Adaptive Cyber Threat Detection Using Hybrid Deep Learning Models in Multi-Cloud Environments
Keywords:
Hybrid Deep Learning, Cyber Threat Detection, Multi-Cloud Security, Intrusion Detection Systems, Adaptive LearningAbstract
This increased the complexity and scale of cybersecurity concerns, as multi-cloud is now mainstream, exposing distributed infrastructures to sophisticated and evolving cyber threats. Static signatures and restricted adaptability limit conventional intrusion detection systems (IDS), making it difficult to detect advanced persistent threats and zero-day attacks. Proposed adaptive cyber threat detection framework for multi-cloud in this paper utilizes hybrid deep learning models to detect and response effectively. By employing CNN for extracting spatial features combined with LSTM networks to analyze temporal patterns that will allow discovering known and unknown attack scenarios. Besides, it includes an adaptive learning module to further learn and evolve over time with changing threat intelligence and variation of cloud workloads. Evaluate the framework against benchmark cybersecurity datasets and simulated multi-cloud traffic environment, showcasing its superior detection rates, lower false positive rates, and faster response times compared to traditional or standalone machine learning approaches. The experimental results indicate that the proposed hybrid model offers more than 97% detection accuracy with scalability and robustness over heterogeneous cloud platform. Thus the proposed solution can be used as a smart and scalable defense tool which could secure modern multi-cloud infrastructures against the increasing threat of cyber-attacks.
Downloads
References
Tariq, U.; Ahmed, I.; Bashir, A.K.; Shaukat, K. A critical cybersecurity analysis and future research directions for the internet of things: A comprehensive review. Sensors 2023, 23, 4117. [Google Scholar] [CrossRef] [PubMed]
Conti, M.; Dargahi, T.; Dehghantanha, A. Cyber Threat Intelligence: Challenges and Opportunities; Springer International Publishing: New York, NY, USA, 2018. [Google Scholar]
Osama, F.; Dogdu, E. Intrusion detection using big data and deep learning techniques. In Proceedings of the 2019 ACM Southeast Conference; AMC: New York, NY, USA, 2019; pp. 86–93. [Google Scholar]
Kaur, G.; Lashkari, A.H.; Rahali, A. Intrusion traffic detection and characterization using deep image learning. In Proceedings of the 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), Calgary, AB, Canada, 17–22 August 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 55–62. [Google Scholar]
Internet Security Threat Report. Available online: https://docs.broadcom.com/doc/istr-23-2018-en (accessed on 18 July 2022).
Attaran, M. The impact of 5G on the evolution of intelligent automation and industry digitization. J. Ambient Intell. Hum. Comput. 2023, 14, 5977–5993. [Google Scholar] [CrossRef]
Khan, S.; Silva, P. Internet of Things (IoT) and Its Influence on Digital Transformation. J. Emerg. Technol. Digit. Transform. 2023, 2, 114–125. [Google Scholar]
Gohar, A.; Nencioni, G. The role of 5G technologies in a smart city: The case for intelligent transportation system. Sustainability 2021, 13, 5188. [Google Scholar] [CrossRef]
Oladimeji, D.; Gupta, K.; Kose, N.A.; Gundogan, K.; Ge, L.; Liang, F. Smart transportation: An overview of technologies and applications. Sensors 2023, 23, 3880. [Google Scholar] [CrossRef] [PubMed]
Obafemi, A. Internet of Things (IoT) in Smart Factories: A Systematic Review. Res. J. Civ. Ind. Mech. Eng. 2024, 1, 09–20. [Google Scholar]
Khalil, R.A.; Saeed, N.; Masood, M.; Fard, Y.M.; Alouini, M.S.; Al-Naffouri, T.Y. Deep learning in the industrial internet of things: Potentials, challenges, and emerging applications. IEEE Internet Things J. 2021, 8, 11016–11040. [Google Scholar] [CrossRef]
Marcu, O.C.; Bouvry, P. Big Data Stream Processing. Doctoral Dissertation, University of Luxembourg, Luxembourg, 2024. [Google Scholar]
Shahraki, A.; Abbasi, M.; Taherkordi, A.; Jurcut, A.D. A comparative study on online machine learning techniques for network traffic streams analysis. Comput. Netw. 2022, 207, 108836. [Google Scholar] [CrossRef]
Chukwunweike, J.N.; Adewale, A.A.; Osamuyi, O. Advanced modelling and recurrent analysis in network security: Scrutiny of data and fault resolution. World J. Adv. Res. Rev. 2024, 23, 2373–2390. [Google Scholar] [CrossRef]
Miloslavskaya, N. Stream data analytics for network attacks’ prediction. Procedia Comput. Sci. 2020, 169, 57–62. [Google Scholar] [CrossRef]
Vanickis, R.; Jacob, P.; Dehghanzadeh, S.; Lee, B. Access control policy enforcement for zero-trust-networking. In Proceedings of the 2018 29th Irish Signals and Systems Conference (ISSC), Belfast, UK, 21–22 June 2018. [Google Scholar]
Li, S.; Iqbal, M.; Saxena, N. Future industry internet of things with zero-trust security. Inf. Syst. Front. 2022, 26, 1653–1666. [Google Scholar] [CrossRef]
L, G.; White, K. Detection of ransomware using machine learning techniques. J. Comput. Secur. 2022, 30, 189–201. [Google Scholar]
Abdulsalam, Y.S.; Hedabou, M. Security and privacy in cloud computing: Technical review. Future Internet 2022, 14, 11. [Google Scholar] [CrossRef]
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.


