Adaptive Cyber Threat Detection Using Hybrid Deep Learning Models in Multi-Cloud Environments

Authors

  • Sivanageswara Rao Gandikota

Keywords:

Hybrid Deep Learning, Cyber Threat Detection, Multi-Cloud Security, Intrusion Detection Systems, Adaptive Learning

Abstract

This increased the complexity and scale of cybersecurity concerns, as multi-cloud is now mainstream, exposing distributed infrastructures to sophisticated and evolving cyber threats. Static signatures and restricted adaptability limit conventional intrusion detection systems (IDS), making it difficult to detect advanced persistent threats and zero-day attacks. Proposed adaptive cyber threat detection framework for multi-cloud in this paper utilizes hybrid deep learning models to detect and response effectively. By employing CNN for extracting spatial features combined with LSTM networks to analyze temporal patterns that will allow discovering known and unknown attack scenarios. Besides, it includes an adaptive learning module to further learn and evolve over time with changing threat intelligence and variation of cloud workloads. Evaluate the framework against benchmark cybersecurity datasets and simulated multi-cloud traffic environment, showcasing its superior detection rates, lower false positive rates, and faster response times compared to traditional or standalone machine learning approaches. The experimental results indicate that the proposed hybrid model offers more than 97% detection accuracy with scalability and robustness over heterogeneous cloud platform. Thus the proposed solution can be used as a smart and scalable defense tool which could secure modern multi-cloud infrastructures against the increasing threat of cyber-attacks.

Downloads

Download data is not yet available.

References

Tariq, U.; Ahmed, I.; Bashir, A.K.; Shaukat, K. A critical cybersecurity analysis and future research directions for the internet of things: A comprehensive review. Sensors 2023, 23, 4117. [Google Scholar] [CrossRef] [PubMed]

Conti, M.; Dargahi, T.; Dehghantanha, A. Cyber Threat Intelligence: Challenges and Opportunities; Springer International Publishing: New York, NY, USA, 2018. [Google Scholar]

Osama, F.; Dogdu, E. Intrusion detection using big data and deep learning techniques. In Proceedings of the 2019 ACM Southeast Conference; AMC: New York, NY, USA, 2019; pp. 86–93. [Google Scholar]

Kaur, G.; Lashkari, A.H.; Rahali, A. Intrusion traffic detection and characterization using deep image learning. In Proceedings of the 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), Calgary, AB, Canada, 17–22 August 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 55–62. [Google Scholar]

Internet Security Threat Report. Available online: https://docs.broadcom.com/doc/istr-23-2018-en (accessed on 18 July 2022).

Attaran, M. The impact of 5G on the evolution of intelligent automation and industry digitization. J. Ambient Intell. Hum. Comput. 2023, 14, 5977–5993. [Google Scholar] [CrossRef]

Khan, S.; Silva, P. Internet of Things (IoT) and Its Influence on Digital Transformation. J. Emerg. Technol. Digit. Transform. 2023, 2, 114–125. [Google Scholar]

Gohar, A.; Nencioni, G. The role of 5G technologies in a smart city: The case for intelligent transportation system. Sustainability 2021, 13, 5188. [Google Scholar] [CrossRef]

Oladimeji, D.; Gupta, K.; Kose, N.A.; Gundogan, K.; Ge, L.; Liang, F. Smart transportation: An overview of technologies and applications. Sensors 2023, 23, 3880. [Google Scholar] [CrossRef] [PubMed]

Obafemi, A. Internet of Things (IoT) in Smart Factories: A Systematic Review. Res. J. Civ. Ind. Mech. Eng. 2024, 1, 09–20. [Google Scholar]

Khalil, R.A.; Saeed, N.; Masood, M.; Fard, Y.M.; Alouini, M.S.; Al-Naffouri, T.Y. Deep learning in the industrial internet of things: Potentials, challenges, and emerging applications. IEEE Internet Things J. 2021, 8, 11016–11040. [Google Scholar] [CrossRef]

Marcu, O.C.; Bouvry, P. Big Data Stream Processing. Doctoral Dissertation, University of Luxembourg, Luxembourg, 2024. [Google Scholar]

Shahraki, A.; Abbasi, M.; Taherkordi, A.; Jurcut, A.D. A comparative study on online machine learning techniques for network traffic streams analysis. Comput. Netw. 2022, 207, 108836. [Google Scholar] [CrossRef]

Chukwunweike, J.N.; Adewale, A.A.; Osamuyi, O. Advanced modelling and recurrent analysis in network security: Scrutiny of data and fault resolution. World J. Adv. Res. Rev. 2024, 23, 2373–2390. [Google Scholar] [CrossRef]

Miloslavskaya, N. Stream data analytics for network attacks’ prediction. Procedia Comput. Sci. 2020, 169, 57–62. [Google Scholar] [CrossRef]

Vanickis, R.; Jacob, P.; Dehghanzadeh, S.; Lee, B. Access control policy enforcement for zero-trust-networking. In Proceedings of the 2018 29th Irish Signals and Systems Conference (ISSC), Belfast, UK, 21–22 June 2018. [Google Scholar]

Li, S.; Iqbal, M.; Saxena, N. Future industry internet of things with zero-trust security. Inf. Syst. Front. 2022, 26, 1653–1666. [Google Scholar] [CrossRef]

L, G.; White, K. Detection of ransomware using machine learning techniques. J. Comput. Secur. 2022, 30, 189–201. [Google Scholar]

Abdulsalam, Y.S.; Hedabou, M. Security and privacy in cloud computing: Technical review. Future Internet 2022, 14, 11. [Google Scholar] [CrossRef]

Downloads

Published

30.12.2024

How to Cite

Sivanageswara Rao Gandikota. (2024). Adaptive Cyber Threat Detection Using Hybrid Deep Learning Models in Multi-Cloud Environments. International Journal of Intelligent Systems and Applications in Engineering, 12(23s), 4229 –. Retrieved from https://www.ijisae.org/index.php/IJISAE/article/view/8154

Issue

Section

Research Article