AI-Driven Anomaly Detection for Telecom Cloud Security
DOI:
https://doi.org/10.63282/3050-922X.ICRCEDA25-125Keywords:
AI-driven anomaly detection, Telecom cloud security, Machine learning (ML), Deep learning (DL), Network intrusion detection, Fraud detection, Performance degradation, Data privacy, Model interpretability, ScalabilityAbstract
Telecommunication networks are increasingly migrating to cloud-based infrastructures, introducing complexities that traditional security mechanisms struggle to address. AI-driven anomaly detection has emerged as a pivotal solution, leveraging machine learning (ML) and deep learning (DL) techniques to identify deviations from normal network behavior in real-time. This paper explores the integration of AI-based anomaly detection within telecom cloud environments, examining its effectiveness in enhancing security and operational efficiency. We analyze various AI methodologies, including supervised, unsupervised, and hybrid models, and their application in detecting network intrusions, performance degradation, and fraud. Additionally, we discuss the challenges associated with implementing AI solutions, such as data privacy concerns, model interpretability, and scalability. The paper concludes with recommendations for future research and development to optimize AI-driven anomaly detection systems in telecom cloud security
References
[1] Bourgerie, R., & Zanouda, T. (2023). Fault Detection in Telecom Networks using Bi-level Federated Graph Neural Networks.
[2] Raissa Silva, P., Vinagre, J., & Gama, J. (2022). Federated Anomaly Detection over Distributed Data Streams.
[3] Ma, S., Nie, J., Kang, J., Lyu, L., Liu, R. W., Zhao, R., Liu, Z., & Niyato, D. (2022). Privacy-preserving Anomaly Detection in Cloud Manufacturing via Federated Transformer.
[4] Nardi, M., Valerio, L., & Passarella, A. (2022). Anomaly Detection through Unsupervised Federated Learning.
[5] Artificial Intelligence Review. (2025). Artificial intelligence advances in anomaly detection for telecom networks. Springer.
[6] Rumesh, Y., Attanayaka, D., Porambage, P., Pinola, J. E., Groen, J. B., & Chowdhury, K. (2024). Federated Learning for Anomaly Detection in Open RAN: Security Architecture Within a Digital Twin. EuCNC & 6G Summit. Linkgenesys-lab.org
[7] Zhang, Y., & Mitra, P. (2024). A Multi-Scale Temporal Feature Extraction Approach for Network Traffic Anomaly Detection. International Journal of Information Security and Privacy. LinkACM Digital Library
[8] Arbaoui, M., Brahmia, M., & Rahmoun, A. (2024). Federated Learning Survey: A Multi-Level Taxonomy of Aggregation Techniques, Experimental Insights, and Future Frontiers. ACM Transactions on Intelligent Systems and Technology. LinkACM Digital Library
[9] Hellander, M., & Sethi, S. (2023). Federated deep Q-learning networks for service-based anomaly detection and classification in edge-to-cloud ecosystems. Annals of Telecommunications.
[10] Liu, Z., & Wang, L. (2023). Federated deep learning for anomaly detection in the internet of things. Computers and Electrical Engineering. LinkACM Digital Library
[11] Kaplan, J., & Butler, T. (2024). New AI and 5G advancements will usher in the era of edge computing on smartphones, autonomous cars, and more. Business Insider. LinkBusiness Insider
[12] Zhang, Y., & Mitra, P. (2024). A Multi-Scale Temporal Feature Extraction Approach for Network Traffic Anomaly Detection. International Journal of Information Security and Privacy. LinkACM Digital Library
[13] Vootkuri, C. AI-Powered Cloud Security: A Unified Approach to Threat Modeling and Vulnerability Management.
[14] Ma, S., Nie, J., Kang, J., Lyu, L., Liu, R. W., Zhao, R., Liu, Z., & Niyato, D. (2022). Privacy-preserving Anomaly Detection in Cloud Manufacturing via Federated Transformer.
[15] Nardi, M., Valerio, L., & Passarella, A. (2022). Anomaly Detection through Unsupervised Federated Learning.
[16] Muniraju Hullurappa, Mohanarajesh Kommineni, “Integrating Blue-Green Infrastructure Into Urban Development: A Data-Driven Approach Using AI-Enhanced ETL Systems,” in Integrating Blue-Green Infrastructure Into Urban Development, IGI Global, USA, pp. 373-396, 2025.
[17] Praveen Kumar Maroju, "Assessing the Impact of AI and Virtual Reality on Strengthening Cybersecurity Resilience Through Data Techniques," Conference: 3rd International conference on Research in Multidisciplinary Studies Volume: 10, 2024. – 1
[18] Gopichand Vemulapalli Subash Banala Lakshmi Narasimha Raju Mudunuri, Gopi Chand Vegineni ,Sireesha Addanki ,Padmaja Pulivarth, (2025/4/16). Enhancing Decision-Making: From Raw Data to Strategic Insights for Business Growth. ICCCT'25– Fifth IEEE International Conference on Computing & Communication Technologies. IEEE.
[19] Sudheer Panyaram, Muniraju Hullurappa, “Data-Driven Approaches to Equitable Green Innovation Bridging Sustainability and Inclusivity,” in Advancing Social Equity Through Accessible Green Innovation, IGI Global, USA, pp. 139-152, 2025.
[20] L. N. Raju Mudunuri, P. K. Maroju and V. M. Aragani, "Leveraging NLP-Driven Sentiment Analysis for Enhancing Decision-Making in Supply Chain Management," 2025 Fifth International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT), Bhilai, India, 2025, pp. 1-6, doi: 10.1109/ICAECT63952.2025.10958844.
[21] L. N. R. Mudunuri, “Artificial Intelligence (AI) Powered Matchmaker: Finding Your Ideal Vendor Every Time,” FMDB Transactions on Sustainable Intelligent Networks., vol.1, no.1, pp. 27–39, 2024.
[22] Vasdev K. “The Future of GIS in Energy Transition: Applications in Oil and Gas Sustainability Initiatives”. J Artif Intell Mach Learn & Data Sci 2023, 1(2), 1912-1915. DOI: doi.org/10.51219/JAIMLD/kirti-vasdev/423
[23] Animesh Kumar, “Redefining Finance: The Influence of Artificial Intelligence (AI) and Machine Learning (ML)”, Transactions on Engineering and Computing Sciences, 12(4), 59-69. 2024.
[24] Barigidad, S. (2025). Edge-Optimized Facial Emotion Recognition: A High-Performance Hybrid Mobilenetv2-Vit Model. International Journal of AI, BigData, Computational and Management Studies, 6(2), 1-10. https://doi.org/10.63282/3050-9416.IJAIBDCMS-V6I2P101
[25] Sahil Bucha, “Integrating Cloud-Based E-Commerce Logistics Platforms While Ensuring Data Privacy: A Technical Review,” Journal Of Critical Reviews, Vol 09, Issue 05 2022, Pages1256-1263.
[26] Puneet Aggarwal,Amit Aggarwal. "SAP HANA Workload Management: A Comprehensive Study on Workload Classes", International Journal of Computer Trends and Technology, 72 (11), 31-38, 2024.
[27] Puvvada, Ravi Kiran. "Industry-Specific Applications of SAP S/4HANA Finance: A Comprehensive Review." International Journal of Information Technology and Management Information Systems(IJITMIS) 16.2 (2025): 770-782.
[28] Optimized Technique for Maximizing Efficiency in GW-Scale EHVAC Offshore Wind Farm Connections through Voltage and Reactive Power Control, Sree Lakshmi Vineetha Bitragunta1 , Gokul Gadde2, IJIRMPS2106231842, Volume 9 Issue 6,2021, PP-1-12.
[29] Kirti Vasdev (2024). “Real-Time Spatial Data in Oil and Gas Asset Management and Operations”. Journal of Oil, Petroleum and Natural Gas Research. SRC-JOPNGR-24-E101, 1(1), 1-4.DOI: doi.org/10.47363/JOPNGR/2024(1)101
[30] S. Gupta, S. Barigidad, S. Hussain, S. Dubey and S. Kanaujia, "Hybrid Machine Learning for Feature-Based Spam Detection," 2025 2nd International Conference on Computational Intelligence, Communication Technology and Networking (CICTN), Ghaziabad, India, 2025, pp. 801-806, doi: 10.1109/CICTN64563.2025.10932459.
[31] Khan, S., Noor, S., Awan, H.H. et al. “Deep-ProBind: binding protein prediction with transformer-based deep learning model”. BMC Bioinformatics 26, 88 (2025). https://doi.org/10.1186/s12859-025-06101-8.
[32] A. Garg, “Unified Framework of Blockchain and AI for Business Intelligence in Modern Banking ”, IJERET, vol. 3, no. 4, pp. 32–42, Dec. 2022, doi: 10.63282/3050-922X.IJERET-V3I4P105