Oracle-Driven Cybersecurity and Real-Time ERP Automation: Zero-Downtime BMS and the EDAS Method

Authors

  • Malek Bashir Al-Amin Site Reliability Engineer, Libya Author

DOI:

https://doi.org/10.15662/IJRAI.2024.0705004

Keywords:

Oracle ERP Cloud, business continuity, real-time detection, streaming ML, Oracle Data Safe, zero-trust, automated remediation, audit trails, adaptive authentication

Abstract

Enterprise Resource Planning (ERP) platforms underpin core business operations — finance, procurement, HR, and supply chain — and many organizations now run automated, always-on ERP processes in cloud environments. While automation increases speed and resilience, it also compresses the attack window and amplifies damage from cyber incidents, making business continuity dependent on both rapid detection and automated containment. This paper proposes an Oracle-driven framework that fuses zero-trust principles, Oracle Cloud telemetry and enforcement primitives (database activity monitoring, Data Safe, IAM/adaptive authentication), and streaming AI/ML detection to secure automated ERP operations and preserve business continuity. The framework ingests audit trails, database activity streams, API gateway logs, and identity events into a real-time feature pipeline where sequence-aware and ensemble detectors score activity on sliding windows. High-confidence anomalies trigger policy-driven automated playbooks: graded actions range from soft quarantine and adaptive multi-factor authentication challenges to temporary account suspension and automated workflow rollbacks, with human-in-the-loop gating for high-impact financial operations. The prototype, implemented on an Oracle testbed simulating procure-to-pay and payroll workflows, shows substantial reductions in time-to-detect and time-to-respond compared to baseline static rule engines while preserving auditable evidence and compliance mappings. Key operational challenges identified include model explainability, latency/compute overhead, data-privacy constraints on centralized modeling, and Oracle licensing/cost tradeoffs. The paper therefore recommends a phased, risk-prioritized deployment (start high-value workflows), feature masking for privacy, explainability layers for operator trust, and governance controls that map automated actions to audit evidence. By tightly integrating Oracle native controls and streaming AI detection with policy orchestration, organizations can automate ERP workflows safely and maintain business continuity under fast-moving cyber threats.

References

1. Grabski, S. V., Leech, S. A., & Schmidt, P. J. (2011). A review of ERP research: A future agenda for accounting information systems. Journal of Information Systems, 25(1), 37–78.

2. Rajendran, Sugumar (2023). Privacy preserving data mining using hiding maximum utility item first algorithm by means of grey wolf optimisation algorithm. Int. J. Business Intell. Data Mining 10 (2):1-20.

3. Kindervag, J. (2010). No more chewy centers: Introducing the zero trust model of information security. Forrester Research.

4. Rose, S., Borchert, O., Mitchell, S., & Connelly, S. (2020). Zero Trust Architecture (NIST Special Publication 800-207). National Institute of Standards and Technology.

5. Oracle Corporation. (2019). Secure critical data with Oracle Data Safe (White paper).

6. Oracle Corporation. (2023). Cybersecurity solutions and best practices to protect your organization (Oracle white paper).

7. ISACA. (2021). ERP security and controls (ISACA Professional Practices Paper).

8. Vinay Kumar Ch, Srinivas G, Kishor Kumar A, Praveen Kumar K, Vijay Kumar A. (2021). Real-time optical wireless mobile communication with high physical layer reliability Using GRA Method. J Comp Sci Appl Inform Technol. 6(1): 1-7. DOI: 10.15226/2474-9257/6/1/00149

9. SANS Institute. (2019). ERP security: Understanding and mitigating risks (SANS white paper).

10. Subramanian, G. H. (2017). Cloud ERP implementation and the impact of cloud computing on ERP. International Journal of Enterprise Information Systems, 13(4), 21–34.

11. T. Yuan, S. Sah, T. Ananthanarayana, C. Zhang, A. Bhat, S. Gandhi, and R. Ptucha. 2019. Large scale sign language interpretation. In Proceedings of the 14th IEEE International Conference on Automatic Face Gesture Recognition (FG’19). 1–5.

12. Vaidya, S., & Seetharaman, P. (2020). Artificial intelligence applications in ERP systems. Information Systems Frontiers, 22(2), 475–491.

13. Yu, J., Kim, M., Oh, H., & Yang, J. (2021). Real-time abnormal insider event detection on enterprise resource planning systems via predictive auto-regression model. IEEE Access, 9, 62276–62284.

14. Chunduru, V. K., Gonepally, S., Amuda, K. K., Kumbum, P. K., & Adari, V. K. (2022). Evaluation of human information processing: An overview for human-computer interaction using the EDAS method. SOJ Materials Science & Engineering, 9(1), 1–9.

15. Zwilling, M., Lesjak, D., & Kovačič, A. (2020). Cyber security threats and vulnerabilities in ERP systems. Procedia Computer Science, 176, 2242–2250.

16. Kumbum, P. K., Adari, V. K., Chunduru, V. K., Gonepally, S., & Amuda, K. K. (2023). Navigating digital privacy and security effects on student financial behavior, academic performance, and well-being. Data Analytics and Artificial Intelligence, 3(2), 235–246.

17. Bakumenko, A., & Aivazian, V. (2022). Detecting anomalies in financial data using machine learning. Systems, 10(5), 130.

18. Konda, S. K. (2024). Zero-Downtime BMS Upgrades for Scientific Research Facilities: Lessons from NASA’s Infrared Telescope Project. International Journal of Technology, Management and Humanities, 10(04), 84-94.

19. Dong Wang, Lihua Dai (2022). Vibration signal diagnosis and conditional health monitoring of motor used in biomedical applications using Internet of Things environment. Journal of Engineering 5 (6):1-9.

20. Landauer, M. (2023). Deep learning for anomaly detection in log data: A survey. Journal/Survey (survey article).

21. NeuroQuantology. (2022). Review on security and privacy of cloud ERP systems. NeuroQuantology, 20(15), 303–315.

22. Sangannagari, S. R. (2024). Design and Implementation of a Cloud-Native Automated Certification Platform for Functional Testing and Compliance Validation. International Journal of Technology, Management and Humanities, 10(02), 34-43.

23. Forrester Research. (2021). The state of zero trust adoption. Forrester.

Downloads

Published

2024-09-05

How to Cite

Oracle-Driven Cybersecurity and Real-Time ERP Automation: Zero-Downtime BMS and the EDAS Method. (2024). International Journal of Research and Applied Innovations, 7(5), 11344-11348. https://doi.org/10.15662/IJRAI.2024.0705004