameworks.

Downloads

Download data is not yet available.

Downloads

Published

13-04-2026

How to Cite

Generative AI for Real-Time Cloud Security: Advanced AnomalyDetection Using GPT Models. (2026). International Journal of Information Technology and Computer Engineering, 14(2), 392-399. https://doi.org/10.62647/

Similar Articles

131-140 of 618

You may also start an advanced similarity search for this article.