Autonomous Risk Mitigation across Multi-Tenant Platforms through Artificial Intelligence–Based Diversion Techniques

Authors

  • Dr. Rafael Souza Faculty of Intelligent Computing, Federal Center for Advanced Informatics, São Paulo, Brazil

Keywords:

Multi-Tenant Systems, Artificial Intelligence Security, Risk Mitigation, Traffic Diversion

Abstract

Multi-tenant computing platforms have become foundational to modern cloud-native ecosystems, enabling shared infrastructure utilization across heterogeneous users, applications, and services. While multi-tenancy enhances scalability and cost efficiency, it simultaneously introduces amplified security risks due to shared resource contention, cross-tenant interference, and expanded attack surfaces. Traditional isolation mechanisms and perimeter-based security models are increasingly insufficient to mitigate adaptive cyber threats that exploit tenant adjacency, workload co-location, and dynamic resource orchestration.

This paper proposes an autonomous risk mitigation framework for multi-tenant platforms based on artificial intelligence–driven diversion techniques. The framework introduces adaptive traffic diversion, intelligent workload redirection, and deception-based risk absorption mechanisms designed to minimize exposure of critical tenant assets while preserving service continuity. The proposed system integrates machine learning–based risk scoring, behavioral anomaly detection, and reinforcement learning–enabled diversion policies to dynamically reconfigure traffic flows in response to evolving threat conditions.

A game-theoretic and decision-theoretic model is developed to represent adversarial interactions between malicious actors and autonomous mitigation agents within multi-tenant environments. The framework further incorporates ethical constraints and safety requirements derived from autonomous system governance standards, ensuring alignment with responsible AI principles and regulatory expectations (Arkin, 2016; Jobin et al., 2019). The methodology is evaluated through theoretical simulation of cloud-based multi-tenant infrastructures under attack scenarios involving lateral movement, tenant isolation bypass attempts, and workload manipulation.

Results indicate that AI-based diversion techniques significantly reduce successful cross-tenant attack propagation, improve isolation robustness, and enhance system survivability under coordinated adversarial pressure. The system demonstrates strong adaptability under concept drift conditions and evolving attack patterns (Gama et al., 2014). Furthermore, integration of reinforcement learning–driven deception strategies enhances real-time responsiveness and reduces mean exposure windows, consistent with prior findings in adaptive cyber deception research (Pesaramilli & Gudisa, 2025).

The study contributes a unified framework for autonomous risk mitigation in multi-tenant systems, bridging cybersecurity, artificial intelligence, and distributed systems engineering. It further identifies limitations related to diversion detectability, computational overhead, and ethical constraints in autonomous decision-making systems.

References

1. Giannaros, A. Karras, L. Theodorakopoulos, C. Karras, P. Kranias, N. Schizas, G. Kalogeratos, and D. Tsolis, “Autonomous vehicles: Sophisticated attacks, safety issues, challenges, open topics, blockchain, and future directions,” J. Cybersecur. Privacy, vol. 3, no. 3, pp. 493–543, Aug. 2023, doi: 10.3390/jcp3030025.

2. Kumar, “Exploring ethical considerations in AI-driven autonomous vehicles: Balancing safety and privacy,” J. Artif. Intell. Gen. Sci., vol. 2, no. 1, pp. 125–138, Mar. 2024, doi: 10.60087/jaigs.v2i1.p138.

3. Jha and K. S. Patnaik, “Self-driving cars: Role of machine learning,” in Handbook of Research on Emerging Trends and Applications of Machine. New York, NY, USA : IGI Global, Jan. 2020, pp. 490–507, doi: 10.4018/978-1-5225-9643-1.ch023.

4. Jobin, M. Ienca, and E. Vayena, “The global landscape of AI ethics guidelines,” Nature Mach. Intell., vol. 1, no. 9, pp. 389–399, Sep. 2019, doi: 10.1038/s42256-019-0088-2.

5. Krügel and M. Uhl, “The risk ethics of autonomous vehicles: An empirical approach,” Sci. Rep., vol. 14, no. 1, pp. 1–12, Jan. 2024, doi: 10.1038/s41598-024-51313-2.

6. R. Arkin, “Ethics and autonomous systems: Perils and promises [point of view],” Proc. IEEE, vol. 104, no. 10, pp. 1779–1781, Oct. 2016, doi: 10.1109/JPROC.2016.2601162.

7. Ryan, “The future of transportation: Ethical, legal, social and economic impacts of self-driving vehicles in the year 2025,” Sci. Eng. Ethics, vol. 26, no. 3, pp. 1185–1208, Jun. 2020, doi: 10.1007/s11948-019-00130-2.

8. S. Hansson, M.-Å. Belin, and B. Lundgren, “Self-driving vehicles—An ethical overview,” Philosophy Technol., vol. 34, no. 4, pp. 1383–1408, Aug. 2021, doi: 10.1007/s13347-021-00464-5.

9. V. Dignum, “Ethics in artificial intelligence: Introduction to the special issue,” Ethics Inf. Technol., vol. 20, no. 1, pp. 1–3, Feb. 13, 2018, doi: 10.1007/s10676-018-9450-z.

10. V. Dubljevic, G. List, J. Milojevich, N. Ajmeri, W. A. Bauer, M. P. Singh, E. Bardaka, T. A. Birkland, C. H. W. Edwards, R. C. Mayer, I. Muntean, T. M. Powers, H. A. Rakha, V. A. Ricks, and M. S. Samandar, “Toward a rational and ethical sociotechnical system of autonomous vehicles: A novel application of multi-criteria decision analysis,” PLoS ONE, vol. 16, no. 8, Aug. 2021, Art. no. e0256224.

11. Giannaros, A. Karras, L. Theodorakopoulos, C. Karras, P. Kranias, N. Schizas, G. Kalogeratos, and D. Tsolis, “Autonomous vehicles: Sophisticated attacks, safety issues, challenges, open topics, blockchain, and future directions,” J. Cybersecur. Privacy, vol. 3, no. 3, pp. 493–543, Aug. 2023, doi: 10.3390/jcp3030025.

12. Hallevy, G., “Unmanned vehicles –subordination to criminal law under the modern concept of criminal liability,” J. Law, Inf. Sci., vol. 21, no. 2, pp. 1–11, Jan. 2011, doi: 10.5778/jlis.2011.21.hallevy.1.

13. Hrynko and R. Hrynko, “Autonomous car as a source of damage: Civil law aspect,” Univ. Sci. Notes, Civil Law Civil Process, Leonid Yuzkov Khmelnytskyi Univ. Manage. Law, Khmelnytskyi, Ukraine, Tech. Rep. 3(71), Dec. 2019, pp. 91–100, doi: 10.37491/unz.71.8.

14. Int. Org. for Standardization. ISO 21448: Road Vehicles-Safety of the Intended Functionality. Accessed: Mar. 28, 2025. [Online]. Available: https://www.iso.org/standard/70939.html

15. Int. Org. for Standardization. ISO 26262: Road Vehicles-Functional Safety. Accessed: Mar. 28, 2025. [Online]. Available: https://www.iso.org/standard/68383.html

16. Int. Org. for Standardization. ISO-Building a Responsible AI: How to Manage the AI Ethics Debate. Accessed: Mar. 28, 2025. [Online]. Available: https://www.iso.org/artificial-intelligence/responsible-ai-ethics?

17. I. S. Bangroo, “AI-based predictive analytic approaches for safeguarding the future of electric/hybrid vehicles,” 2023, arXiv:2304.13841.

18. J. Gama, I. Žliobaitė, A. Bifet, M. Pechenizkiy, and A. Bouchachia, “A survey on concept drift adaptation,” ACM Comput. Surv., vol. 46, no. 4, pp. 1–37, Mar. 2014, doi: 10.1145/2523813.

19. K. Papazoglou, A. Dells et al. Language Support for Long-Lived Concurrent Activities. In Proc. ICDCS '96, pp. 698-705, IEEE, 1996.

20. Li, H. Sun, Y. Huang, and H. Chen, “Shapley value: From cooperative game to explainable artificial intelligence,” Auto. Intell. Syst., vol. 4, no. 1, pp. 189–234, Feb. 2024, doi: 10.1007/s43684-023-00060-8.

21. M. Cummings, “Automation bias in intelligent time critical decision support systems,” in Decision Making in Aviation. Evanston, IL, USA : Routledge, 2017, pp. 289–294.

22. M. Cummings, L. C. What Self-Driving Cars Tell Us About AI Risks. IEEE Spectr. Accessed: Mar. 28, 2025. [Online]. Available: https://spectrum.ieee.org/self-driving-cars-2662494269

23. M. P. Papazoglou. Service-Oriented Computing: Concepts, Characteristics and Directions. In Proc. WISE'03 IEEE, pp. 3–12, 2003.

24. M. P. Papazoglou, A. Dells et al. Language Support for Long-Lived Concurrent Activities. In Proc. ICDCS '96, pp. 698-705, IEEE, 1996.

25. M. Vaiman et al., “Risk Assessment of Cascading Outages: Methodologies and Challenges,” IEEE Transactions on Power Systems, vol. 27, pp. 631–641, 2012.

26. M. V. V. Vadlamudi, C. Hamon, O. Gjerde, G. Kjølle, and S. Perkin, “On Improving Data and Models on Corrective Control Failures for Use in Probabilistic Reliability Management,” in 2016 International Conference on Probabilistic Methods Applied to Power Systems (PMAPS), Beijing, 2016.

27. M. V. W3C-WSCI. Web Service Choreography Interface (WSCI) 1.0. Web Services Choreography Working Group, 2002.

28. N. Adnan, S. Md Nordin, M. A. bin Bahruddin, and M. Ali, “How trust can drive forward the user acceptance to the technology? In-vehicle technology for autonomous vehicle,” Transp. Res. A, Policy Pract., vol. 118, pp. 819–836, Dec. 2018, doi: 10.1016/j.tra.2018.10.019.

29. N. Adnan, S. M. Nordin, and M. A. B. Bahruddin, “Sustainable interdependent networks from smart autonomous vehicle to intelligent transportation networks,” in Sustainable Interdependent Networks II. Cham, Swizerland : Springer, Dec. 2018, pp. 121–134, doi: 10.1007/978-3-319-98923-5_7.

30. N. Chikaraishi, D. Khan, B. Yasuda, and A. Fujiwara, “Risk perception and social acceptability of autonomous vehicles: A case study in hiroshima, Japan,” Transp. Policy, vol. 98, pp. 105–115, Nov. 2020, doi: 10.1016/j.tranpol.2020.05.014.

31. J. D. R. Pesaramilli and T. Gudisa, “Real-Time Attack Surface Reduction in Cloud Infrastructures Using Reinforcement Learning-Driven Cyber Deception Strategies,” 2025 Tenth International Conference on Science Technology Engineering and Mathematics (ICONSTEM), Chennai, India, 2025, pp. 1–7, doi: 10.1109/ICONSTEM65670.2025.11374717.

Downloads

Published

2026-03-31

How to Cite

Souza, D. R. (2026). Autonomous Risk Mitigation across Multi-Tenant Platforms through Artificial Intelligence–Based Diversion Techniques. International Journal of Advance Scientific Research, 6(03), 168-179. https://sciencebring.com/index.php/ijasr/article/view/1219

Similar Articles

1-10 of 315

You may also start an advanced similarity search for this article.