Designing Secure and Scalable Microservices for Threat Detection: Engineering Patterns from Endpoint Security Platforms
DOI:
https://doi.org/10.15662/d1c1sp21Keywords:
Security, Scalability, Threat, Microservices, PlatformsAbstract
In this paper, Endpoint Detection and Response (EDR) systems are analyzed to enhance the detecting
and responding of a threat using secure and scalable microservices. The study employed quantitative technique
on the basis of experimentation, testing, and data examination. Docker and Kubernetes were used to construct the
system with microservices that were responsible in data ingestion, analytics, and alerts. Various capacities of
microservices and security configurations which included basic TLS, zero-trust, and runtime trust were tested.
Throughput and latency, accuracy of detection, and resource utilization were measured in the study. It was
revealed that throughput enhanced by over 150 percent in microservices over monolithic systems. The error rate
of detection reached 97 percent when there were runtime trust models. Time spent and time taken to recover also
enhanced. The conclusion described in the paper is that EDR systems built on microservices have a greater speed,
security, and scalability. They are also able to achieve goals of governance, compliance in an improved way
compared to traditional set-ups. The study provides research evidence regarding how cloud-native and secure
design patterns could be used to create efficient and reliable threat detection sites.
References
]
[2]
[3]
[4]
[5]
Hannousse, A., & Yahiouche, S. (2021). Securing microservices and microservice architectures: A systematic
mapping study. Computer Science Review, 41, 100415. https://doi.org/10.1016/j.cosrev.2021.100415
Barabanov, A., & Makrushin, D. (2020). Authentication and authorization in microservice-based systems:
survey of architecture patterns. arXiv (Cornell University). https://doi.org/10.48550/arxiv.2009.02114
Barabanov, A., & Makrushin, D. (2021). Security audit logging in microservice-based systems: survey of
architecture patterns. arXiv (Cornell University). https://doi.org/10.48550/arxiv.2102.09435
and
case
Flora, J., & Antunes, N. (2024). Evaluating intrusion detection for microservice applications: Benchmark,
dataset,
studies.
Journal
https://doi.org/10.1016/j.jss.2024.112142
of
Systems
and
Software,
216,
112142.
Alboqmi, R., & Gamble, R. F. (2025). Enhancing microservice security through Vulnerability-Driven trust
in the service mesh architecture. Sensors, 25(3), 914. https://doi.org/10.3390/s25030914
[6]
[7]
[8]
[9]
[10]
Kotenko, M., Moskalyk, D., Kovach, V., Osadchyi, V., Zhytomyr Polytechnic State University, Center for
Information-analytical and Technical Support of Nuclear Power Facilities Monitoring of the National
Academy of Sciences of Ukraine, Interregional Academy of Personnel Management, & Borys Grinchenko
Kyiv Metropolitan University. (2024). Navigating the challenges and best practices in securing microservices
architecture. In CPITS-II 2024: Workshop on Cybersecurity Providing in Information and
Telecommunication Systems II [Conference-proceeding]. http://ceur-ws.org
Domakonda, N. D. (2025). Secure and Scalable Microservices architecture : Principles, Benefits, and
challenges. International Journal of Scientific Research in Computer Science Engineering and Information
Technology, 11(2), 1897–1902. https://doi.org/10.32628/cseit23112569
Jaiswal, B. D. (2025). Designing scalable software automation frameworks for cybersecurity threat detection
and response. International Journal of Scientific Research and Management (IJSRM), 13(02), 1958–1980.
https://doi.org/10.18535/ijsrm/v13i02.ec03
International
Aitharaju, N. R. (2024). Complete EDR coverage: A framework for scalable deployment across enterprise
systems.
Journal
of
https://doi.org/10.30574/ijsra.2024.13.2.1129
Science
and Research Archive, 13(2), 1491–1501.
Arif, T., Jo, B., & Park, J. H. (2025). A comprehensive survey of Privacy-Enhancing and Trust-Centric Cloud-
Native security techniques against cyber threats. Sensors, 25(8), 2350. https://doi.org/10.3390/s25082350





