AI-Enhanced Cybersecurity for Automated Online Systems: Oracle- and Citrix-Driven Real-Time ERP Threat Mitigation Framework
DOI:
https://doi.org/10.15662/IJRAI.2024.0704003Keywords:
AI-enhanced cybersecurity, real-time threat mitigation, automated online systems, Oracle cloud, Citrix integration, predictive analytics, anomaly detection, enterprise resilience, software development, automated response systemsAbstract
The increasing reliance on automated online systems has amplified the need for robust, real-time cybersecurity solutions. This paper presents a framework that leverages artificial intelligence (AI) to enhance cybersecurity across automated online platforms, integrating Oracle and Citrix-driven software development for real-time threat detection and mitigation. The proposed approach combines predictive analytics, anomaly detection, and automated response mechanisms to safeguard critical enterprise operations against evolving cyber threats. By synchronizing AI models with Oracle cloud services and Citrix virtualization technologies, the framework ensures continuous system availability, operational resilience, and seamless threat response without disrupting business processes. A case-based evaluation demonstrates significant improvements in threat detection accuracy, response speed, and overall system security, highlighting the potential of AI-driven integration for next-generation enterprise cybersecurity.
References
1. Grabski, S. V., Leech, S. A., & Schmidt, P. J. (2011). A review of ERP research: A future agenda for accounting information systems. Journal of Information Systems, 25(1), 37–78.
2. Nallamothu, T. K. (2023). Enhance Cross-Device Experiences Using Smart Connect Ecosystem. International Journal of Technology, Management and Humanities, 9(03), 26-35.
3. Amuda, K. K., Kumbum, P. K., Adari, V. K., Chunduru, V. K., & Gonepally, S. (2020). Applying design methodology to software development using WPM method. Journal of Computer Science Applications and Information Technology, 5(1), 1–8. https://doi.org/10.15226/2474-9257/5/1/00146
4. Kindervag, J. (2010). No more chewy centers: Introducing the zero trust model of information security. Forrester Research.
5. Sugumar R., et.al IMPROVED PARTICLE SWARM OPTIMIZATION WITH DEEP LEARNING-BASED MUNICIPAL SOLID WASTE MANAGEMENT IN SMART CITIES, Revista de Gestao Social e Ambiental, V-17, I-4, 2023.
6. Rose, S., Borchert, O., Mitchell, S., & Connelly, S. (2020). Zero Trust Architecture (NIST Special Publication 800-207). National Institute of Standards and Technology.
7. Oracle Corporation. (2019). Secure critical data with Oracle Data Safe (White paper).
8. Sangannagari, S. R. (2023). Smart Roofing Decisions: An AI-Based Recommender System Integrated into RoofNav. International Journal of Humanities and Information Technology, 5(02), 8-16.
9. Oracle Corporation. (2023). Cybersecurity solutions and best practices to protect your organization (Oracle white paper).
10. ISACA. (2021). ERP security and controls (ISACA Professional Practices Paper).
11. Adari, V. K., Chunduru, V. K., Gonepally, S., Amuda, K. K., & Kumbum, P. K. (2020). Explainability and interpretability in machine learning models. Journal of Computer Science Applications and Information Technology, 5(1), 1–7. https://doi.org/10.15226/2474-9257/5/1/00148
12. SANS Institute. (2019). ERP security: Understanding and mitigating risks (SANS white paper).
13. Subramanian, G. H. (2017). Cloud ERP implementation and the impact of cloud computing on ERP. International Journal of Enterprise Information Systems, 13(4), 21–34.
14. Vaidya, S., & Seetharaman, P. (2020). Artificial intelligence applications in ERP systems. Information Systems Frontiers, 22(2), 475–491.
15. S. T. Gandhi, "Context Sensitive Image Denoising and Enhancement using U-Nets," Computer Science (MS), Computer Science (GCCIS), Rochester Institute of Technology, 2020. [Online]. Available: https://repository.rit.edu/theses/10588/
16. R., Sugumar (2023). Real-time Migration Risk Analysis Model for Improved Immigrant Development Using Psychological Factors. Migration Letters 20 (4):33-42.
17. Yu, J., Kim, M., Oh, H., & Yang, J. (2021). Real-time abnormal insider event detection on enterprise resource planning systems via predictive auto-regression model. IEEE Access, 9, 62276–62284.
18. Zwilling, M., Lesjak, D., & Kovačič, A. (2020). Cyber security threats and vulnerabilities in ERP systems. Procedia Computer Science, 176, 2242–2250.
19. Vinay Kumar Ch, Srinivas G, Kishor Kumar A, Praveen Kumar K, Vijay Kumar A. (2021). Real-time optical wireless mobile communication with high physical layer reliability Using GRA Method. J Comp Sci Appl Inform Technol. 6(1): 1-7. DOI: 10.15226/2474-9257/6/1/00149
20. Kumbum, P. K., Adari, V. K., Chunduru, V. K., Gonepally, S., & Amuda, K. K. (2023). Navigating digital privacy and security effects on student financial behavior, academic performance, and well-being. Data Analytics and Artificial Intelligence, 3(2), 235–246.
21. Bakumenko, A., & Aivazian, V. (2022). Detecting anomalies in financial data using machine learning. Systems, 10(5), 130.
22. Forrester Research. (2021). The state of zero trust adoption. Forrester.
23. Peng, G., et al. (2018). SAQL: A stream-based query system for real-time abnormal system behavior detection. arXiv preprint.
24. Ramanathan, U.; Rajendran, S. Weighted Particle Swarm Optimization Algorithms and Power Management Strategies for Grid Hybrid Energy Systems. Eng. Proc. 2023, 59, 123. [Google Scholar] [CrossRef]
25. Lanka, S. (2023). Built for the Future How Citrix Reinvented Security Monitoring with Analytics. International Journal of Humanities and Information Technology, 5(02), 26-33.
26. Protiviti. (2020). Oracle Cloud security for ERP applications (white paper).





