Artificial Intelligence Based Anomaly Detection For Secure E-Government Transaction

Authors

  • Muskan Sharma, Dr. P. K. Sharma

Keywords:

e-Government, Artificial Intelligence, Anomaly Detection, Cybersecurity, Blockchain

Abstract

Artificial Intelligence (AI)-based anomaly detection has emerged as a critical technological enabler for strengthening the security and reliability of e-government transactions in the digital era. As public services increasingly migrate to online platforms, the volume and complexity of transactional data have grown exponentially, creating heightened vulnerabilities to cyberattacks, fraud, identity theft, and unauthorized access. This study explores the integration of AI-driven anomaly detection systems—including machine learning, deep learning, and hybrid analytical models—to identify irregular behavioral patterns, detect malicious activities in real time, and minimize false positives that traditionally challenge rule-based systems. The research underscores the significance of automated feature learning, behavioural profiling, and predictive analytics in securing sensitive governmental datasets and ensuring uninterrupted service delivery. Furthermore, it examines the applicability of models such as isolation forests, autoencoders, and recurrent neural networks (RNNs) for detecting subtle deviations within high-dimensional e-government data streams. The paper also discusses architectural considerations, challenges related to data privacy, scalability, and integration with existing government infrastructures. Findings indicate that AI-powered anomaly detection enhances operational transparency, strengthens trust in digital governance, and enables proactive defense mechanisms against emerging threats. Overall, this work contributes a comprehensive framework for adopting intelligent security solutions to safeguard modern e-government ecosystems.

References

V. Chandola, A. Banerjee, and V. Kumar, “Anomaly detection: A survey,” ACM Computing Surveys, vol. 41, no. 3, pp. 1–58, 2009.

M. Ahmed, A. N. Mahmood, and J. Hu, “A survey of network anomaly detection techniques,” Journal of Network and Computer Applications, vol. 60, pp. 19–31, 2016.

M. M. Breunig, H.-P. Kriegel, R. T. Ng, and J. Sander, “LOF: Identifying density-based local outliers,” ACM SIGMOD Record, vol. 29, no. 2, pp. 93–104, 2000.

S. Hawkins, H. He, G. Williams, and R. Baxter, “Outlier detection using replicator neural networks,” in Proc. Int. Conf. Data Warehousing and Knowledge Discovery, 2002, pp. 170–180.

M. T. Ribeiro, S. Singh, and C. Guestrin, “Why should I trust you?: Explaining the predictions of any classifier,” in Proc. 22nd ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining, 2016, pp. 1135–1144.

L. Deng, “A tutorial survey of architectures, algorithms, and applications for deep learning,” APSIPA Transactions on Signal and Information Processing, vol. 3, 2014.

A. Doshi-Velez and B. Kim, “Towards a rigorous science of interpretable machine learning,” arXiv preprint arXiv:1702.08608, 2017.

Kaggle, “Underwater Image Enhancement Dataset,” Available: https://www.kaggle.com, Accessed: 2025.

M. Abadi et al., “TensorFlow: A system for large-scale machine learning,” in 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16), pp. 265–283, 2016.

Y. LeCun, Y. Bengio, and G. Hinton, “Deep learning,” Nature, vol. 521, no. 7553, pp. 436–444, 2015.

Ministry of Electronics and Information Technology, Government of India, “Digital India Programme Overview,” [Online]. Available: https://www.digitalindia.gov.in

AlZu’bi, S., Quiam, F., Al-Zoubi, A. M., & Almiani, M. (2025). Neural Network Architectures for Secure and Sustainable Data Processing in E-Government Systems. Algorithms, 18(10), 601. https://doi.org/10.3390/a18100601

Raza, A. (2024). a Review of Cybersecurity Threats in E- Government Systems: Towards Secure Digital Governance. Multidisciplinary Research in Computing Information Systems, 4(3), 5–12. Retrieved from https://mrcis.org/index.php/journal/article/view/74/76

Bokhari, S. A. A., & Myeong, S. (2023). The Influence of Artificial Intelligence on E-Governance and Cybersecurity in Smart Cities: A Stakeholder’s Perspective. IEEE Access, 11(July), 69783–69797. https://doi.org/10.1109/ACCESS.2023.3293480

Elisa, N., Yang, L., Chao, F., Naik, N., & Boongoen, T. (2023). A Secure and Privacy-Preserving E-Government Framework Using Blockchain and Artificial Immunity. IEEE Access, 11(January), 8773–8789. https://doi.org/10.1109/ACCESS.2023.3239814

Al-Mushayt, O. S. (2019). Automating E-Government Services with Artificial Intelligence. IEEE Access, 7(1), 146821–146829. https://doi.org/10.1109/ACCESS.2019.2946204

Downloads

How to Cite

Muskan Sharma, Dr. P. K. Sharma. (2025). Artificial Intelligence Based Anomaly Detection For Secure E-Government Transaction. International Journal of Engineering Science & Humanities, 15(4), 266–281. Retrieved from https://www.ijesh.com/j/article/view/401

Similar Articles

1 2 3 4 5 6 7 > >> 

You may also start an advanced similarity search for this article.