AI-DRIVEN TRANSFORMATION OF MAINFRAME ENVIRONMENTS: A COMPREHENSIVE FRAMEWORK FOR OPERATIONAL RESILIENCE

Authors

  • Jagadish Raju Frisco Analytics LLC, USA Author

Keywords:

Artificial Intelligence (AI), Cybersecurity, Artificial Neural Networks (ANNS), Hybrid Encryption

Abstract

This article explores the transformative potential of integrating artificial intelligence (AI), machine learning (ML), and generative AI technologies to enhance operational resilience in mainframe environments. As mainframes play a critical role in enterprise computing, ensuring their robustness, scalability, and adaptability becomes paramount. We present a comprehensive framework that leverages AI for process automation, intelligent resource allocation, and predictive maintenance; ML for anomaly detection, capacity planning, and data-driven decision-making; and generative AI for advanced content creation, incident response, and documentation. By synthesizing these technologies, we demonstrate how mainframe operations can achieve unprecedented efficiency, security, and adaptability levels. Our article includes case studies of successful implementations, addresses potential challenges such as legacy system integration and data privacy concerns, and discusses the evolving role of human operators in AI-enhanced environments. This article provides valuable insights for mainframe operators, IT strategists, and organizations seeking to future-proof their critical infrastructure in an increasingly dynamic digital landscape.

References

Shakor, M. Y., Khaleel, M. I., Safran, M., Alfarhood, S., & Zhu, M. (2024). Dynamic AES Encryption and Blockchain Key Management: a novel solution for cloud data security. IEEE Access, 1. https://doi.org/10.1109/access.2024.3351119

Choithani, T., Chowdhury, A., Patel, S., Patel, P., Patel, D., & Shah, M. (2024). “A Comprehensive Study of Artificial Intelligence and Cybersecurity on Bitcoin, Crypto Currency and Banking System.”

Tariq, E., Akour, I., Al-Shanableh, N., Alquqa, E. K., Alzboun, N., Al-Hawary, S. I. S., & Alshurideh, M. T. (2024). “How cybersecurity influences fraud prevention: An empirical study on Jordanian commercial”

Sharma, H., Sharma, G., & Kumar, N. (2024). AI-assisted secure data transmission techniques for next-generation HetNets: A review. In Elsevier B.V., ScienceDirect, Galgotias University, Bennett University, & Thapar Institute of Engineering and Technology, Computer Communications (Vol. 21)

Almalawi, A., Hassan, S., Fahad, A., & Khan, A. I. (2024). A hybrid cryptographic mechanism for secure data transmission in edge AI networks. ˜the œInternational Journal of Computational Intelligence Systems/International Journal of Computational Intelligence Systems, 17(1). https://doi.org/10.1007/s44196-024-00417-8

Dhiyanesh, B., Shakkeera, L., Azath, H., Viswanathan, S. K., & Poonuramu, V. (2023). Improved Privacy of Data Transaction in IoT-Enabled Blockchain Technology Using Privacy-Based Machine Learning Algorithms. In Revolutionizing Digital Healthcare Through Blockchain Technology Applications (pp. 187-206). IGI Global.

Chakraborty, C., Nagarajan, S. M., Devarajan, G. G., Ramana, T. V., & Mohanty, R. (2023). Intelligent AI-based Healthcare Cyber Security System using Multi-Source Transfer Learning Method. ACM Transactions on Sensor Networks. https://doi.org/10.1145/3597210

Alshehri, M. (2023). Blockchain-assisted cyber security in medical things using artificial intelligence. Electronic Research Archive, 31(2), 708–728. https://doi.org/10.3934/era.2023035

Farivar, F., Haghighi, M. S., Jolfaei, A., & Alazab, M. (2020). Artificial intelligence for detection, estimation, and compensation of malicious attacks in nonlinear Cyber-Physical systems and industrial IoT. IEEE Transactions on Industrial

Informatics, 16(4), 2716–2725. https://doi.org/10.1109/tii.2019.2956474

Kim, S., Hwang, C., Lee, T., & Department of Information Security, Hoseo University. (2020). Anomaly based unknown intrusion detection in endpoint environments. Electronics, 9, 1022. https://doi.org/10.3390/electronics9061022

P. Hakonen, “Detecting Insider Threats Using User and Entity Behavior Analytics,” 2022, Accessed: Feb. 20, 2024.

[Online]. Available: http://www.theseus.fi/handle/10024/786079.

L. Universitet and +++ S.------L., “Anomaly detection for automated security log analysis : Comparison of existing techniques and tools,” 2021, Accessed: Feb. 20, 2024. [Online]. Available: https://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177728.

Kern, M., Skopik, F., Landauer, M., & Weippl, E. (2022). Strategic selection of data sources for cyber attack detection in enterprise networks. Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing. https://doi.org/10.1145/3477314.3507022

“What is Incident Response? Definition and Example” https://darktrace.com/cyber-ai-glossary/incident-response (Accessed May 02 2024)

“Incident Response Policy: A Quick Guide” https://www.cynet.com/incidentresponse/incident-response-policy-a-quick-guide/ (Accessed May 02 2024)

“Cortex XSOAR: Security Orchestration and Automation –Palo Alto Networks”. https://www.paloaltonetworks.com/cortex/cortex-xsoar(Accessed May 02 2024)

Kshirsagar, Aniruddha Prakash, and L. Shakkeera. "Deep Learning Based Hybrid Approach for Crowd Anomalous Behavior Detection." International Virtual Conference on Industry. Singapore: Springer Nature Singapore, 2021.

Shakkeera, L., et al. "An information and predictive credibility control system using blockchain technique." Journal of Physics: Conference Series. Vol. 1964. No. 4. IOP Publishing, 2021.

Downloads

Published

2024-09-28

How to Cite

Jagadish Raju. (2024). AI-DRIVEN TRANSFORMATION OF MAINFRAME ENVIRONMENTS: A COMPREHENSIVE FRAMEWORK FOR OPERATIONAL RESILIENCE. INTERNATIONAL JOURNAL OF ENGINEERING AND TECHNOLOGY RESEARCH (IJETR), 9(2), 420-433. https://lib-index.com/index.php/IJETR/article/view/IJETR_09_02_037