Designing Secure and Scalable Microservices for Threat Detection: Engineering Patterns from Endpoint Security Platforms

Authors

  • Sindhu Gopakumar Nair Principal Engineer Author

DOI:

https://doi.org/10.15662/d1c1sp21

Keywords:

Security, Scalability, Threat, Microservices, Platforms

Abstract

 In this paper, Endpoint Detection and Response (EDR) systems are analyzed to enhance the detecting 
and responding of a threat using secure and scalable microservices. The study employed quantitative technique 
on the basis of experimentation, testing, and data examination. Docker and Kubernetes were used to construct the 
system with microservices that were responsible in data ingestion, analytics, and alerts. Various capacities of 
microservices and security configurations which included basic TLS, zero-trust, and runtime trust were tested. 
Throughput and latency, accuracy of detection, and resource utilization were measured in the study. It was 
revealed that throughput enhanced by over 150 percent in microservices over monolithic systems. The error rate 
of detection reached 97 percent when there were runtime trust models. Time spent and time taken to recover also 
enhanced. The conclusion described in the paper is that EDR systems built on microservices have a greater speed, 
security, and scalability. They are also able to achieve goals of governance, compliance in an improved way 
compared to traditional set-ups. The study provides research evidence regarding how cloud-native and secure 
design patterns could be used to create efficient and reliable threat detection sites. 

References

]

[2]

[3]

[4]

[5]

Hannousse, A., & Yahiouche, S. (2021). Securing microservices and microservice architectures: A systematic

mapping study. Computer Science Review, 41, 100415. https://doi.org/10.1016/j.cosrev.2021.100415

Barabanov, A., & Makrushin, D. (2020). Authentication and authorization in microservice-based systems:

survey of architecture patterns. arXiv (Cornell University). https://doi.org/10.48550/arxiv.2009.02114

Barabanov, A., & Makrushin, D. (2021). Security audit logging in microservice-based systems: survey of

architecture patterns. arXiv (Cornell University). https://doi.org/10.48550/arxiv.2102.09435

and

case

Flora, J., & Antunes, N. (2024). Evaluating intrusion detection for microservice applications: Benchmark,

dataset,

studies.

Journal

https://doi.org/10.1016/j.jss.2024.112142

of

Systems

and

Software,

216,

112142.

Alboqmi, R., & Gamble, R. F. (2025). Enhancing microservice security through Vulnerability-Driven trust

in the service mesh architecture. Sensors, 25(3), 914. https://doi.org/10.3390/s25030914

[6]

[7]

[8]

[9]

[10]

Kotenko, M., Moskalyk, D., Kovach, V., Osadchyi, V., Zhytomyr Polytechnic State University, Center for

Information-analytical and Technical Support of Nuclear Power Facilities Monitoring of the National

Academy of Sciences of Ukraine, Interregional Academy of Personnel Management, & Borys Grinchenko

Kyiv Metropolitan University. (2024). Navigating the challenges and best practices in securing microservices

architecture. In CPITS-II 2024: Workshop on Cybersecurity Providing in Information and

Telecommunication Systems II [Conference-proceeding]. http://ceur-ws.org

Domakonda, N. D. (2025). Secure and Scalable Microservices architecture : Principles, Benefits, and

challenges. International Journal of Scientific Research in Computer Science Engineering and Information

Technology, 11(2), 1897–1902. https://doi.org/10.32628/cseit23112569

Jaiswal, B. D. (2025). Designing scalable software automation frameworks for cybersecurity threat detection

and response. International Journal of Scientific Research and Management (IJSRM), 13(02), 1958–1980.

https://doi.org/10.18535/ijsrm/v13i02.ec03

International

Aitharaju, N. R. (2024). Complete EDR coverage: A framework for scalable deployment across enterprise

systems.

Journal

of

https://doi.org/10.30574/ijsra.2024.13.2.1129

Science

and Research Archive, 13(2), 1491–1501.

Arif, T., Jo, B., & Park, J. H. (2025). A comprehensive survey of Privacy-Enhancing and Trust-Centric Cloud-

Native security techniques against cyber threats. Sensors, 25(8), 2350. https://doi.org/10.3390/s25082350

Downloads

Published

2025-11-08

How to Cite

Designing Secure and Scalable Microservices for Threat Detection: Engineering Patterns from Endpoint Security Platforms . (2025). International Journal of Engineering & Extended Technologies Research (IJEETR), 7(6), 11200-11209. https://doi.org/10.15662/d1c1sp21