• editor.aipublications@gmail.com
  • Track Your Paper
  • Contact Us
  • ISSN: 2456-7817

International Journal Of Engineering, Business And Management(IJEBM)

Intelligent Threat Detection in Cloud Computing Using Machine Learning Techniques: A Hybrid Intrusion Detection Framework

Rajesh Rajaan , Loveleen Kumar , Nilam Choudhary , Aakriti Sharma


International Journal of Engineering, Business And Management(IJEBM), Vol-10,Issue-2, April - June 2026, Pages 17-28 , 10.22161/ijebm.10.2.4

Download | Downloads : 4 | Total View : 55

Article Info: Received: 14 Apr 2026; Received in revised form: 11 May 2026; Accepted: 16 May 2026; Available online: 20 May 2026

Cite this Article: APA | ACM | Chicago | Harvard | IEEE | MLA | Vancouver | Bibtex

Share

Cloud computing has fundamentally transformed how organizations deploy, scale, and manage computational resources. However, this paradigm shift introduces significant security vulnerabilities arising from multi-tenancy, distributed architectures, and dynamic traffic patterns. Traditional intrusion detection systems struggle to address these challenges due to their reliance on static signature-based methods and inability to adapt to novel attack vectors. This paper presents a hybrid intrusion detection framework that integrates machine learning and deep learning techniques to enhance threat detection accuracy in cloud environments. The proposed framework combines Extreme Gradient Boosting (XGBoost) for feature selection with a Convolutional Neural Network–Long Short-Term Memory (CNN-LSTM) architecture for classification. We evaluate the framework using four benchmark datasets: NSL-KDD, CICIDS2017, CSE-CIC-IDS2018, and UNSW-NB15. Experimental results demonstrate that the hybrid approach achieves detection accuracy exceeding 98.5%, with a false positive rate below 1.2% across all datasets. The framework exhibits strong generalization capabilities and maintains real-time detection latency suitable for production cloud deployments. These findings suggest that combining spatial feature extraction with temporal sequence modeling provides a robust foundation for next-generation cloud security systems.

Intrusion Detection System, Cloud Security, Machine Learning, Deep Learning, CNN-LSTM, XGBoost, Hybrid Framework, Network Security

[1] Anderson, J. P. (1980). Computer security threat monitoring and surveillance. Technical Report, James P. Anderson Company.
[2] Denning, D. E. (1987). An intrusion-detection model. IEEE Transactions on Software Engineering, SE-13(2), 222-232.
[3] Chen, T., & Guestrin, C. (2016). XGBoost: A scalable tree boosting system. Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 785-794.
[4] Hochreiter, S., & Schmidhuber, J. (1997). Long short-term memory. Neural Computation, 9(8), 1735-1780.
[5] LeCun, Y., Bengio, Y., & Hinton, G. (2015). Deep learning. Nature, 521(7553), 436-444.
[6] Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. A. (2009). A detailed analysis of the KDD CUP 99 data set. IEEE Symposium on Computational Intelligence for Security and Defense Applications, 1-6.
[7] Sharafaldin, I., Lashkari, A. H., & Ghorbani, A. A. (2018). Toward generating a new intrusion detection dataset and intrusion traffic characterization. International Conference on Information Systems Security and Privacy, 108-116.
[8] Moustafa, N., & Slay, J. (2015). UNSW-NB15: A comprehensive data set for network intrusion detection systems. Military Communications and Information Systems Conference, 1-6.
[9] Bahdanau, D., Cho, K., & Bengio, Y. (2015). Neural machine translation by jointly learning to align and translate. International Conference on Learning Representations.
[10] Goodfellow, I., Bengio, Y., & Courville, A. (2016). Deep Learning. MIT Press.
[11] Vinayakumar, R., Alazab, M., Soman, K. P., Poornachandran, P., Al-Nemrat, A., & Venkatraman, S. (2019). Deep learning approach for intelligent intrusion detection system. IEEE Access, 7, 41525-41550.
[12] Zhang, C., Patras, P., & Haddadi, H. (2019). Deep learning in mobile and wireless networking: A survey. IEEE Communications Surveys & Tutorials, 21(3), 2224-2287.
[13] Ferrag, M. A., Maglaras, L., Moschoyiannis, S., & Janicke, H. (2020). Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. Journal of Information Security and Applications, 50, 102419.
[14] Chawla, N. V., Bowyer, K. W., Hall, L. O., & Kegelmeyer, W. P. (2002). SMOTE: Synthetic minority over-sampling technique. Journal of Artificial Intelligence Research, 16, 321-357.
[15] Kingma, D. P., & Ba, J. (2015). Adam: A method for stochastic optimization. International Conference on Learning Representations.