Artificial Intelligence Based Anomaly Detection For Secure E-Government Transaction
Keywords:
e-Government, Artificial Intelligence, Anomaly Detection, Cybersecurity, BlockchainAbstract
Artificial Intelligence (AI)-based anomaly detection has emerged as a critical technological enabler for strengthening the security and reliability of e-government transactions in the digital era. As public services increasingly migrate to online platforms, the volume and complexity of transactional data have grown exponentially, creating heightened vulnerabilities to cyberattacks, fraud, identity theft, and unauthorized access. This study explores the integration of AI-driven anomaly detection systems—including machine learning, deep learning, and hybrid analytical models—to identify irregular behavioral patterns, detect malicious activities in real time, and minimize false positives that traditionally challenge rule-based systems. The research underscores the significance of automated feature learning, behavioural profiling, and predictive analytics in securing sensitive governmental datasets and ensuring uninterrupted service delivery. Furthermore, it examines the applicability of models such as isolation forests, autoencoders, and recurrent neural networks (RNNs) for detecting subtle deviations within high-dimensional e-government data streams. The paper also discusses architectural considerations, challenges related to data privacy, scalability, and integration with existing government infrastructures. Findings indicate that AI-powered anomaly detection enhances operational transparency, strengthens trust in digital governance, and enables proactive defense mechanisms against emerging threats. Overall, this work contributes a comprehensive framework for adopting intelligent security solutions to safeguard modern e-government ecosystems.
References
V. Chandola, A. Banerjee, and V. Kumar, “Anomaly detection: A survey,” ACM Computing Surveys, vol. 41, no. 3, pp. 1–58, 2009.
M. Ahmed, A. N. Mahmood, and J. Hu, “A survey of network anomaly detection techniques,” Journal of Network and Computer Applications, vol. 60, pp. 19–31, 2016.
M. M. Breunig, H.-P. Kriegel, R. T. Ng, and J. Sander, “LOF: Identifying density-based local outliers,” ACM SIGMOD Record, vol. 29, no. 2, pp. 93–104, 2000.
S. Hawkins, H. He, G. Williams, and R. Baxter, “Outlier detection using replicator neural networks,” in Proc. Int. Conf. Data Warehousing and Knowledge Discovery, 2002, pp. 170–180.
M. T. Ribeiro, S. Singh, and C. Guestrin, “Why should I trust you?: Explaining the predictions of any classifier,” in Proc. 22nd ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining, 2016, pp. 1135–1144.
L. Deng, “A tutorial survey of architectures, algorithms, and applications for deep learning,” APSIPA Transactions on Signal and Information Processing, vol. 3, 2014.
A. Doshi-Velez and B. Kim, “Towards a rigorous science of interpretable machine learning,” arXiv preprint arXiv:1702.08608, 2017.
Kaggle, “Underwater Image Enhancement Dataset,” Available: https://www.kaggle.com, Accessed: 2025.
M. Abadi et al., “TensorFlow: A system for large-scale machine learning,” in 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16), pp. 265–283, 2016.
Y. LeCun, Y. Bengio, and G. Hinton, “Deep learning,” Nature, vol. 521, no. 7553, pp. 436–444, 2015.
Ministry of Electronics and Information Technology, Government of India, “Digital India Programme Overview,” [Online]. Available: https://www.digitalindia.gov.in
AlZu’bi, S., Quiam, F., Al-Zoubi, A. M., & Almiani, M. (2025). Neural Network Architectures for Secure and Sustainable Data Processing in E-Government Systems. Algorithms, 18(10), 601. https://doi.org/10.3390/a18100601
Raza, A. (2024). a Review of Cybersecurity Threats in E- Government Systems: Towards Secure Digital Governance. Multidisciplinary Research in Computing Information Systems, 4(3), 5–12. Retrieved from https://mrcis.org/index.php/journal/article/view/74/76
Bokhari, S. A. A., & Myeong, S. (2023). The Influence of Artificial Intelligence on E-Governance and Cybersecurity in Smart Cities: A Stakeholder’s Perspective. IEEE Access, 11(July), 69783–69797. https://doi.org/10.1109/ACCESS.2023.3293480
Elisa, N., Yang, L., Chao, F., Naik, N., & Boongoen, T. (2023). A Secure and Privacy-Preserving E-Government Framework Using Blockchain and Artificial Immunity. IEEE Access, 11(January), 8773–8789. https://doi.org/10.1109/ACCESS.2023.3239814
Al-Mushayt, O. S. (2019). Automating E-Government Services with Artificial Intelligence. IEEE Access, 7(1), 146821–146829. https://doi.org/10.1109/ACCESS.2019.2946204
Downloads
How to Cite
Issue
Section
License
Copyright (c) 2025 International Journal of Engineering, Science and Humanities

This work is licensed under a Creative Commons Attribution 4.0 International License.


