IDEAS home Printed from https://ideas.repec.org/a/axf/aidtaa/v2y2025i1p98-114.html
   My bibliography  Save this article

Cloud Computing and Machine Learning-Driven Security Optimization and Threat Detection Mechanisms for Telecom Operator Networks

Author

Listed:
  • Ying, Guoli

Abstract

Telecom operator networks are increasingly migrating toward cloud-native architectures enabled by network function virtualization (NFV) and software-defined networking (SDN). This transformation brings flexibility but also exposes new security challenges such as virtualization vulnerabilities, multi-tenant isolation, and dynamic threat propagation. This study proposes a machine learning-driven security optimization framework that integrates adaptive threat detection with reinforcement learning-based policy control. The framework formulates network security management as a multi-objective optimization problem balancing detection accuracy, response latency, and resource efficiency. A layered architecture enables dynamic coordination among detection, orchestration, and policy modules, supporting intelligent and self-adaptive defense in telecom environments. Simulation-based validation verifies the framework's logical feasibility and adaptability, providing a theoretical foundation for intelligent and automated network protection.

Suggested Citation

  • Ying, Guoli, 2025. "Cloud Computing and Machine Learning-Driven Security Optimization and Threat Detection Mechanisms for Telecom Operator Networks," Artificial Intelligence and Digital Technology, Scientific Open Access Publishing, vol. 2(1), pages 98-114.
  • Handle: RePEc:axf:aidtaa:v:2:y:2025:i:1:p:98-114
    as

    Download full text from publisher

    File URL: https://soapubs.com/index.php/aidt/article/view/874/852
    Download Restriction: no
    ---><---

    More about this item

    Keywords

    ;
    ;
    ;
    ;
    ;
    ;

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:axf:aidtaa:v:2:y:2025:i:1:p:98-114. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Yuchi Liu (email available below). General contact details of provider: https://soapubs.com/index.php/ICSS .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.