Development of a Generative AI-Assisted Network IDS for Intelligent Cloud Cybersecurity Monitoring
DOI:
https://doi.org/10.63282/3050-922X.IJERET-V7I1P130Keywords:
Intrusion Detection and Protection System, Event Monitoring, Networking, Artificial Intelligence, Principal Component Analysis (PCA), Internet of Things (Iot)Abstract
In the cloud security paradigm, threat detection and response exhibit structural and functional symmetry, where each detected threat triggers a corresponding automated or manual response. Cloud security is critical due to the increasing reliance on cloud computing to store, process, and transmit sensitive data across various sectors. In order to resist insider threats and external attacks to cloud systems, the present study examines features of DDoS attacks detection and classification based on CICDDoS2019 data set consisting of 88 features and millions of records. Preprocessing was done to eliminate categorical and duplicate features, deal with infinite values, label encoding and min-max normalization. Principal Component Analysis (PCA) was used to select features and therefore dimensionality was maintained by including vital information. An effective model of complex data was acquired by training a Variational Autoencoder (VAE) model (made up of an encoder and decoder) to maximize the evidence lower bound (ELBO). The model had 99.79% accuracy, 98.57% precision, 98.55% recall and 98.56% F1-score, which was better than classical machine learning methods such as RNN, Kalman Backpropagation Neural Networks, and Logistic Regression proving good, dependable, and efficient cloud-based cybersecurity threat detection.
References
[1] G. Modalavalasa and S. Pillai, “Exploring Azure Security Center : A Review of Challenges and Opportunities in Cloud Security,” ESP J. Eng. Technol. Adv., vol. 2, no. 2, pp. 176–182, 2022, doi: 10.56472/25832646/JETA-V2I2P120.
[2] G. Maddali, “An Efficient Bio-Inspired Optimization Framework for Scalable Task Scheduling in Cloud Computing Environments,” Int. J. Curr. Eng. Technol., vol. 15, no. 03, May 2025, doi: 10.14741/ijcet/v.15.3.4.
[3] V. Shah, “Traffic Intelligence in IoT and Cloud Networks: Tools for Monitoring, Security, and Optimization,” Int. J. Recent Technol. Sci. Manag., vol. 9, no. 5, 2024.
[4] A. Meshram, “Hybrid Cloud Strategy For Mission Critical Financial Software Applications,” Int. J. Adv. Res. Comput. Commun. Eng., vol. 14, no. 12, 2025.
[5] G. M. Sam Prakash Bheri, “Advancements in cloud computing for scalable web development: Security challenges and performance optimization,” J. Comput. Technol. Int. J, vol. 13, no. 12, 2024.
[6] G. Modalavalasa, “Analysis and Optimization of Privacy-Preserving Encryption Techniques in Cloud Computing Environments for Secure Cloud Data,” in 2025 5th International Conference on Intelligent Technologies (CONIT), IEEE, Jun. 2025, pp. 1–6. doi: 10.1109/CONIT65521.2025.11167685.
[7] G. Modalavalasa, “Zero-Trust Data Architecture For Multi-Cloud Environments: A Governance-Centric Engineering Approach,” Acta Sci., vol. 26, no. 2, pp. 714–726, 2025.
[8] G. Modalavalasa and P. Yadav, “A Hybrid Approach to Cloud Database Security: Integrating DL and Machine Learning for Threat Detection and Prevention,” in 2025 3rd International Conference on Inventive Computing and Informatics (ICICI), IEEE, Jun. 2025, pp. 1147–1154. doi: 10.1109/ICICI65870.2025.11069530.
[9] F. C. Ogenyi, C. N. Ugwu, and O. P.-C. Ugwu, “Securing the future: AI-driven cybersecurity in the age of autonomous IoT,” Front. Internet Things, 2025, doi: 10.3389/friot.2025.1658273.
[10] Vaidehi Shah, “Managing Security and Privacy in Cloud Frameworks: A Risk with Compliance Perspective for Enterprises,” Int. J. Curr. Eng. Technol., vol. 12, no. 6, pp. 1–13, 2022.
[11] V. Verma, “Big Data and Cloud Databases Revolutionizing Business Intelligence,” Tijer – Int. Res. J., vol. 9, no. 1, pp. 48–58, 2022.
[12] V. Shah, “Securing the Cloud of Things: A Comprehensive Analytics of Architecture, Use Cases, and Privacy Risks,” J. Glob. Res. Electron. Commun., vol. 3, no. 4, pp. 158–165, 2023, doi: 10.56472/25832646/JETA-V3I8P118.
[13] Anirudh Parupalli and Honie Kali, “An In-Depth Review of Cost Optimization Tactics in Multi-Cloud Frameworks,” Int. J. Adv. Res. Sci. Commun. Technol., pp. 1043–1052, Jun. 2023, doi: 10.48175/IJARSCT-11937Q.
[14] J. H. Park and J. H. Park, “Blockchain security in cloud computing: Use cases, challenges, and solutions,” Symmetry (Basel)., 2017, doi: 10.3390/sym9080164.
[15] M. Gupta, M. Kumar, and R. Dhir, “Unleashing the prospective of blockchain-federated learning fusion for IoT security: A comprehensive review,” 2024. doi: 10.1016/j.cosrev.2024.100685.
[16] A. Nawaz, W. Iqbal, A. Altaf, A. Almjally, H. AlSagri, and B. Alabdullah, “CATcAFSMs: Context-based adaptive trust calculation for attack detection in fog computing based smart medical systems,” Expert Syst., 2025, doi: 10.1111/exsy.13687.
[17] G. Modalavalasa, “Strengthening Threat Detection and Mitigation Strategies in Cybersecurity with Artificial Intelligence,” in 2025 5th International Conference on Intelligent Technologies (CONIT), IEEE, Jun. 2025, pp. 1–6. doi: 10.1109/CONIT65521.2025.11166691.
[18] V. Shah, “Analyzing Traffic Behavior in IoT-Cloud Systems : A Review of Analytical Frameworks,” Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol., vol. 9, no. 3, pp. 877–885, 2023.
[19] S. Singh, Y. S. Jeong, and J. H. Park, “A survey on cloud computing security: Issues, threats, and solutions,” J. Netw. Comput. Appl., 2016, doi: 10.1016/j.jnca.2016.09.002.
[20] L. Nanjie, “Internet of Vehicles: Your next connection,” Huawei WinWin, 2011.
[21] S. Narang and V. Gopi Kolla, “Next-Generation Cloud Security: A Review of the Constraints and Strategies in Serverless Computing,” Int. J. Res. Anal. Rev., vol. 12, no. 3, 2025, doi: 10.56975/ijrar.v12i3.319048.
[22] S. A. Satyadhar Kumar Chintagunta, “Enhancing Cloud Database Security Through Intelligent Threat Detection and Risk Mitigation,” Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol., vol. 8, no. 3, pp. 756–768, 2022.
[23] N. Perlroth, “Security Researchers Find a Way to Hack Cars,” The New York Times.
[24] K. Liu, X. Xu, M. Chen, B. Liu, L. Wu, and V. C. S. Lee, “A Hierarchical architecture for the future internet of vehicles,” IEEE Commun. Mag., 2019, doi: 10.1109/MCOM.2019.1800772.
[25] A. Syed, AI-Powered Threat Detection and Mitigation. Supply Chain Software Security: AI, IoT, and Application Security, 2024. [Online]. Available:
[27] S. Singamsetty, “HEALTHCARE IOT SECURITY: EXAMINING SECURITY CHALLENGES AND SOLUTIONS IN THE INTERNET OF MEDICAL THINGS. A BIBLIOMETRIC PERSPECTIVE,” J. Popul. Ther. Clin. Pharmacol., 2024, doi: 10.53555/7j8dhs24.
[28] M. Lombardi, F. Pascale, and D. Santaniello, “Two-Step Algorithm to Detect Cyber-Attack Over the Can-Bus: A Preliminary Case Study in Connected Vehicles,” ASCE-ASME J. Risk Uncertain. Eng. Syst. Part B Mech. Eng., 2022, doi: 10.1115/1.4052823.
[29] A. Yazdinejad, M. Kazemi, R. M. Parizi, A. Dehghantanha, and H. Karimipour, “An ensemble deep learning model for cyber threat hunting in industrial internet of things,” Digit. Commun. Networks, 2023, doi: 10.1016/j.dcan.2022.09.008.
[30] A. N. Jahromi, H. Karimipour, and A. Dehghantanha, “An ensemble deep federated learning cyber-threat hunting model for Industrial Internet of Things,” Comput. Commun., 2023, doi: 10.1016/j.comcom.2022.11.009.
[31] M. Al-Omari, M. Rawashdeh, F. Qutaishat, M. Alshira’H, and N. Ababneh, “An Intelligent Tree-Based Intrusion Detection Model for Cyber Security,” J. Netw. Syst. Manag., 2021, doi: 10.1007/s10922-021-09591-y.
[32] I. H. Sarker, Y. B. Abushark, F. Alsolami, and A. I. Khan, “IntruDTree: A machine learning based cyber security intrusion detection model,” Symmetry (Basel)., 2020, doi: 10.3390/SYM12050754.
[33] F. Alserhani, “Analysis of Encrypted Network Traffic for Enhancing Cyber-security in Dynamic Environments,” Appl. Artif. Intell., 2024, doi: 10.1080/08839514.2024.2381882.
[34] N. Imtiaz et al., “A Deep Learning-Based Approach for the Detection of Various Internet of Things Intrusion Attacks Through Optical Networks,” Photonics, 2025, doi: 10.3390/photonics12010035.
[35] T. Yesuraju, S. M. Vali, S. Sameer, S. Shabbir, and S. Riyaz, “Enhancing Network Security: A Comparative Analysis of Machine Learning, Ensemble Methods, and Federated Learning for Intrusion Detection,” 2025. doi: 10.1109/icoici65217.2025.11254279.
[36] N. Venkatesh, V. K. Pidatala, S. M. Hemalatha, P. Matam, R. Stalinbabu, and S. S, “AI-Driven Threat Intelligence Framework for Real-Time Cybersecurity using Federated Deep Learning and Cloud Orchestration,” 2025. doi: 10.1109/icoici65217.2025.11254858.
[37] E. V. N. Jyothi, M. Kranthi, S. Sailaja, U. Sesadri, S. N. Koka, and P. C. S. Reddy, “An Adaptive Intrusion Detection System in Industrial Internet of Things(IIoT) using Deep Learning,” in Proceedings - 2024 1st International Conference on Innovative Sustainable Technologies for Energy, Mechatronics and Smart Systems, ISTEMS 2024, 2024. doi: 10.1109/ISTEMS60181.2024.10560245.
[38] D. Tocci, R. Zhou, and K. Zhang, “FPGA Accelerated Decentralized Reinforcement Learning for Anomaly Detection in UAV Networks,” in 2023 IEEE 16th International Symposium on Embedded Multicore/Many-core Systems-on-Chip (MCSoC), 2023, pp. 248–253. doi: 10.1109/MCSoC60832.2023.00044.
[39] S. Divakar, R. Priyadarshini, R. K. Barik, and D. S. Roy, “An intelligent intrusion detection scheme powered by boosting algorithm,” in Proceedings of the Confluence 2021: 11th International Conference on Cloud Computing, Data Science and Engineering, 2021. doi: 10.1109/Confluence51648.2021.9377076.
[40] V. Patel, S. Choe, and T. Halabi, “Predicting Future Malware Attacks on Cloud Systems using Machine Learning,” in Proceedings - 2020 IEEE 6th Intl Conference on Big Data Security on Cloud, BigDataSecurity 2020, 2020 IEEE Intl Conference on High Performance and Smart Computing, HPSC 2020 and 2020 IEEE Intl Conference on Intelligent Data and Security, IDS 2020, 2020. doi: 10.1109/BigDataSecurity-HPSC-IDS49724.2020.00036.
[41] M. M. Saad, T. Iqbal, H. Ali, M. F. Bulbul, S. Khan, and C. Tanougast, “Incident Detection over Unified Threat Management Platform on a Cloud Network,” in Proceedings of the 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS 2019, 2019. doi: 10.1109/IDAACS.2019.8924299.
[42] D. P. Kingma and M. Welling, “Auto-encoding variational bayes,” 2nd Int. Conf. Learn. Represent. ICLR 2014 - Conf. Track Proc., no. Ml, pp. 1–14, 2014, doi: 10.61603/ceas.v2i1.33.
[43] N. S. M. V. Sri Hari Deep Kolagani, “Human-in-the-Loop and Generative AI Dilemma: A Hybrid Strategy for Effective Customer Service in Enterprise CRM,” Int. J. Bus. Technol. Manag., vol. 7, no. 10, pp. 233–239, Dec. 2025, doi: 10.55057/ijbtm.2025.7.10.18.
[44] S. Azmin and A. B. M. A. Al Islam, “Network Intrusion Detection System based on Conditional Variational Laplace AutoEncoder,” in 7th International Conference on Networking, Systems and Security, New York, NY, USA: ACM, Dec. 2020, pp. 82–88. doi: 10.1145/3428363.3428371.
[45] V. Jyothsna, A. C. Manisha, B. NanduSri, K. Poorna Chandhu, A. Leela Rama Seshu, and G. Mahalakshmi Manasvi, “Intrusion Detection System for Detection of DDoS Attacks in Cloud Environment,” Res. Sq., 2023.
[46] G. Prabhakar and B. B. Rao, “Enhanced Deep Learning-Based Security Model for Data in Cloud,” SSRG Int. J. Electron. Commun. Eng., 2025, doi: 10.14445/23488549/IJECE-V12I3P108.
[47] M. Bakro et al., “Building a Cloud-IDS by Hybrid Bio-Inspired Feature Selection Algorithms Along With Random Forest Model,” IEEE Access, 2024, doi: 10.1109/ACCESS.2024.3353055.