Volume 21 , Issue 2 , PP: 104-118, 2026 | Cite this article as | XML | Html | PDF | Full Length Article
Waleed Khalid Alzubaidi 1 *
Doi: https://doi.org/10.54216/FPA.210207
Cloud communication faces numerous disruptive cybersecurity threats. Various issues related to such disruption have been the subject of previous research, but detection attacks in the blade server (BS) in the cloud have not been studied. Therefore, this paper proposes an efficient intrusion detection system (IDS) framework for BS in the cloud. This framework uses Kerberos authentication-based exponential Mestre-Brainstrass curve cryptography, Sechsoftwave and sparsely centric gated recurrent unit (SSGRU). In this framework, cloud users are firstly registered to the network, and then incoming data are encrypted. The BS is then used to balance the incoming loads, and IDS is applied to detect attacks in the BS, with the data being pre-processed firstly and the big data being handled in the IDS. Afterwards, the features are extracted, from which optimal features are selected. Attacked and normal blades are classified by using the SSGRU classifier and then differentiated by generating a Sankey diagram. The attacked blades are then isolated, and the normal blades are used for load balancing on the cloud. Results indicate that this model achieved 99.43% accuracy, thus demonstrating superior performance to other models.
Cloud computing, Blade server , Cybersecurity threat detection , Set-union combiner-based Hadoop MapReduce , Grid-greedy initialization-based shark smell optimization , Lorentzy membership-based fuzzy logic system , Exploratory data analysis
[1] M. Ahsan, K. E. Nygard, R. Gomes, M. M. Chowdhury, N. Rifat, and J. F. Connolly, “Cybersecurity threats and their mitigation approaches using machine learning—A review,” J. Cybersecurity Privacy, vol. 2, no. 3, pp. 527–555, 2022, doi: 10.3390/jcp2030027.
[2] Z. Alzubaidi, M. A. Alshahrani, M. A. Alzahrani, and R. A. Alhussein, “A comprehensive survey on cybersecurity threats and countermeasures in smart home environments,” J. Netw. Comput. Appl., vol. 204, pp. 1–20, Jan. 2023, doi: 10.1016/j.jnca.2023.103307.
[3] Alouffi et al., “A systematic literature review on cloud computing security: Threats and mitigation strategies,” IEEE Access, vol. 9, pp. 57792–57807, 2021, doi: 10.1109/ACCESS.2021.3073203.
[4] N. Ahmed, T. Baker, Z. Jalil, A. Rasool, and W. Ahmad, “Cyber security in IoT-based cloud computing: A comprehensive survey,” Electronics, vol. 11, no. 1, pp. 1–34, 2022, doi: 10.3390/electronics11010016.
[5] S. El Kafhali, I. El Mir, and M. Hanini, “Security threats, defense mechanisms, challenges, and future directions in cloud computing,” Archives Comput. Methods Eng., vol. 29, pp. 223–246, 2022, doi: 10.1007/s11831-021-09573-y.
[6] M. Abdullahi et al., “Detecting cybersecurity attacks in internet of things using artificial intelligence methods: A systematic literature review,” Electronics, vol. 11, no. 2, pp. 1–27, 2022, doi: 10.3390/electronics11020198.
[7] V. Chang et al., “A survey on intrusion detection systems for fog and cloud computing,” Future Internet, vol. 14, no. 3, pp. 1–27, 2022, doi: 10.3390/fi14030089.
[8] M. L. Hernandez-Jaimes, A. Martinez-Cruz, K. A. Ramírez-Gutiérrez, and C. Feregrino-Uribe, “Artificial intelligence for IoMT security: A review of intrusion detection systems, attacks, datasets and Cloud–Fog–Edge architectures,” Internet Things, vol. 23, pp. 1–33, 2023, doi: 10.1016/j.iot.2023.100887.
[9] J. Guo and H. Guo, “Real-time risk detection method and protection strategy for intelligent ship network security based on cloud computing,” Symmetry, vol. 15, no. 5, pp. 1–13, 2023, doi: 10.3390/sym15050988.
[10] Alshammari and A. Aldribi, “Apply machine learning techniques to detect malicious network traffic in cloud computing,” J. Big Data, vol. 8, no. 1, pp. 1–24, 2021, doi: 10.1186/s40537-021-00475-1.
[11] F. J. Abdullayeva, “Advanced persistent threat attack detection method in cloud computing based on autoencoder and softmax regression algorithm,” Array, vol. 10, pp. 1–11, 2021.
[12] Aldallal and F. Alisa, “Effective intrusion detection system to secure data in cloud using machine learning,” Symmetry, vol. 13, no. 12, pp. 1–26, 2021, doi: 10.3390/sym13122306.
[13] O. Aslan, S. S. Aktuğ, M. Ozkan-Okay, A. A. Yilmaz, and E. Akin, “A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions,” Electronics, vol. 12, no. 6, pp. 1–42, 2023, doi: 10.3390/electronics12061333.
[14] R. Al-Ghuwairi et al., “Intrusion detection in cloud computing based on time series anomalies utilizing machine learning,” J. Cloud Comput., vol. 12, no. 1, pp. 1–17, 2023, doi: 10.1186/s13677-023-00491-x.
[15] H. Attou et al., “Towards an intelligent intrusion detection system to detect malicious activities in cloud computing,” Appl. Sci., vol. 13, no. 17, pp. 1–19, 2023, doi: 10.3390/app13179588.
[16] P. Singh and V. Ranga, “Attack and intrusion detection in cloud computing using an ensemble learning approach,” Int. J. Inf. Technol., vol. 13, no. 2, pp. 565–571, 2021, doi: 10.1007/s41870-020-00583-w.
[17] Agarwal, M. Khari, and R. Singh, “Detection of DDOS attack using deep learning model in cloud storage application,” Wireless Pers. Commun, vol. 127, no. 1, pp. 419–439, 2022, doi: 10.1007/s11277-021-08271-z.
[18] S. Balasubramaniam et al., “Optimization enabled deep learning-based DDoS attack detection in cloud computing,” Int. J. Intell. Syst., vol. 2023, pp. 1–16, 2023, doi: 10.1155/2023/2039217.
[19] S. S. Hameed et al., “Security enhancement and attack detection using optimized hybrid deep learning and improved encryption algorithm over Internet of Things,” Meas.: Sensors, vol. 30, pp. 1–8, 2023, doi: 10.1016/j.measen.2023.100917.
[20] T. H. H. Aldhyani and H. Alkahtani, “Artificial intelligence algorithm-based economic denial of sustainability attack detection systems: Cloud computing environments,” Sensors, vol. 22, no. 13, pp. 1–24, 2022, doi: 10.3390/s22134685.