A Cloud-Native API-Enabled Fraud Detection System: Grey Relational Insights, Machine Learning, and Generative AI for SAP ERP Threat Intelligence
DOI:
https://doi.org/10.15662/IJRAI.2024.0704005Keywords:
Cloud-native architecture, API management, SAP ERP security, Grey Relational Analysis, Machine learning, Generative AI, Fraud detection, Threat intelligence, Anomaly detection, Enterprise securityAbstract
The increasing complexity of enterprise resource planning (ERP) ecosystems has intensified the need for intelligent, adaptive, and cloud-ready security solutions—particularly for SAP-driven infrastructures that manage mission-critical business operations. This paper proposes a cloud-native API-enabled fraud detection system that integrates Grey Relational Analysis (GRA), Machine Learning (ML), and Generative AI to deliver advanced, real-time threat intelligence for SAP ERP environments. The framework leverages cloud-native APIs to ensure scalable data ingestion, cross-module correlation, and seamless interoperability with SAP’s digital core. GRA is employed to quantify multi-dimensional relationships among transactional behaviors, enabling early anomaly detection and context-aware risk scoring. ML classifiers enhance predictive accuracy by learning behavioral patterns from historical records, while Generative AI models simulate adversarial scenarios, strengthen detection thresholds, and improve system resilience against emerging attack vectors. Experimental evaluations demonstrate that the unified architecture significantly reduces false positives, enhances detection fidelity, and supports adaptive, continuous security monitoring. The proposed solution establishes a robust and explainable analytical pipeline capable of supporting real-time fraud mitigation and proactive threat intelligence across SAP ERP ecosystems.References
1. Deng, J. (1982). Control Problems of Grey Systems. Systems & Control Letters. (Foundational Grey System Theory) Wikipedia+1
2. Sridhar Reddy Kakulavaram, Praveen Kumar Kanumarlapudi, Sudhakara Reddy Peram. (2024). Performance Metrics and Defect Rate Prediction Using Gaussian Process Regression and Multilayer Perceptron. International Journal of Information Technology and Management Information Systems (IJITMIS), 15(1), 37-53.
3. Harish, M., & Selvaraj, S. K. (2023, August). Designing efficient streaming-data processing for intrusion avoidance and detection engines using entity selection and entity attribute approach. In AIP Conference Proceedings (Vol. 2790, No. 1, p. 020021). AIP Publishing LLC.
4. Kandula N (2023). Gray Relational Analysis of Tuberculosis Drug Interactions A Multi-Parameter Evaluation of Treatment Efficacy. J Comp Sci Appl Inform Technol. 8(2): 1-10.
5. Anand, L., & Neelanarayanan, V. (2019). Feature Selection for Liver Disease using Particle Swarm Optimization Algorithm. International Journal of Recent Technology and Engineering (IJRTE), 8(3), 6434-6439.
6. Malarkodi, K. P., Sugumar, R., Baswaraj, D., Hasan, A., & Kousalya, A. (2023, March). Cyber Physical Systems: Security Technologies, Application and Defense. In 2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS) (Vol. 1, pp. 2536-2546). IEEE.
7. Vijayaboopathy, V., & Gorle, S. (2023). Chaos Engineering for Microservice-Based Payment Flows Using LitmusChaos and OpenTelemetry. Newark Journal of Human-Centric AI and Robotics Interaction, 3, 528-563.
8. Mani, R. (2022). Enhancing SAP HANA Resilience and Performance on RHEL using Pacemaker: A Strategic Approach to Migration Optimization and Dual-Function Infrastructure Design. International Journal of Computer Technology and Electronics Communication, 5(6), 6061-6074.
9. Zubair, K. M., Akash, T. R., & Chowdhury, S. A. (2023). Autonomous Threat Intelligence Aggregation and Decision Infrastructure for National Cyber Defense. Frontiers in Computer Science and Artificial Intelligence, 2(2), 26-51.
10. Amarapalli, L., Pichaimani, T., & Yakkanti, B. (2022). Advancing Data Integrity in FDA-Regulated Environments Using Automated Meta-Data Review Algorithms. American Journal of Autonomous Systems and Robotics Engineering, 2, 146-184.
11. Sivaraju, P. S. (2023). Thin client and service proxy architectures for X systems in distributed operations. International Journal of Advanced Research in Computer Science & Technology, 6(6), 9510–9515.
12. Uddandarao, D. P., & Vadlamani, R. K. (2025). Counterfactual Forecasting of Human Behavior using Generative AI and Causal Graphs. arXiv preprint arXiv:2511.07484.
13. Muthusamy, M. (2022). AI-Enhanced DevSecOps architecture for cloud-native banking secure distributed systems with deep neural networks and automated risk analytics. International Journal of Research Publication and Engineering Technology Management, 6(1), 7807–7813. https://doi.org/10.15662/IJRPETM.2022.0506014
14. Vasugi, T. (2023). AI-empowered neural security framework for protected financial transactions in distributed cloud banking ecosystems. International Journal of Advanced Research in Computer Science & Technology (IJARCST), 6(2), 7941-7950.
15. Ramakrishna, S. (2022). AI-augmented cloud performance metrics with integrated caching and transaction analytics for superior project monitoring and quality assurance. International Journal of Engineering & Extended Technologies Research (IJEETR), 4(6), 5647–5655. https://doi.org/10.15662/IJEETR.2022.0406005
16. Chen, C. & Ting, K. (2002). Application of Grey Relational Analysis in Multi-criteria Decision Making. International Journal of Engineering Research & Applications. (Overview of GRA method) Humapub+1
17. Barbhuiya, S., Papazachos, Z., Kilpatrick, P., & Nikolopoulos, D. S. (2018). RADS: Real-time Anomaly Detection System for Cloud Data Centres. arXiv preprint. arXiv
18. Adari, V. K. (2024). APIs and open banking: Driving interoperability in the financial sector. International Journal of Research in Computer Applications and Information Technology (IJRCAIT), 7(2), 2015–2024.
19. He, Z., & Lee, R. B. (2021). CloudShield: Real-time Anomaly Detection in the Cloud. arXiv preprint. arXiv
20. Osanaiye, O., Choo, K.-K. R., Dehghantanha, A., Xu, Z., & Dlodlo, M. (2018). Ensemble-based Multi-Filter Feature Selection Method for DDoS Detection in Cloud Computing. arXiv preprint. arXiv
21. Kumar, R. K. (2023). Cloud-integrated AI framework for transaction-aware decision optimization in agile healthcare project management. International Journal of Computer Technology and Electronics Communication (IJCTEC), 6(1), 6347–6355. https://doi.org/10.15680/IJCTECE.2023.0601004
22. Md Al Rafi. (2022). Intelligent Customer Segmentation: A Data- Driven Framework for Targeted Advertising and Digital Marketing Analytics. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 5(5), 7417–7428.
23. Guntupalli, R. (2023). AI-Driven Threat Detection and Mitigation in Cloud Infrastructure: Enhancing Security through Machine Learning and Anomaly Detection. Journal of Informatics Education and Research. JIER
24. Banerjee, S., & Parisa, S. K. (2022). Threat Intelligence-Driven Intrusion Detection Systems for Cloud Infrastructure. International Journal of Sustainable Development in Computer Science & Engineering. journals.threws.com
25. Dharmateja Priyadarshi Uddandarao. (2024). Counterfactual Forecastingof Human Behavior using Generative AI and Causal Graphs. International Journal of Intelligent Systems and Applications in Engineering, 12(21s), 5033 –. Retrievedfrom https://ijisae.org/index.php/IJISAE/article/view/7628
26. Nagarajan, G. (2022). An integrated cloud and network-aware AI architecture for optimizing project prioritization in healthcare strategic portfolios. International Journal of Research and Applied Innovations, 5(1), 6444–6450. https://doi.org/10.15662/IJRAI.2022.0501004
27. Thangavelu, K., Hasenkhan, F., & Saminathan, M. (2022). Transitioning Legacy Enterprise API Gateways to Cloud-Native API Management: Challenges and Best Practices. Essex Journal of AI Ethics and Responsible Innovation, 2, 67-97.
28. Suchitra, R. (2023). Cloud-Native AI model for real-time project risk prediction using transaction analysis and caching strategies. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 6(1), 8006–8013. https://doi.org/10.15662/IJRPETM.2023.0601002
29. Navandar, P. (2023). The Impact of Artificial Intelligence on Retail Cybersecurity: Driving Transformation in the Industry. Journal of Scientific and Engineering Research, 10(11), 177-181.
30. Adari, V. K. (2020). Intelligent Care at Scale AI-Powered Operations Transforming Hospital Efficiency. International Journal of Engineering & Extended Technologies Research (IJEETR), 2(3), 1240-1249.
31. Anand, L., & Neelanarayanan, V. (2019). Liver disease classification using deep learning algorithm. BEIESP, 8(12), 5105–5111.
32. Sabin Begum, R., & Sugumar, R. (2019). Novel entropy-based approach for cost-effective privacy preservation of intermediate datasets in cloud. Cluster Computing, 22(Suppl 4), 9581-9588.
33. Selvi, R., Saravan Kumar, S., & Suresh, A. (2014). An intelligent intrusion detection system using average manhattan distance-based decision tree. In Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 1 (pp. 205-212). New Delhi: Springer India.
34. DARPA. (2011-2014). Anomaly Detection at Multiple Scales (ADAMS) — project on insider threat detection in large data sets. DARPA. Wikipedia+1





