IMPROVED INTRUSION DETECTION SYSTEM FOR CLOUD COMPUTING: A SURVEY

Authors

  • B. Sankaraiah, Vemula Nikitha, Syed Abdul Haq, Dr. Syed Umar Author

DOI:

https://doi.org/10.65009/w58a8742

Keywords:

Cloud computing, Intrusion Detection System (IDS), WSN, Dataset, Attacks, Algorithm, etc.,,

Abstract

Cloud computing has revolutionized the technology landscape with its scalability and cost 
efficiency. However, it has also introduced unique security challenges. System Aided Design (SAD) has 
emerged as a vital tool in addressing these issues by enhancing the classification of security threats 
specific to the cloud environment. While cloud computing does offer flexibility and economic advantages, 
the extensive sensitive data involved raise concerns about data security and privacy. Intrusion Detection 
Systems (IDSs) are pivotal for cloud security but face challenges due to the dynamic nature of the cloud. 
This research work focuses on developing a cloud-based IDS using neuro-swarm intelligence techniques 
to efficiently analyze and classify network traffic, adapting seamlessly to the dynamic cloud landscape. 
This approach promises to be a robust solution for safeguarding data and ensuring secure cloud 
operations. A comprehensive evaluation of an Intrusion Detection System (IDS) that utilizes G-ABC and 
DNN techniques has been performed under this research work. Moreover, this research work goes beyond 
the well-detected DoS attacks to assess the IDS's performance in identifying U2R, R2L, and Probes 
attacks using both the NSL KDD and UNSW NB15 datasets. The analysis includes precision, recall, F
measure, and accuracy metrics, highlighting the IDS's potential to enhance intrusion detection across 
various attack categories. 

,

References

Naveen Sai Bommina, Uppu Lokesh, Nandipati Sai Akash, Dr. Hussain Syed, Dr. Syed Umar,

"Optimizing AI-Driven Security Protocols in IoT Networks Using Metaheuristic Algorithms",

International Journal of Intelligent Systems and Applications in Engineering, IJISAE, 2024,

(23s), 3339–3347.

Naveen Sai Bommina, Nandipati Sai Akash, Uppu Lokesh, Dr. Hussain Syed, Dr. Syed Umar, "A

Hybrid Optimization Framework for Enhancing IoT Security via AI-based Anomaly Detection",

International Journal on Recent and Innovation Trends in Computing and Communication, ISSN:

-8169 Volume: 11 Issue: 3.

Nandipati Sai Akash, Uppu Lokesh, Naveen Sai Bommina, Hussain Syed, Syed Umar, "Swarm

Intelligence-Based Hyperparameter Optimization for AI-Powered IoT Threat Detection",

International Journal of Intelligent Systems and Applications in Engineering, (2024), 12(17s),

Uppu Lokesh, Naveen Sai Bommina, Nandipati Sai Akash, Dr. Hussain Syed, Dr. Syed Umar,

"Designing Energy-Efficient and Secure IoT Architectures Using Evolutionary Optimization

Algorithms", International Journal of Applied Engineering & Technology, Vol. 4 No.2,

September, 2022.

Divya Rohatgi, Dr. Tulika Pandey, "Regression Test Selection Framework for Web Services",

INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 9,

ISSUE 03, MARCH 2020.

K Sankar, Divya Rohatgi, S Balakrishna Reddy, "COX Regressive Winsorized Correlated

Convolutional Deep Belief Boltzmann Network for Covid-19 Prediction with Big Data", Grenze

International Journal of Engineering & Technology (GIJET), Grenze ID: 01.GIJET.9.1.547, ©

Grenze Scientific Society, 2023.

Thakre N, Nimma D, Turukmane AV, Singh AK, Rohatgi D, Bangaru B (2024) Dynamic path

planning for autonomous robots in forest fire scenarios using hybrid deep reinforcement learning

and particle swarm optimization. Int J Adv Comput Sci Appl 15(9).

Ahmad, Z., Khan, A. S., Aqeel, S., Julaihi, A. A., Tarmizi, S., Annuar, N., & Habeeb, M. S. (2022,

May). S-ADS: spectrogram image-based anomaly detection system for IoT networks. In 2022

Applied Informatics International Conference (AiIC) (pp. 105-110). IEEE.

Habeeb, M. S., & Babu, T. R. (2024, October). Enhancing IoT Security Through Advanced Feature

Selection and Deep Learning. In International Conference on Computing and Communication

Networks (pp. 37-49). Singapore: Springer Nature Singapore.

Uppu Lokesh , Naveen Sai Bommina , Nandipati Sai Akash , Dr. Hussain Syed , Dr. Syed Umar.

(2021). Deep Reinforcement Learning with Genetic Algorithm Tuning for Intrusion Detection in IoT Systems. International Journal of Communication Networks and Information Security

(IJCNIS), 13(3), 582–595.

Naveen Sai Bommina , Nandipati Sai Akash, Uppu Lokesh , Dr. Hussain Syed , Dr. Syed Umar,

"Multi-Objective Genetic Algorithms for Secure Routing and Data Privacy in IoT Networks",

International Journal of Communication Networks and Information Security (IJCNIS), (2020),

(3), 632–643.

S. Shamshirband, M. Fathi, A. T. Chronopoulos, A. Montieri, F. Palumbo, and A. Pescapè, ―Computational intelligence intrusion detection techniques in mobile cloud computing

environments: Review, taxonomy, and open research issues,‖ Journal of Information Security and

Applications, vol. 55, p. 102582, Dec. 2020, doi: 10.1016/J.JISA.2020.102582.

A. Bahaa, A. Abdelaziz, A. Sayed, L. Elfangary, and H. Fahmy, ―Monitoring Real Time Security

Attacks for IoT Systems Using DevSecOps: A Systematic Literature Review,‖ Information 2021,

Vol. 12, Page 154, vol. 12, no. 4, p. 154, Apr. 2021, doi: 10.3390/INFO12040154.

P. Chouhan and R. Singh, ―Security Attacks on Cloud Computing With Possible Solution,‖

International Journal of Advanced Research in Computer Science and Software Engineering, vol.

, no. 1, pp. 92–96, 2016, Accessed: Feb. 08, 2023. [Online]. Available: www.ijarcsse.com.

S. Abidin, ―Wireless Sensor Network and Security Mechanism by Encryption‖.

A. N. Jaber and S. U. Rehman, ―FCM--SVM based intrusion detection system for cloud

computing environment,‖ Cluster Computing, vol. 23, no. 4, pp. 3221–3231, 2020.

M. Islabudeen and M. K. Kavitha Devi, ―A Smart Approach for Intrusion Detection and

Prevention System in Mobile Ad Hoc Networks Against Security Attacks,‖ Wireless Personal

Communications, vol. 112, no. 1, pp. 193–224, May 2020, doi: 10.1007/S11277-019-07022

/METRICS.

S. Velliangiri, P. Karthikeyan, and V. Vinoth Kumar, ―Detection of distributed denial of service

attack in cloud computing using the optimization-based deep networks,‖ Journal of Experimental

& Theoretical Artificial Intelligence, vol. 33, no. 3, pp. 405–424, May 2021, doi:

1080/0952813X.2020.1744196.

B. Eren, Ü. Fen, B. Dergisi, and F. Türk, ―Analysis of Intrusion Detection Systems in UNSW

NB15 and NSL-KDD Datasets with Machine Learning Algorithms,‖ Bitlis Eren Üniversitesi Fen

Bilimleri Dergisi, vol. 12, no. 2, pp. 465–477, Jun. 2023, doi:10.17798/BITLISFEN.1240469.

S. Maya, K. Ueno, and T. Nishikawa, ―dLSTM: a new approach for anomaly detection using

deep learning with delayed prediction,‖ International Journal of Data Science and Analytics, vol.

, pp. 137–164, 2019.

A. Abbas, M. A. Khan, S. Latif, M. Ajaz, A. A. Shah, and J. Ahmad, ―A new ensemblebased

intrusion detection system for internet of things,‖ Arabian Journal for Science and Engineering, pp.

–15, 2021.

A. Kurani, P. Doshi, A. Vakharia, and M. Shah, ―A Comprehensive Comparative Study of

Artificial Neural Network (ANN) and Support Vector Machines (SVM) on Stock Forecasting,‖

Annals of Data Science, vol. 10, no. 1, pp. 183–208, Feb. 2023, doi:10.1007/S40745-021-00344

X/METRICS.

Downloads.

Published

2025-09-24

How to Cite

IMPROVED INTRUSION DETECTION SYSTEM FOR CLOUD COMPUTING: A SURVEY . (2025). Phoenix: International Multidisciplinary Research Journal ( Peer Reviewed High Impact Journal ), 3(3), 85-93. https://doi.org/10.65009/w58a8742