Artificial Intelligence Based Anomaly Detection for Secure E-Government Transaction: A Review

Authors

  • Muskan Sharma, Dr. P. K. Sharma

Keywords:

Artificial Intelligence, Anomaly Detection, E-Government Security, Cybersecurity, Machine Learning

Abstract

The high pace of e-government platforms has revolutionized the way of delivering public services because it has facilitated massive online transactions in authentication, finance, welfare disbursement, land management, and citizen-government interfaces. The growing reliance on digital governance has however demonstrated vulnerability of systems to advanced cyber threats such as data manipulation, identity fraud, access without authorization, malware infiltration and huge-scale coordinated attacks that are beyond the ability of traditional rule based security mechanisms to manage. The present review article explores why the use of Artificial Intelligence (AI)-based anomaly detection is critical in increasing the security, reliability, and resilience of e-government transactions. Through examination of advanced machine learning and deep learning frameworks, including LSTM, autoencoders, graph neural networks, and unsupervised clustering models, the researcher can point out that AI systems are able to learn a behavioral pattern, identify anomalies in real-time, and detect threats pretending to be unknown or zero-day threats with high levels of precision. The literature also indicates that there are new frameworks in the emerging of combining blockchain and artificial immune system, federated learning and hybrid cloud and edge architecture to enhance data integrity and privacy. The results indicate that AI-based anomaly detection offers a scalable, adaptive, and proactive protection mechanism that is necessary in the protection of the modern e-government ecosystems. The paper ends by arguing why ongoing innovation and cross-functional integration are necessary towards developing safe, reliable, and future intensive digital governance structures.

References

Drigas A, Koukianakis L. Government online: an e-government platform to improve public administration operations and services delivery to the citizen. InWorld Summit on Knowledge Society 2009 Sep 16 (pp. 523-532). Berlin, Heidelberg: Springer Berlin Heidelberg.

Raza A. A Review Of Cybersecurity Threats In E-Government Systems: Towards Secure Digital Governance. Multidisciplinary Research in Computing Information Systems. 2024 Jul 2;4(3):131-42.

Azaria A, Richardson A, Kraus S, Subrahmanian VS. Behavioral analysis of insider threat: A survey and bootstrapped prediction in imbalanced data. IEEE Transactions on Computational Social Systems. 2015 Jan 15;1(2):135-55.

Ogunleye OS. Using Artificial Intelligence to Enhance E-Government Services Delivery Through Data Science and Machine Learning. InMachine Learning and Data Science Techniques for Effective Government Service Delivery 2024 (pp. 1-28). IGI Global Scientific Publishing.

Murray A, Begna G, Nwafor E, Blackstone J, Patterson W. Cloud service security & application vulnerability. InSoutheastCon 2015 2015 Apr 9 (pp. 1-8). IEEE.

Mohanty S, Prasanna VK, Neema S, Davis J. Rapid design space exploration of heterogeneous embedded systems using symbolic search and multi-granular simulation. ACM SIGPLAN Notices. 2002 Jun 19;37(7):18-27.

Kremen C. Managing ecosystem services: what do we need to know about their ecology?. Ecology letters. 2005 May;8(5):468-79.

Zubair M, Sabzevari M, Khatri V, Tarkoma S, Hätönen K. Access control for trusted data sharing. EURASIP Journal on Information Security. 2024 Sep 10;2024(1):30.

Edge ME, Sampaio PR. A survey of signature based methods for financial fraud detection. computers & security. 2009 Sep 1;28(6):381-94.

Palli AS, Jaafar J, Gilal AR, Alsughayyir A, Gomes HM, Alshanqiti A, Omar M. Online machine learning from non-stationary data streams in the presence of concept drift and class imbalance: A systematic review. Journal of Information and Communication Technology. 2024;23(1):105-39.

Montasari R, Hosseinian-Far A, Hill R. Policies, innovative self-adaptive techniques and understanding psychology of cybersecurity to counter adversarial attacks in network and cyber environments. Cyber criminology. 2018 Nov 28:71-93.

Abdullayeva FJ. Distributed denial of service attack detection in E-government cloud via data clustering. Array. 2022 Sep 1;15:100229.

Khalil U, Malik OA, Hussain S. A blockchain footprint for authentication of IoT-enabled smart devices in smart cities: State-of-the-art advancements, challenges and future research directions. IEEE Access. 2022 Jul 12;10:76805-23.

Alotaibi A, Aldawghan H, Aljughaiman A. A review of the authentication techniques for internet of things devices in smart cities: opportunities, challenges, and future directions. Sensors. 2025 Mar 7;25(6):1649.

Manchikanti L. Implications of fraud and abuse in interventional pain management. Pain Physician. 2002;5(3):320.

Das RA, Sirazy MR, Khan RS, Rahman SH. A collaborative intelligence (ci) framework for fraud detection in us federal relief programs. Applied Research in Artificial Intelligence and Cloud Computing. 2023;6(9):47-59.

Mustafa G, Rafiq W, Jhamat N, Arshad Z, Rana FA. Blockchain-based governance models in e-government: a comprehensive framework for legal, technical, ethical and security considerations. International Journal of Law and Management. 2025 Jan 2;67(1):37-55.

Mustafa G, Rafiq W, Jhamat N, Arshad Z, Rana FA. Blockchain-based governance models in e-government: a comprehensive framework for legal, technical, ethical and security considerations. International Journal of Law and Management. 2025 Jan 2;67(1):37-55.

Lorenz B, Parasuraman R. Automated and Interactive Real‐Time Systems. Handbook of applied cognition. 2007 Jan 1:415-41.

Ahmad R, Alsmadi I, Alhamdani W, Tawalbeh LA. Zero-day attack detection: a systematic literature review. Artificial Intelligence Review. 2023 Oct;56(10):10733-811.

Singh JP, Aqsa A, Ghani I, Sonani R, Govindarajan V. Privacy-aware hierarchical federated learning in healthcare: integrating differential privacy and secure multi-party computation. Future Internet. 2025 Jul 31;17(8):345.

Laourou AB. The adoption and implementation of data mining in accounting information systems (AIS) within the public sector of Nigeria. IIARD Journals. https://doi. org/10.56201/jafm. 2025;11.

Kuchuk H, Malokhvii E. Integration of IoT with cloud, fog, and edge computing: a review. Advanced Information Systems. 2024 Jun 4;8(2):65-78.

Ball R. Infrastructure requirements for an economically efficient system of public financial reporting and disclosure. Brookings-Wharton papers on financial services. 2001;2001(1):127-69.

Lindstedt C, Naurin D. Transparency is not enough: Making transparency effective in reducing corruption. International political science review. 2010 Jun;31(3):301-22.

Al-Mushayt OS. Automating E-government services with artificial intelligence. IEEE Access. 2019 Oct 8;7:146821-9.

Ibrahim M, Al-Nasrawi S, El-Zaart A, Adams C. Challenges facing e-government and smart sustainable city: An Arab region perspective. In15th European Conference on e-Government, ECEG 2015 Jun 1 (pp. 396-402).

Balamurali A, Kartheeswari B. A Secure and Privacy-Preserving E-Government Framework using Blockchain and Artificial Immunity. (ICSICE 24). 2025;1(Icsice 24):1*8.

Alzu S, Quiam F, Al-zoubi AM, Almiani M. Neural Network Architectures for Secure and Sustainable Data Processing in E-Government Systems. Algorithms Artic. 2025;1(2):1–17.

Lakshmi K, Amarnath N, Farida S, Gowthami G. Enhancing E-Governance Security : The E-GovShield Model Integrating Advanced Cloud Technologies and Threat Mitigation Strategies. Macaw Int J Manag Stud Res. 2024;10(1):1–12.

Elisa NOE, Member S, Yang L, Member S. A Secure and Privacy-Preserving E-Government Framework Using Blockchain and Artificial Immunity. IEEE Access. 2023;11(November 2022):8773–89.

Pamisetty V. Leveraging AI , Big Data , and Cloud Computing for Enhanced Tax Compliance , Fraud Detection , and Fiscal Impact Analysis in Government Financial Management. Int J Sci Res. 2023;12(12):2216–29.

Asad S, Bokhari A, Myeong S. The Influence of Artificial Intelligence on E-Governance and Cybersecurity in Smart Cities : A Stakeholder ’ s Perspective. IEEE Access. 2023;11(June):69783–97.

Al-besher A, Kumar K. Measurement : Sensors Use of artificial intelligence to enhance e-government services. Meas Sensors [Internet]. 2022;24(October):100484. Available from: https://doi.org/10.1016/j.measen.2022.100484

Al-mushayt OS. Automating E-Government Services With Artificial Intelligence. IEEE Access. 2019;7:146821–9.

Downloads

How to Cite

Muskan Sharma, Dr. P. K. Sharma. (2025). Artificial Intelligence Based Anomaly Detection for Secure E-Government Transaction: A Review. International Journal of Research & Technology, 13(4), 513–522. Retrieved from https://ijrt.org/j/article/view/620

Similar Articles

<< < 3 4 5 6 7 8 9 10 11 12 > >> 

You may also start an advanced similarity search for this article.