Data Exfiltration Prevention in Enterprise Network Security using AI

Authors

  • Prof. Kwame Boateng Department of Telecommunications, University of Ghana, Ghana Author

Keywords:

data exfiltration, enterprise network security, proactive AI, machine learning

Abstract

Data exfiltration threatens company network security and costs money and reputation. Advanced exfiltration technologies often circumvent firewalls and IDSs. This research addresses proactive AI that avoids corporate network data leaks. AI can identify, anticipate, and prevent illegal data transfers in real time using machine learning, anomaly detection, and predictive analytics. AI methods for network traffic monitoring, user behavior analysis, and data leakage prevention that scale with dynamic risks are discussed in this study. Data exfiltration prevention and AI-driven security solution installation are also covered.

Downloads

Download data is not yet available.

References

Madupati, Bhanuprakash. "Data Science in Public Relations Software Development." Available at SSRN 5076688 (2022).

Singu, Santosh Kumar. "Real-Time Data Integration: Tools, Techniques, and Best Practices." ESP Journal of Engineering & Technology Advancements 1.1 (2021): 158-172.

S. Kumari, “Kanban and Agile for AI-Powered Product Management in Cloud-Native Platforms: Improving Workflow Efficiency Through Machine Learning-Driven Decision Support Systems”, Distrib Learn Broad Appl Sci Res, vol. 5, pp. 867–885, Aug. 2019

Pillai, Vinayak. Anomaly Detection for Innovators: Transforming Data into Breakthroughs. Libertatem Media Private Limited, 2022.

Gondaliya, Jayraj, et al. "Hybrid security RSA algorithm in application of web service." 2018 1st International Conference on Data Intelligence and Security (ICDIS). IEEE, 2018.

Talati, Dhruvitkumar. "Quantum minds: Merging quantum computing with next-gen AI." (2023).

Kalluri, Kartheek. "Migrating Legacy System to Pega Rules Process Commander v7. 1." (2015).

Madupati, Bhanuprakash. "Machine Learning for Cybersecurity in Industrial Control Systems (ICS)." Available at SSRN 5076696 (2022).

S. Kumari, “Cloud Transformation and Cybersecurity: Using AI for Securing Data Migration and Optimizing Cloud Operations in Agile Environments”, J. Sci. Tech., vol. 1, no. 1, pp. 791–808, Oct. 2020.

Singu, Santosh Kumar. "Designing scalable data engineering pipelines using Azure and Databricks." ESP Journal of Engineering & Technology Advancements 1.2 (2021): 176-187.

Talati, Dhruvitkumar. "Artificial intelligence (AI) in mental health diagnosis and treatment." Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online) 2.3 (2023): 251-253.

Kalluri, Kartheek. "ENHANCING CUSTOMER SERVICE EFFICIENCY: A COMPARATIVE STUDY OF PEGA'S AI-DRIVEN SOLUTIONS."

S. Kumari, “AI-Powered Cloud Security for Agile Transformation: Leveraging Machine Learning for Threat Detection and Automated Incident Response ”, Distrib Learn Broad Appl Sci Res, vol. 6, pp. 467–488, Oct. 2020

Madupati, Bhanuprakash. "Cybersecurity in Day-to-Day Life: A Technical Perspective." Available at SSRN 5076692 (2022).

Talati, Dhruvitkumar. "Telemedicine and AI in Remote Patient Monitoring." Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online) 2.3 (2023): 254-255.

Singu, Santosh Kumar. "ETL Process Automation: Tools and Techniques." ESP Journal of Engineering & Technology Advancements 2.1 (2022): 74-85.

Kalluri, Kartheek. "Federate Machine Learning: A Secure Paradigm for Collaborative AI in Privacy-Sensitive Domains." International Journal on Science and Technolo-gy 13.4 (2022): 1-13.

Madupati, Bhanuprakash. "Cybersecurity in the Airline Industry: A Technical Perspective." Available at SSRN 5076684 (2022).

S. Kumari, “AI-Powered Cybersecurity in Agile Workflows: Enhancing DevSecOps in Cloud-Native Environments through Automated Threat Intelligence ”, J. Sci. Tech., vol. 1, no. 1, pp. 809–828, Dec. 2020.

Singu, Santosh Kumar. "Impact of Data Warehousing on Business Intelligence and Analytics." ESP Journal of Engineering & Technology Advancements 2.2 (2022): 101-113.

Kalluri, Kartheek. "Optimizing Financial Services Implementing Pega's Decisioning Capabilities for Fraud Detection." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 10.1 (2022): 1-9.

Talati, Dhruvitkumar. "AI in healthcare domain." Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online) 2.3 (2023): 256-262.

Kalluri, Kartheek. "Blockchain Augment AI: Securing Decision Pipelines Decentralized in Systems."

Downloads

Published

28-12-2023

How to Cite

[1]
P. K. Boateng, “Data Exfiltration Prevention in Enterprise Network Security using AI”, Newark J. Hum. Centric AI Robot Inter., vol. 3, pp. 383–388, Dec. 2023, Accessed: Dec. 21, 2025. [Online]. Available: https://njhcair.org/index.php/publication/article/view/43