Scalable Cloud-Based Machine Learning for Fraud and Network Threat Intelligence in Financial Markets Leveraging Healthcare Analytics

Authors

  • Rafael André Carvalho Monteiro Senior Project Manager, Brazil Author

DOI:

https://doi.org/10.15680/IJCTECE.2025.0806815

Keywords:

Scalable Machine Learning, Cloud Computing, Fraud Detection, Network Threat Intelligence, Financial Markets, Healthcare Analytics, Anomaly Detection, Predictive Modeling, Cybersecurity, Big Data

Abstract

The rapid digitization of financial markets has amplified the risks of network intrusions and fraudulent activities, necessitating advanced analytics for proactive threat detection. This research presents a scalable, cloud-based machine learning framework that leverages methodologies from healthcare analytics to enhance fraud and network threat intelligence in financial systems. By adapting predictive modeling, anomaly detection, and risk assessment techniques commonly used in healthcare data analysis, the proposed system can identify suspicious transactions and network anomalies in real time. The cloud infrastructure enables high-throughput processing of large-scale financial data while ensuring scalability and resilience. Experimental evaluations on simulated and real-world financial datasets demonstrate significant improvements in detection accuracy, reduced false-positive rates, and faster response times compared to traditional methods. The integration of healthcare analytics principles provides a novel perspective for modeling risk and identifying complex patterns, establishing a robust approach to secure financial markets against evolving cyber threats.

References

1. Denning, D. E. (1987). An intrusion-detection model. IEEE Transactions on Software Engineering, 13(2), 222–232.

2. Adari, V. K. (2024). The Path to Seamless Healthcare Data Exchange: Analysis of Two Leading Interoperability Initiatives. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 7(6), 11472-11480.

3. Binu, C. T., Kumar, S. S., Rubini, P., & Sudhakar, K. (2024). Enhancing Cloud Security through Machine Learning-Based Threat Prevention and Monitoring: The Development and Evaluation of the PBPM Framework. https://www.researchgate.net/profile/Binu-C-T/publication/383037713_Enhancing_Cloud_Security_through_Machine_Learning-Based_Threat_Prevention_and_Monitoring_The_Development_and_Evaluation_of_the_PBPM_Framework/links/66b99cfb299c327096c1774a/Enhancing-Cloud-Security-through-Machine-Learning-Based-Threat-Prevention-and-Monitoring-The-Development-and-Evaluation-of-the-PBPM-Framework.pdf

4. Anand, L., Tyagi, R., Mehta, V. (2024). Food Recognition Using Deep Learning for Recipe and Restaurant Recommendation. In: Bhateja, V., Lin, H., Simic, M., Attique Khan, M., Garg, H. (eds) Cyber Security and Intelligent Systems. ISDIA 2024. Lecture Notes in Networks and Systems, vol 1056. Springer, Singapore. https://doi.org/10.1007/978-981-97-4892-1_23

5. Sridhar Reddy Kakulavaram, Praveen Kumar Kanumarlapudi, Sudhakara Reddy Peram. (2024). Performance Metrics and Defect Rate Prediction Using Gaussian Process Regression and Multilayer Perceptron. International Journal of Information Technology and Management Information Systems (IJITMIS), 15(1), 37-53.

6. Parameshwarappa, N. (2025). Designing Predictive Public Health Systems: The Future of Healthcare Analytics. Journal of Computer Science and Technology Studies, 7(7), 363-369.

7. Prabaharan, G., Sankar, S. U., Anusuya, V., Deepthi, K. J., Lotus, R., & Sugumar, R. (2025). Optimized disease prediction in healthcare systems using HDBN and CAEN framework. MethodsX, 103338.

8. Christadoss, J., Kalyanasundaram, P. D., & Vunnam, N. (2024). Hybrid GraphQL-FHIR Gateway for Real-Time Retail-Health Data Interchange. Essex Journal of AI Ethics and Responsible Innovation, 4, 204-238.

9. Rahman, M. R., Tohfa, N. A., Arif, M. H., Zareen, S., Alim, M. A., Hossen, M. S., ... & Bhuiyan, T. (2025). Enhancing android mobile security through machine learning-based malware detection using behavioral system features.

10. Khan, M. I. (2025). Big Data Driven Cyber Threat Intelligence Framework for US Critical Infrastructure Protection. Asian Journal of Research in Computer Science, 18(12), 42-54.

11. Nagarajan, G. (2022). An integrated cloud and network-aware AI architecture for optimizing project prioritization in healthcare strategic portfolios. International Journal of Research and Applied Innovations, 5(1), 6444–6450. https://doi.org/10.15662/IJRAI.2022.0501004

12. Muthusamy, M. (2025). A Scalable Cloud-Enabled SAP-Centric AI/ML Framework for Healthcare Powered by NLP Processing and BERT-Driven Insights. International Journal of Computer Technology and Electronics Communication, 8(5), 11457-11462.

13. Vasugi, T. (2022). AI-Optimized Multi-Cloud Resource Management Architecture for Secure Banking and Network Environments. International Journal of Research and Applied Innovations, 5(4), 7368-7376.

14. Kumar, R. K. (2024). Real-time GenAI neural LDDR optimization on secure Apache–SAP HANA cloud for clinical and risk intelligence. IJEETR, 8737–8743. https://doi.org/10.15662/IJEETR.2024.0605006

15. Sivaraju, P. S. (2024). Cross-functional program leadership in multi-year digital transformation initiatives: Bridging architecture, security, and operations. International Journal of Advanced Research in Computer Science & Technology (IJARCST), 7(6), 11374-11380.

16. Vijayaboopathy, V., Yakkanti, B., & Surampudi, Y. (2023). Agile-driven Quality Assurance Framework using ScalaTest and JUnit for Scalable Big Data Applications. Los Angeles Journal of Intelligent Systems and Pattern Recognition, 3, 245-285.

17. Rodrigues, G. N., Mir, M. N. H., Bhuiyan, M. S. M., Rafi, M. D. A. L., Hoque, A. M., Maua, J., & Mridha, M. F. (2025). NLP-driven customer segmentation: A comprehensive review of methods and applications in personalized marketing. Data Science and Management.

18. Archana, R., & Anand, L. (2023, May). Effective Methods to Detect Liver Cancer Using CNN and Deep Learning Algorithms. In 2023 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI) (pp. 1-7). IEEE.

19. Burila, R. K., Pichaimani, T., & Ramesh, S. (2023). Large Language Models for Test Data Fabrication in Healthcare: Ensuring Data Security and Reducing Testing Costs. Cybersecurity and Network Defense Research, 3(2), 237-279.

20. Tamizharasi, S., Rubini, P., Saravana Kumar, S., & Arockiam, D. Adapting federated learning-based AI models to dynamic cyberthreats in pervasive IoT environments.

21. Kusumba, S. (2025). Modernizing Healthcare Finance: An Integrated Budget Analytics Data Warehouse for Transparency and Performance. Journal of Computer Science and Technology Studies, 7(7), 567-573.

22. Adari, V. K. (2024). APIs and open banking: Driving interoperability in the financial sector. International Journal of Research in Computer Applications and Information Technology (IJRCAIT), 7(2), 2015–2024.

23. Sugumar, R. (2025). Separating Technology and Trust: A Survey Analysis of Patients’ Attitudes toward AI-Assisted Healthcare Decision-Making. International Journal of Humanities and Information Technology, 7(01), 72-79.

24. Nadiminty, Y. (2025). Accelerating Cloud Modernization with Agentic AI. Journal of Computer Science and Technology Studies, 7(9), 26-35.

Downloads

Published

2025-12-22

How to Cite

Scalable Cloud-Based Machine Learning for Fraud and Network Threat Intelligence in Financial Markets Leveraging Healthcare Analytics. (2025). International Journal of Computer Technology and Electronics Communication, 8(Special Issue 1), 85-91. https://doi.org/10.15680/IJCTECE.2025.0806815