Data Analytics Approaches for Effective Threat Identification in Cloud Databases

Authors

  • Mr. Mohit Sahu` Department of Computer Sciences and Applications, Assistant Professor, Mandsaur University, Mandsaur. Author

DOI:

https://doi.org/10.63282/3050-922X.IJERET-V7I2P101

Keywords:

Cybersecurity, Cloud Computing, Internet of Things (IoT), Threat Detection, Distributed Security, Machine Learning

Abstract

The threats are also becoming more sophisticated and multifaceted in the world as the technology advances, including the data breaching, insecure interfaces, shared technology vulnerability, and distributed attacks. One of the most pressing problems in today's IT infrastructure is ensuring the safety and dependability of cloud computing by detecting threats in server databases. This study constructs and evaluates intrusion detection models using the CICIDS2017 dataset, which contains both benign and harmful traffic. Extensive data preprocessing steps were used to improve the dataset's quality and address the problem of class imbalance. Data purification, normalisation, feature selection, and SMOTE data balancing were all part of these processes. Some common measures used for training and testing LSTM models include accuracy (ACC), precision (PRE), recall (REC), and F1-score (F1). In the best trial result, the model achieved an ACC of 98.51%, PRE of 99.0%, recall of 98.0%, and F1 of 99.0%, proving that it is trustworthy in differentiating between benign and malicious traffic. Training and validation curves demonstrate successful learning and high generalization, and there is not a great deal of overfitting. The analysis of the confusion matrices also confirms the high rates of detection of all types of attacks where most of them were over 95 percent correct. The LSTM has an obvious advantage when compared to traditional models (MLP, SVM, XGBoost, DeepGFL): it is more effective, as it can identify intricate temporal patterns in network traffic that cannot be identified by other models. Finally, to improve the efficacy of intrusion detection systems in the modern cloud-based environment, the proposed LSTM model provides a strong and efficient method for detecting threats in cloud databases.

References

[1] M. R. R. Deva, “Advancing Industry 4.0 with Cloud-Integrated Cyber-Physical Systems for Optimizing Remote Additive Manufacturing Landscape,” in 2025 IEEE North-East India International Energy Conversion Conference and Exhibition (NE-IECCE), 2025, pp. 1–6. doi: 10.1109/NE-IECCE64154.2025.11182940.

[2] S. Thangavel, “AI Enhanced Image Processing System For Cyber Security Threat Analysis,” 2024.

[3] A. R. Bilipelli, “AI-Driven Intrusion Detection Systems for Large- Scale Cybersecurity Networks Data Analysis : A Comparative Study,” TIJER – Int. Res. J., vol. 11, no. 12, pp. 922–928, 2024.

[4] P. Nutalapati, J. R. Vummadi, S. Dodda, and N. Kamuni, “Advancing Network Intrusion Detection: A Comparative Study of Clustering and Classification on NSL-KDD Data,” in 2025 International Conference on Data Science and Its Applications, ICoDSA 2025, 2025, pp. 880–885. doi: 10.1109/ICoDSA67155.2025.11157595.

[5] G. Sarraf, “Behavioral Analytics for Continuous Insider Threat Detection in Zero-Trust Architectures,” Int. J. Res. Anal. Rev., vol. 8, no. 4, pp. 596–602, 2021.

[6] S. Narang and V. G. Kolla, “Next-Generation Cloud Security: A Review of the Constraints and Strategies in Serverless Computing,” Int. J. Res. Anal. Rev., vol. 12, no. 3, pp. 1–7, 2025, doi: 10.56975/ijrar.v12i3.319048.

[7] M. K. Shah, “AI-Based Framework for Ransomware Detection in Android Systems: Enhancing Mobile Security,” in 2025 5th International Conference on Artificial Intelligence and Signal Processing (AISP), IEEE, Nov. 2025, pp. 1–8. doi: 10.1109/AISP68263.2025.11396254.

[8] B. Madupati, M. M. Mohammed, L. Upadhyay, D. P. Guda, K. Kaushik, and M. Soni, “Integrating Artificial Intelligence with Cybersecurity for Resilient Wireless Communication Against Advanced Threats,” in 2025 International Conference on Artificial Intelligence and Machine Vision (AIMV), IEEE, Aug. 2025, pp. 1–5. doi: 10.1109/AIMV66517.2025.11203666.

[9] S. Amrale, “A Novel Generative AI-Based Approach for Robust Anomaly Identification in HighDimensional Dataset,” Int. J. Adv. Res. Sci. Commun. Technol., vol. 4, no. 2, 2024.

[10] A. Syed, “Securing IoT-Driven Supply Chains,” in Supply Chain Software Security, Berkeley, CA: Apress, 2024, pp. 289–342. doi: 10.1007/979-8-8688-0799-2_7.

[11] B. R. Ande, “Autonomous AI Agents for Identity Governance: Enhancing Financial Security Through Intelligent Insider Threat Detection and Compliance Enforcement,” Int. Conf. Data Sci. Big Data Anal., pp. 491–502, 2025.

[12] H. Ravilla, J. Yarra, and S. Dilip, “Role of SOQL and Database Optimization in Large-Scale Salesforce Implementations,” Int. J. Eng. Archit., vol. 3, no. 1, pp. 13–31, Feb. 2026, doi: 10.58425/ijea.v3i1.481.

[13] V. Prajapati, “Enhancing Threat Intelligence and Cyber Defense through Big Data Analytics: A Review Study,” J. Glob. Res. Math. Arch., vol. 12, no. 4, pp. 1–10, 2025.

[14] S. K. Chintagunta and S. Amrale, “Enhancing Cloud Database Security Through Intelligent Threat Detection and Risk Mitigation,” Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol., vol. 8, no. 3, pp. 1–13, Dec. 2022.

[15] R. Dattangire, R. Vaidya, D. Biradar, and A. Joon, “Exploring the Tangible Impact of Artificial Intelligence and Machine Learning: Bridging the Gap between Hype and Reality,” in 2024 1st International Conference on Advanced Computing and Emerging Technologies (ACET), IEEE, Aug. 2024, pp. 1–6. doi: 10.1109/ACET61898.2024.10730334.

[16] H. B. Dama, “A Survey of MySQL Database Administration Techniques and Best Practices,” ESP J. Eng. Technol. Adv., vol. 6, no. 1, pp. 89–98, 2026.

[17] S. B. Shah, B. Boddu, N. Prajapati, and S. A. Pahune, “AI-Powered Advanced Intrusion Detection for Securing Cloud Environments Against Network Attacks,” in 2025 Global Conference in Emerging Technology (GINOTECH), IEEE, May 2025, pp. 1–7. doi: 10.1109/GINOTECH63460.2025.11076673.

[18] H. P. Cyril, “DeepNetDetect: A Deep Learning-Based Approach for Early Anomaly Detection in Network Traffic,” in 2026 IEEE 5th International Conference on AI in Cybersecurity (ICAIC), IEEE, Feb. 2026, pp. 1–6. doi: 10.1109/ICAIC67076.2026.11395734.

[19] V. Verma, “Big Data and Cloud Databases Revolutionizing Business Intelligence,” TIJER – Int. Res. J., vol. 9, no. 1, pp. 48–58, 2022.

[20] M. Dhinakaran, M. Sundhari, S. Ambika, V. Balaji, and R. T. Rajasekaran, “Advanced Machine Learning Techniques for Enhancing Data Security in Cloud Computing Systems,” in 2024 IEEE International Conference on Computing, Power and Communication Technologies (IC2PCT), 2024, pp. 1598–1602. doi: 10.1109/IC2PCT60090.2024.10486559.

[21] G. Tiwari and R. Jain, “Detecting and Classifying Incoming Traffic in a Secure Cloud Computing Environment Using Machine Learning and Deep Learning System,” in Proceedings - 2022 IEEE 7th International Conference on Smart Cloud, SmartCloud 2022, 2022. doi: 10.1109/SmartCloud55982.2022.00010.

[22] U. Garg, H. Sivaraman, A. Bamola, and P. Kumari, “To Evaluate and Analyze the Performance of Anomaly Detection in Cloud of Things,” in 2022 13th International Conference on Computing Communication and Networking Technologies, ICCCNT 2022, 2022. doi: 10.1109/ICCCNT54827.2022.9984316.

[23] P. Ntambu and S. A. Adeshina, “Machine Learning-Based Anomalies Detection in Cloud Virtual Machine Resource Usage,” in 2021 1st International Conference on Multidisciplinary Engineering and Applied Science, ICMEAS 2021, 2021. doi: 10.1109/ICMEAS52683.2021.9692308.

[24] T. L. Yasarathna and L. Munasinghe, “Anomaly detection in cloud network data,” in 2020 International Research Conference on Smart Computing and Systems Engineering (SCSE), IEEE, Sep. 2020, pp. 62–67. doi: 10.1109/SCSE49731.2020.9313014.

[25] T. Salman, D. Bhamare, A. Erbad, R. Jain, and M. Samaka, “Machine Learning for Anomaly Detection and Categorization in Multi-Cloud Environments,” in 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), 2017, pp. 97–103. doi: 10.1109/CSCloud.2017.15.

[26] R. Patel, “Automated Threat Detection and Risk Mitigation for ICS (Industrial Control Systems) Employing Deep Learning in Cybersecurity Defence,” Int. J. Curr. Eng. Technol., vol. 13, no. 06, pp. 584–591, Dec. 2023, doi: 10.14741/ijcet/v.13.6.11.

[27] S. N. Pakanzad and H. Monkaresi, “Providing a hybrid approach for detecting malicious traffic on the computer networks using convolutional neural networks,” in 2020 28th Iranian Conference on Electrical Engineering, ICEE 2020, 2020, pp. 1–6. doi: 10.1109/ICEE50131.2020.9260686.

[28] G. Nassreddine, M. Nassereddine, and O. Al-Khatib, “Ensemble Learning for Network Intrusion Detection Based on Correlation and Embedded Feature Selection Techniques,” Computers, vol. 14, no. 3, pp. 82–104, 2025, doi: 10.3390/computers14030082.

[29] T.-H. Chua and I. Salam, “Evaluation of Machine Learning Algorithms in Network-Based Intrusion Detection Using Progressive Dataset,” Symmetry (Basel)., vol. 15, no. 6, p. 1251, Jun. 2023, doi: 10.3390/sym15061251.

Downloads

Published

2026-04-01

Issue

Section

Articles

How to Cite

1.
Sahu M. Data Analytics Approaches for Effective Threat Identification in Cloud Databases. IJERET [Internet]. 2026 Apr. 1 [cited 2026 Apr. 10];7(2):1-9. Available from: https://ijeret.org/index.php/ijeret/article/view/558