Enhancing Methods of Protection in the Amazon Web Services Cloud with Artificial Intelligence and Machine Learning
Abstract
Purpose: To investigate protection methods in the Amazon Web Services cloud environment using artificial intelligence and machine learning and to assess the effectiveness of AI-based security tools compared to traditional approaches.
Method: The study employs an experimental approach in the Amazon Web Services (AWS) cloud environment. Simulated cyberattacks, including unauthorized access, data exfiltration, web-based attacks, and privilege escalation, were performed to assess security effectiveness. A comparative analysis was conducted between traditional security mechanisms (CloudTrail, WAF) and AI-driven security tools (Amazon GuardDuty, Macie). The evaluation focused on detection accuracy, response time, and adaptability, reflecting the study’s findings how effectively each method detects and mitigates security threats in a cloud environment.
Findings: Security tools leveraging artificial intelligence, such as GuardDuty and Macie, provide more effective threat detection than traditional security methods. They demonstrate high accuracy, reduce false positives, and enable faster response to potential attacks.
Theoretical implications: The study deepens the understanding of AI's role in cloud security methods and highlights the need to integrate both traditional and automated security strategies.
Practical implications: The findings offer recommendations for implementing automated threat detection systems and improving security monitoring in the Amazon Web Services cloud environment.
Value: This research highlights the advantages of integrating artificial intelligence into cloud security and proposes practical solutions to enhance protection strategies.
Future research: Future studies may explore deep learning-based attack prediction, enhanced behavioral analytics, and the development of self-learning security systems.
Paper type: Conceptual research.
Downloads
References
Amazon Web Services. (n.d.). AWS Security Best Practices. Retrieved from: https://docs.aws.amazon.com/security
NIST. (2018). Framework for Improving Critical Infrastructure Cybersecurity. Retrieved from: https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf
Oduri, S. (2021). AI-Powered Threat Detection in Cloud Environments. International Journal on Recent and Innovation Trends in Computing and Communication. ISSN: 2321-8169 Volume: 9 Issue: 12.
Nwachukwu, C., Durodola-Tunde, K., & Akwiwu-Uzoma, C. (2024). AI-driven anomaly detection in cloud computing environments. International Journal of Science and Research Archive, 13(2), 692–710. https://doi.org/10.30574/ijsra.2024.13.2.2184
Amazon Web Services. (n.d.). AWS Well-Architected Framework. Retrieved from: https://docs.aws.amazon.com/wellarchitected
Amazon Web Services. (n.d.). AWS CloudTrail User Guide. Retrieved from: https://docs.aws.amazon.com/cloudtrail
Amazon Web Services. (n.d.). AWS WAF Developer Guide. Retrieved from: https://docs.aws.amazon.com/waf
Amazon Web Services. (n.d.). SIEM on AWS: Using Amazon OpenSearch Service for Security Analytics. Retrieved from: https://aws.amazon.com/blogs/security/use-amazon-opensearch-service-as-a-security-information-and-event-management-solution
Amazon Web Services. (n.d.). Amazon GuardDuty User Guide. Retrieved from: https://docs.aws.amazon.com/guardduty
Amazon Web Services. (n.d.). Amazon Macie User Guide. Retrieved from: https://docs.aws.amazon.com/macie
Amazon Web Services. (n.d.). Monitoring Amazon S3 with Server Access Logging. Retrieved from: https://docs.aws.amazon.com/AmazonS3/latest/dev/ServerLogs.html
Amazon Web Services. (n.d.). AWS Security Hub API Reference: Monitoring Amazon S3 with Server Access Logging. Retrieved from: https://docs.aws.amazon.com/securityhub/
Amazon Web Services. (n.d.). Amazon GuardDuty Pricing. Retrieved from: https://aws.amazon.com/guardduty/pricing
Abstract views: 23 PDF Downloads: 13
Copyright (c) 2025 Vitalii Molnar, Dmytro Sabodashko

This work is licensed under a Creative Commons Attribution 4.0 International License.
The authors agree with the following conditions:
1. Authors retain copyright and grant the journal right of first publication (Download agreement) with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
2. Authors have the right to complete individual additional agreements for the non-exclusive spreading of the journal’s published version of the work (for example, to post work in the electronic repository of the institution or to publish it as part of a monograph), with the reference to the first publication of the work in this journal.
3. Journal’s politics allows and encourages the placement on the Internet (for example, in the repositories of institutions, personal websites, SSRN, ResearchGate, MPRA, SSOAR, etc.) manuscript of the work by the authors, before and during the process of viewing it by this journal, because it can lead to a productive research discussion and positively affect the efficiency and dynamics of citing the published work (see The Effect of Open Access).