Securing the Cloud Storage Using Novel Machine Learning-based Intrusion Detection System


  • Deeksha Chaudhary, Gowrishankar Jayaraman, Vishal Sharma, Sadaf Hashmi, Deepak Minhas


Cloud Security Cloud Storage,Gorilla Troops fine-tuned Modified Random Forest (GT-MRF), Machine Learning, Intrusion Detection


Intrusion detection is an approach for detecting unauthorized access or malicious behavior inside a system. When applied to cloud storage, it entails monitoring and analyzingnetwork activity, system records and consumer activity to identify any possible security vulnerabilities or abnormalities. This proactive method assists in securing sensitive data and the integrity of cloud-based infrastructure, ensuring persistent security against cyber-attacks. In this study, we produced an intelligent intrusion detection algorithm named Gorilla Troops fine-tuned Modified Random Forest (GTO-MRF) for enhancing security in cloud storage. Initially, we collected a dataset comprising simulated cloud-based intrusion scenarios and a variety of attack types. The proposed model was evaluated using this diverse dataset to enhance security measures. UnitVector Transformation (UVT) algorithm is employed to pre-process the gathered raw data. We extracted primary features from the pre-processed data using Kernel Principal Component Analysis (KPCA). The Gorilla Troops Optimization (GTO) approach improves the approach by adjusting the tree architectures and feature importance weights. We implemented the proposed model in software. The result evaluation phase is performed with multiple metrics such as training time, False alarm rate and encryption time to evaluate the suggested GT-MRF approach. We conducted a comparison analysis with other conventional methodologies. The experimental results illustrate that the proposed GT-MRF approach performed better than other conventional approaches for enhanced intrusion detection models in cloud storage.


Download data is not yet available.


Attou, H., Mohy-eddine, M., Guezzaz, A., Benkirane, S., Azrour, M., Alabdultif, A., &Almusallam, N. (2023). Towards an intelligent intrusion detection system to detect malicious activities in cloud computing. Applied Sciences, 13(17), 9588.

Horchulhack, P., Viegas, E. K., &Santin, A. O. (2022). Toward feasible machine learning model updates in network-based intrusion detection. Computer Networks, 202, 108618.

Dina, A. S., &Manivannan, D. (2021). Intrusion detection based on machine learning techniques in computer networks. Internet of Things, 16, 100462.

Meryem, A., &Ouahidi, B. E. (2020). Hybrid intrusion detection system using machine learning. Network Security, 2020(5), 8-19.

Hossain, M. A., & Islam, M. S. (2023). Ensuring network security with a robust intrusion detection system using ensemble-based machine learning. Array, 19, 100306.

Seth, S., Singh, G., &KaurChahal, K. (2021). A novel time-efficient learning-based approach for smart intrusion detection system. Journal of Big Data, 8(1), 1-28.

Khraisat, A., Gondal, I., Vamplew, P., &Kamruzzaman, J. (2019). Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity, 2(1), 1-22.

Khan, M. A., & Kim, Y. (2021). Deep Learning-Based Hybrid Intelligent Intrusion Detection System. Computers, Materials & Continua, 68(1).

Ponnusamy, V., Humayun, M., Jhanjhi, N. Z., Yichiet, A., &Almufareh, M. F. (2022). Intrusion Detection Systems in Internet of Things and Mobile Ad-Hoc Networks. Computer Systems Science & Engineering, 40(3).

Saif, S., Das, P., Biswas, S., Khari, M., &Shanmuganathan, V. (2022). HIIDS: Hybrid intelligent intrusion detection system empowered with machine learning and metaheuristic algorithms for application in IoT based healthcare. Microprocessors and Microsystems, 104622.

Elmasry, W., Akbulut, A., &Zaim, A. H. (2021). A design of an integrated cloud-based intrusion detection system with third party cloud service. Open Computer Science, 11(1), 365-379.

Amouri, A., Alaparthy, V. T., &Morgera, S. D. (2020). A machine learning based intrusion detection system for mobile Internet of Things. Sensors, 20(2), 461.

Atul, D. J., Kamalraj, R., Ramesh, G., Sankaran, K. S., Sharma, S., &Khasim, S. (2021). A machine learning based IoT for providing an intrusion detection system for security. Microprocess. Microsystems, 82, 103741.

Ahmad, Z., Shahid Khan, A., WaiShiang, C., Abdullah, J., & Ahmad, F. (2021). Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies, 32(1), e4150.

Rani, D., &Kaushal, N. C. (2020, July). Supervised machine learning based network intrusion detection system for Internet of Things. In 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT) (pp. 1-7). IEEE.

Sahar, N., Mishra, R., &Kalam, S. (2021). Deep learning approach-based network intrusion detection system for fog-assisted iot. In Proceedings of international conference on big data, machine learning and their applications: ICBMA 2019 (pp. 39-50). Springer Singapore.

Elsayed, R. A., Hamada, R. A., Abdalla, M. I., &Elsaid, S. A. (2023). Securing IoT and SDN systems using deep-learning based automatic intrusion detection. Ain Shams Engineering Journal, 14(10), 102211.

Kasongo, S. M., & Sun, Y. (2020). Performance analysis of intrusion detection systems using a feature selection method on the UNSW-NB15 dataset. Journal of Big Data, 7, 1-20.

Suthanthiramani, P., Muthurajkumar, S., Sannasi, G., &Arputharaj, K. (2021). Secured data storage and retrieval using elliptic curve cryptography in cloud. Int. Arab J. Inf. Technol., 18(1), 56-66.

Islam, U., Al-Atawi, A., Alwageed, H. S., Ahsan, M., Awwad, F. A., &Abonazel, M. R. (2023). Real-Time Detection Schemes for Memory DoS (M-DoS) Attacks on Cloud Computing Applications. IEEE Access.




How to Cite

Vishal Sharma, Sadaf Hashmi, Deepak Minhas, D. C. G. J. . (2024). Securing the Cloud Storage Using Novel Machine Learning-based Intrusion Detection System. International Journal of Intelligent Systems and Applications in Engineering, 12(21s), 1442–1448. Retrieved from



Research Article