Cloud Security Redefined: Intrusion Detection System Powered by Deep Learning
Keywords:
Cloud Computing, Deep Learning, Intrusion Detection Systems, Jarratt-Butterfly Optimization, Long Short-Term Memory, Morlet Wavelet Kernel.Abstract
Cloud Computing (CC) provides unparalleled scalability and adaptability, making it integral across industries. However, these benefits come with significant security challenges, such as unauthorized access, data breaches, and insider threats. The shared infrastructure of cloud systems is especially attractive to malicious actors. Addressing these vulnerabilities necessitates robust security mechanisms, with Intrusion Detection Systems (IDS) being a key solution. IDS monitor network and system activities to detect potential intrusions. The integration of machine learning (ML) and deep learning (DL) has enabled IDS to adapt to emerging threats while minimizing false alarms. This study proposes an innovative IDS model incorporating the Morlet Wavelet Kernel Function and an MLSTM (Modified Long Short-Term Memory) classifier. The Jarratt-Butterfly Optimization Algorithm (JBOA) is utilized for feature selection to enhance classification accuracy. Tested on the comprehensive BoT-IoT dataset, the model demonstrates superior performance compared to existing techniques.
Downloads
References
Al-Ghuwairi, A. R., Sharrab, Y., Al-Fraihat, D., AlElaimat, M., Alsarhan, A., & Algarni, A. (2023). Intrusion detection in cloud computing based on time series anomalies utilizing machine learning. Journal of Cloud Computing, 12(1), 127.
Mohamed, D., & Ismael, O. (2023). Enhancement of an IoT hybrid intrusion detection system based on fog-to-cloud computing. Journal of Cloud Computing, 12(1), 41.
Samunnisa, K., Kumar, G. S. V., & Madhavi, K. (2023). Intrusion detection system in distributed cloud computing: Hybrid clustering and classification methods. Measurement: Sensors, 25, 100612.
Attou, H., Guezzaz, A., Benkirane, S., Azrour, M., & Farhaoui, Y. (2023). Cloud-based intrusion detection approach using machine learning techniques. Big Data Mining and Analytics, 6(3), 311-320.
Tariq, M., & Suaib, M. (2023). A review on intrusion detection in cloud computing. International Journal of Engineering and Management Research, 13(2), 207-215.
Kavitha, C., Gadekallu, T. R., K, N., Kavin, B. P., & Lai, W. C. (2023). Filter-based ensemble feature selection and deep learning model for intrusion detection in cloud computing. Electronics, 12(3), 556.
Attou, H., Mohy-eddine, M., Guezzaz, A., Benkirane, S., Azrour, M., Alabdultif, A., & Almusallam, N. (2023). Towards an intelligent intrusion detection system to detect malicious activities in cloud computing. Applied Sciences, 13(17), 9588.
Lin, H., Xue, Q., Feng, J., & Bai, D. (2023). Internet of things intrusion detection model and algorithm based on cloud computing and multi-feature extraction extreme learning machine. Digital Communications and Networks, 9(1), 111-124.
Maheswari, K. G., Siva, C., & Priya, G. N. (2023). An optimal cluster based intrusion detection system for defence against attack in web and cloud computing environments. Wireless Personal Communications, 128(3), 2011-2037.
Maheswari, K. G., Siva, C., & Nalinipriya, G. (2023). Optimal cluster based feature selection for intrusion detection system in web and cloud computing environment using hybrid teacher learning optimization enables deep recurrent neural network. Computer Communications, 202, 145-153.
Vashishtha, L. K., Singh, A. P., & Chatterjee, K. (2023). HIDM: A hybrid intrusion detection model for cloud based systems. Wireless Personal Communications, 128(4), 2637-2666.
Srilatha, D., & Thillaiarasu, N. (2023). Implementation of Intrusion detection and prevention with Deep Learning in Cloud Computing. Journal of Information Technology Management, 15(Special Issue), 1-18.
Alzughaibi, S., & El Khediri, S. (2023). A cloud intrusion detection systems based on dnn using backpropagation and pso on the cse-cic-ids2018 dataset. Applied Sciences, 13(4), 2276.
Alheeti, K. M. A., Lateef, A. A. A., Alzahrani, A., Imran, A., & Al_Dosary, D. (2023). Cloud Intrusion Detection System Based on SVM. International Journal of Interactive Mobile Technologies, 17(11).
Bingu, R., & Jothilakshmi, S. (2023). Design of intrusion detection system using ensemble learning technique in cloud computing environment. International Journal of Advanced Computer Science and Applications, 14(5).
Wankhade, N., & Khandare, A. (2023). Optimization of deep generative intrusion detection system for cloud computing: challenges and scope for improvements. EAI Endorsed Transactions on Scalable Information Systems, 10(6).
Laassar, I., Hadi, M. Y., Arifullah, H. R., & Khan, F. S. (2024). Proposed algorithm base optimisation plan for feature selection-based intrusion detection in cloud computing. Indonesian Journal of Electrical Engineering and Computer Science, 33(2), 1140-1149.
Chaudhari, A., Gohil, B., & Rao, U. P. (2024). A novel hybrid framework for cloud intrusion detection system using system call sequence analysis. Cluster Computing, 27(3), 3753-3769.
Ziheng, G. E., & Jiang, G. A Novel Intrusion Detection Mechanism in Cloud Computing Environments based on Artificial Neural Network and Genetic Algorithm. Telecommunications and Radio Engineering.
Polepally, V., Jagannadha Rao, D. B., Kalpana, P., & Nagendra Prabhu, S. (2024). Exponential Squirrel Search Algorithm-Based Deep Classifier for Intrusion Detection in Cloud Computing with Big Data Assisted Spark Framework. Cybernetics and Systems, 55(2), 331-350.
Preethi, B. C., Vasanthi, R., Sugitha, G., & Lakshmi, S. A. (2024). Intrusion detection and secure data storage in the cloud were recommend by a multiscale deep bidirectional gated recurrent neural network. Expert Systems with Applications, 255, 124428.
Souri, A., Norouzi, M., & Alsenani, Y. (2024). A new cloud-based cyber-attack detection architecture for hyper-automation process in industrial internet of things. Cluster Computing, 27(3), 3639-3655.
Ali, S. Y., Farooq, U., Anum, L., Mian, N. A., Asim, M., & Alyas, T. (2024). Convolutional Neural Network (CNN) approach to intrusion detection system. Journal of Computing & Biomedical Informatics, 6(02), 295-308.
The Bot-Iot Dataset; IEEE: Piscataway, NJ, USA, 2019; Volume 5.
Fan, C.; Chen, M.; Wang, X.; Wang, J.; Huang, B. A Review on Data Preprocessing Techniques toward Efficient and Reliable Knowledge Discovery From Building Operational.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Vijay Kumar Gandam, E. Aravind

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.