Vol. 4 No. 2 (2024): African Journal of Artificial Intelligence and Sustainable Development
Articles

Developing AI-Augmented Security Models for Amazon EKS Workloads

Babulal Shaik
Cloud Solutions Architect at Amazon Web Services, USA

Published 30-07-2024

Keywords

  • Amazon EKS,
  • AI security models

How to Cite

[1]
Babulal Shaik, “Developing AI-Augmented Security Models for Amazon EKS Workloads ”, African J. of Artificial Int. and Sust. Dev., vol. 4, no. 2, pp. 105–124, Jul. 2024, Accessed: Jan. 30, 2025. [Online]. Available: https://africansciencegroup.com/index.php/AJAISD/article/view/224

Abstract

As organizations embrace cloud-native technologies, securing their workloads has become paramount. Amazon Elastic Kubernetes Service (EKS) is a widely adopted solution for managing containerized applications, but it brings a unique set of security challenges. To address these challenges, integrating AI-driven security models offers a promising approach. This paper explores the potential of AI technologies such as machine learning, anomaly detection, & predictive analytics to enhance the security of EKS workloads. It starts by identifying the key security risks organizations face using Amazon EKS, including vulnerabilities in container orchestration, unauthorized access, and the complexities of managing dynamic environments. The paper then examines how AI can be applied to these challenges, offering solutions that respond to threats in real-time and predict and mitigate potential risks before they manifest. AI can analyze vast amounts of data from EKS environments through machine learning models, identifying patterns that may signal malicious activity or system vulnerabilities. Anomaly detection techniques can monitor container behaviour, flagging deviations from normal operations that could indicate a security breach. On the other hand, predictive analytics can help organizations anticipate potential threats, providing proactive measures for risk mitigation. By incorporating these AI-driven approaches, organizations can enhance their ability to protect EKS workloads from emerging threats and optimize their security strategies. Integrating AI technologies can significantly reduce incident response time, automate threat detection, & provide deeper insights into system behaviour. This paper highlights how AI can complement traditional EKS security practices, offering a more robust, adaptive, and predictive security framework. Organizations looking to secure their EKS workloads can benefit from the guidance, leveraging AI to improve their defence mechanisms and stay ahead of evolving security challenges in the cloud-native space.

Downloads

Download data is not yet available.

References

  1. Fornés-Leal, A., Lacalle, I., Palau, C. E., Szmeja, P., Ganzha, M., Paprzycki, M., ... & Blanquer, F. (2022). Assist-iot: A reference architecture for next generation internet of things. In New Trends in Intelligent Software Methodologies, Tools and Techniques (pp. 109-128). IOS Press.
  2. Nita, S. L., & Mihailescu, M. I. (2023). Advances to Homomorphic and Searchable Encryption (pp. 1-136). Springer.
  3. Xu, R., Razavi, S., & Zheng, R. (2023). Edge Video Analytics: A Survey on Applications, Systems and Enabling Techniques. IEEE Communications Surveys & Tutorials.
  4. Baradel, C. (2023). Interaction, Design, and Assessment: An Exploratory Study on ChatGPT in Language Education.
  5. Battina, D. S. (2016). AI-Augmented Automation for DevOps, a Model-Based Framework for Continuous Development in Cyber-Physical Systems. International Journal of Creative Research Thoughts (IJCRT), ISSN, 2320-2882.
  6. Defize, D. R. (2020). Developing a Maturity Model for AI-Augmented Data Management (Master's thesis, University of Twente).
  7. Goriparthi, R. G. (2023). AI-Augmented Cybersecurity: Machine Learning for Real-Time Threat Detection. Revista de Inteligencia Artificial en Medicina, 14(1), 576-594.
  8. Chemodanov, D., Esposito, F., Sukhov, A., Calyam, P., Trinh, H., & Oraibi, Z. (2019). AGRA: AI-augmented geographic routing approach for IoT-based incident-supporting applications. Future Generation Computer Systems, 92, 1051-1065.
  9. Chae, J., Lee, S., Jang, J., Hong, S., & Park, K. J. (2023). A survey and perspective on Industrial Cyber-Physical Systems (ICPS): from ICPS to AI-augmented ICPS. IEEE Transactions on Industrial Cyber-Physical Systems.
  10. Addy, A. L. F. R. E. D. (2023). AI-augmented Governance of the Ghanaian Healthcare Delivery System: Ethical and Privacy Issues in Patients Medical Records, Access and Retrieval. International Journal Of Law Management & Humanities, 6(5), 2066-2091.
  11. Johnson, J. (2019). The AI-cyber nexus: implications for military escalation, deterrence and strategic stability. Journal of Cyber Policy, 4(3), 442-460.
  12. Prikshat, V., Malik, A., & Budhwar, P. (2023). AI-augmented HRM: Antecedents, assimilation and multilevel consequences. Human Resource Management Review, 33(1), 100860.
  13. Jayachitra, S., Prasanth, A., Hariprasath, S., Benazir Begam, R., & Madiajagan, M. (2023). AI enabled internet of medical things in smart healthcare. In AI models for blockchain-based intelligent networks in IoT systems: Concepts, methodologies, tools, and applications (pp. 141-161). Cham: Springer International Publishing.
  14. Ozkaya, I. (2023). Can architecture knowledge guide software development with generative AI?. IEEE Software, 40(5), 4-8.
  15. Tejani, A. S., Elhalawani, H., Moy, L., Kohli, M., & Kahn Jr, C. E. (2022). Artificial intelligence and radiology education. Radiology: Artificial Intelligence, 5(1), e220084.
  16. Nookala, G. (2024). The Role of SSL/TLS in Securing API Communications: Strategies for Effective Implementation. Journal of Computing and Information Technology, 4(1). 2024/2/13
  17. Nookala, G. (2024). Adaptive Data Governance Frameworks for Data-Driven Digital Transformations. Journal of Computational Innovation, 4(1).
  18. Nookala, G. (2023). Real-Time Data Integration in Traditional Data Warehouses: A Comparative Analysis. Journal of Computational Innovation, 3(1).
  19. Komandla, V. Crafting a Clear Path: Utilizing Tools and Software for Effective Roadmap Visualization.
  20. Komandla, V. Enhancing Product Development through Continuous Feedback Integration “Vineela Komandla”.
  21. Thumburu, S. K. R. (2023). Leveraging AI for Predictive Maintenance in EDI Networks: A Case Study. Innovative Engineering Sciences Journal, 3(1).
  22. Thumburu, S. K. R. (2023). AI-Driven EDI Mapping: A Proof of Concept. Innovative Engineering Sciences Journal, 3(1).
  23. Gade, K. R. (2024). Beyond Data Quality: Building a Culture of Data Trust. Journal of Computing and Information Technology, 4(1). 2024/1/9
  24. Gade, K. R. (2024). Cost Optimization in the Cloud: A Practical Guide to ELT Integration and Data Migration Strategies. Journal of Computational Innovation, 4(1).
  25. Gade, K. R. (2023). Data Governance in the Cloud: Challenges and Opportunities. MZ Computing Journal, 4(1).
  26. Katari, A. Case Studies of Data Mesh Adoption in Fintech: Lessons Learned-Present Case Studies of Financial Institutions.
  27. Katari, A. (2023). Security and Governance in Financial Data Lakes: Challenges and Solutions. Journal of Computational Innovation, 3(1).
  28. Boda, V. V. R., & Immaneni, J. (2023). Automating Security in Healthcare: What Every IT Team Needs to Know. Innovative Computer Sciences Journal, 9(1).
  29. Immaneni, J. (2023). Best Practices for Merging DevOps and MLOps in Fintech. MZ Computing Journal, 4(2).
  30. Thumburu, S. K. R. (2022). EDI and Blockchain in Supply Chain: A Security Analysis. Journal of Innovative Technologies, 5(1).
  31. Muneer Ahmed Salamkar. Data Visualization: AI-Enhanced Visualization Tools to Better Interpret Complex Data Patterns. Journal of Bioinformatics and Artificial Intelligence, vol. 4, no. 1, Feb. 2024, pp. 204-26
  32. Muneer Ahmed Salamkar, and Jayaram Immaneni. Data Governance: AI Applications in Ensuring Compliance and Data Quality Standards. Journal of AI-Assisted Scientific Discovery, vol. 4, no. 1, May 2024, pp. 158-83
  33. Muneer Ahmed Salamkar, and Karthik Allam. Architecting Data Pipelines: Best Practices for Designing Resilient, Scalable, and Efficient Data Pipelines. Distributed Learning and Broad Applications in Scientific Research, vol. 5, Jan. 2019
  34. Muneer Ahmed Salamkar. ETL Vs ELT: A Comprehensive Exploration of Both Methodologies, Including Real-World Applications and Trade-Offs. Distributed Learning and Broad Applications in Scientific Research, vol. 5, Mar. 2019
  35. Naresh Dulam, et al. “GPT-4 and Beyond: The Role of Generative AI in Data Engineering”. Journal of Bioinformatics and Artificial Intelligence, vol. 4, no. 1, Feb. 2024, pp. 227-49
  36. Naresh Dulam, et al. “Data Mesh Best Practices: Governance, Domains, and Data Products”. Australian Journal of Machine Learning Research & Applications, vol. 2, no. 1, May 2022, pp. 524-47
  37. Naresh Dulam, et al. “Apache Iceberg 1.0: The Future of Table Formats in Data Lakes”. Journal of AI-Assisted Scientific Discovery, vol. 2, no. 1, Feb. 2022, pp. 519-42
  38. Naresh Dulam, et al. “Kubernetes at the Edge: Enabling AI and Big Data Workloads in Remote Locations”. Journal of AI-Assisted Scientific Discovery, vol. 2, no. 2, Oct. 2022, pp. 251-77
  39. Sarbaree Mishra. “The Lifelong Learner - Designing AI Models That Continuously Learn and Adapt to New Datasets”. Journal of AI-Assisted Scientific Discovery, vol. 4, no. 1, Feb. 2024, pp. 207-2
  40. Sarbaree Mishra, and Jeevan Manda. “Improving Real-Time Analytics through the Internet of Things and Data Processing at the Network Edge ”. Journal of AI-Assisted Scientific Discovery, vol. 4, no. 1, Apr. 2024, pp. 184-06
  41. Sarbaree Mishra. A Distributed Training Approach to Scale Deep Learning to Massive Datasets. Distributed Learning and Broad Applications in Scientific Research, vol. 5, Jan. 2019
  42. Sarbaree Mishra, et al. Training Models for the Enterprise - A Privacy Preserving Approach. Distributed Learning and Broad Applications in Scientific Research, vol. 5, Mar. 2019
  43. Babulal Shaik. Automating Compliance in Amazon EKS Clusters With Custom Policies . Journal of Artificial Intelligence Research and Applications, vol. 1, no. 1, Jan. 2021, pp. 587-10
  44. Babulal Shaik. Developing Predictive Autoscaling Algorithms for Variable Traffic Patterns . Journal of Bioinformatics and Artificial Intelligence, vol. 1, no. 2, July 2021, pp. 71-90