International Journal of Innovative Research in Engineering and Management
Year: 2025, Volume: 12, Issue: 2
First page : ( 16) Last page : ( 21)
Online ISSN : 2350-0557.
DOI: 10.55524/ijirem.2025.12.2.3 |
DOI URL: https://doi.org/10.55524/ijirem.2025.12.2.3
Crossref
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0)
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
Sharad Shyam Ojha , Chandrashekhar Moharir, Amit Choudhury
Rowhammer attacks pose a significant security threat to cloud computing environments, exploiting hardware vulnerabilities in DRAM to manipulate memory contents and compromise system integrity. Traditional mitigation techniques, such as increased refresh rates and error correction codes, often fail to provide adaptive and efficient defenses against evolving Rowhammer variants. This research proposes an AI-driven approach that leverages machine learning for attack detection and reinforcement learning for dynamic mitigation, enhancing the security and reliability of cloud infrastructures. The study evaluates multiple AI models on a cloud-based testbed, demonstrating superior detection accuracy of 97.8%, reduced false positive rates, and improved attack response times compared to conventional methods. The results indicate a significant decrease in system overhead while maintaining a high mitigation success rate of 95.6%. Additionally, the proposed framework showcases adaptability to emerging Rowhammer techniques, ensuring long-term resilience against sophisticated memory-based exploits. The research also explores potential challenges, including computational resource constraints and adversarial AI risks, and proposes solutions such as federated learning for distributed detection and explainable AI for improved transparency. By integrating AI-driven Rowhammer defenses with existing cloud security mechanisms, this study provides a proactive and scalable solution to protect cloud infrastructures against hardware-based attacks, reinforcing the confidentiality, integrity, and availability of cloud services.
Software Development Manager, Amazon, Austin, United States
No. of Downloads: 15 | No. of Views: 886
Manisha Bajpai, Deepshikha, Raj Gaurang Tiwari.
June 2025 - Vol 12, Issue 3
Satyadhar Joshi.
June 2025 - Vol 12, Issue 3
Shweta Sinha.
April 2025 - Vol 12, Issue 2