The use of artificial intelligence for ensuring the security of data centers
DOI:
https://doi.org/10.17721/ISTS.2025.9.42-46Keywords:
artificial intelligence, cybersecurity, data centers, anomaly analysis, neural networks, threat detectionAbstract
Background. In today's world, cyber threats to data centers (DCs) have become a significant concern due to their growing complexity and adaptability. Artificial Intelligence (AI) can greatly enhance monitoring and security processes, ensuring real-time threat detection and response. The aim of this study was to evaluate the effectiveness of AI methods for improving DC security and to demonstrate their practical applications.
Methods. In today's world, cyber threats to data centers (DCs) have become a significant concern due to their growing complexity and adaptability. Artificial Intelligence (AI) can greatly enhance monitoring and security processes, ensuring real-time threat detection and response. The aim of this study was to evaluate the effectiveness of AI methods for improving DC security and to demonstrate their practical applications.
Results. The use of the behavioral anomaly analysis method achieved an accuracy of 89% in detecting suspicious activities, while deep neural networks demonstrated up to 92% accuracy in predicting new threats. The average response time to potential attacks was reduced from 25 to 8 seconds, enabling timely blocking of suspicious actions. Practical applications include integrating these models into monitoring systems, allowing automatic threat detection and mitigation, reducing reliance on human intervention, and minimizing false positives.
Conclusions. The study confirmed the effectiveness of AI as a tool for ensuring high levels of DC cybersecurity. AI enables quick and precise threat detection, preventing their realization and minimizing potential damage. However, to fully harness AI's potential, it is essential to consider the need for high-quality training data, computational resources, and algorithm transparency. Future research should focus on refining models to enhance their resistance to manipulation and adaptability to new types of threats.
Downloads
References
Rathod, T., Jadav, N. K., Tanwar, S., Polkowski, Z., Yamsani, N., Sharma, R., Fayez A., & Gafar, A. (2023). AI and Blockchain-Based Secure Data Dissemination Architecture for IoT-Enabled Critical Infrastructure. Sensors, 23(21), 8928. https://doi.org/10.3390/s23218928
Sharma, H., Sharma, G., & Kumar, N. (2024). AI-assisted secure data transmission techniques for next-generation HetNets: A review. Computer Communications. Elsevier B.V., 215, 74–90. https://doi.org/10.1016/j.comcom.2023.12.015
Ferencz, B., & Büki, B. (2022). Three Ways of Secure Data Reusability in Europe: German Research Data Centres, Finnish Findata and the French Secure Access Data Centre. ELTE Law Journal, 1, 81–108. https://doi.org/10.54148/ELTELJ.2022.1.81
Taylor, A. R. E. (2021). Future-proof: bunkered data centres and the selling of ultra-secure cloud storage. Journal of the Royal Anthropological Institute, 27, 76–94. https://doi.org/10.1111/1467-9655.13481
Saxena, D., Gupta, I., Kumar, J., Singh, A. K., & Wen, X. (2022). A Secure and Multiobjective Virtual Machine Placement Framework for Cloud Data Center. IEEE Systems Journal, 16(2), 3163–3174. https://doi.org/10.1109/JSYST.2021.3092521
Balakrishnan, S., & Surendran, D. (2020). Secure information access strategy for a virtual data centre. Computer Systems Science and Engineering, 35(5), 357–366. https://doi.org/10.32604/CSSE.2020.35.357
Pant, P., Anand, K., & Onthoni, D. D. (2023). Secure Information and Data Centres: An Exploratory Study. In Studies in Computational Intelligence (Vol. 1065, pp. 61–88). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-981-19-6290-5_4
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Information systems and technologies security

This work is licensed under a Creative Commons Attribution 4.0 International License.
