CFP last date
20 May 2026
Reseach Article

An Adaptive Hybrid Machine Learning Framework for Early Detection of Network Intrusions in Cloud Computing Environments

by Kruti D. Desai, Roshani S. Patel
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 187 - Number 107
Year of Publication: 2026
Authors: Kruti D. Desai, Roshani S. Patel
10.5120/ijcabc88bac48614

Kruti D. Desai, Roshani S. Patel . An Adaptive Hybrid Machine Learning Framework for Early Detection of Network Intrusions in Cloud Computing Environments. International Journal of Computer Applications. 187, 107 ( May 2026), 36-41. DOI=10.5120/ijcabc88bac48614

@article{ 10.5120/ijcabc88bac48614,
author = { Kruti D. Desai, Roshani S. Patel },
title = { An Adaptive Hybrid Machine Learning Framework for Early Detection of Network Intrusions in Cloud Computing Environments },
journal = { International Journal of Computer Applications },
issue_date = { May 2026 },
volume = { 187 },
number = { 107 },
month = { May },
year = { 2026 },
issn = { 0975-8887 },
pages = { 36-41 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume187/number107/an-adaptive-hybrid-machine-learning-framework-for-early-detection-of-network-intrusions-in-cloud-computing-environments/ },
doi = { 10.5120/ijcabc88bac48614 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2026-05-21T00:17:02.087905+05:30
%A Kruti D. Desai
%A Roshani S. Patel
%T An Adaptive Hybrid Machine Learning Framework for Early Detection of Network Intrusions in Cloud Computing Environments
%J International Journal of Computer Applications
%@ 0975-8887
%V 187
%N 107
%P 36-41
%D 2026
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The increasing reliance on cloud computing has introduced significant security challenges, particularly in detecting sophisticated and evolving cyber-attacks. Traditional intrusion detection systems (IDS) are often limited by their dependence on predefined signatures and lack the ability to identify unknown threats in dynamic environments. To address these limitations, this paper proposes an adaptive hybrid machine learning framework for early detection of network intrusions in cloud computing environments. The proposed approach integrates an Autoencoder-based anomaly detection model with a Random Forest classifier to effectively identify both known and unknown attack patterns. The Autoencoder learns normal network behaviour and detects deviations, while the Random Forest model classifies the detected anomalies into specific attack categories. In addition, an adaptive learning mechanism is incorporated to continuously update the model using new network data, ensuring improved performance over time. The system is evaluated using the CICIDS2017 dataset, and its performance is measured using standard metrics such as accuracy, precision, recall, and F1-score. Experimental results demonstrate that the proposed model achieves high detection accuracy with a low false positive rate compared to traditional methods. The findings suggest that combining supervised and unsupervised learning techniques with adaptive capabilities can significantly enhance intrusion detection in cloud environments. This work contributes toward developing intelligent, scalable, and efficient cybersecurity solutions for modern cloud infrastructures.

References
  1. Ahmad, Z., Khan, A. S., Shiang, C. W., Abdullah, J., & Ahmad, F. (2021). Network intrusion detection system: A systematic study. IEEE Access, 9, 799–817.
  2. Alrawashdeh, K., & Purdy, C. (2016). Toward an online anomaly intrusion detection system based on deep learning. Proceedings of IEEE SoutheastCon.
  3. Breiman, L. (2001). Random forests. Machine Learning, 45(1), 5–32.
  4. Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153–1176.
  5. Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM Computing Surveys, 41(3), 1–58.
  6. Denning, D. E. (1987). An intrusion-detection model. IEEE Transactions on Software Engineering, 13(2), 222–232.
  7. Dua, D., & Graff, C. (2019). UCI machine learning repository. University of California, Irvine. http://archive.ics.uci.edu/ml
  8. Goodfellow, I., Bengio, Y., & Courville, A. (2016). Deep learning. MIT Press.
  9. Hinton, G. E., & Salakhutdinov, R. R. (2006). Reducing the dimensionality of data with neural networks. Science, 313(5786), 504–507.
  10. Javaid, A., Niyaz, Q., Sun, W., & Alam, M. (2016). A deep learning approach for network intrusion detection system. Proceedings of the EAI International Conference.
  11. Kim, G., Lee, S., & Kim, S. (2014). A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Systems with Applications, 41(4), 1690–1700.
  12. Lashkari, A. H., et al. (2017). Characterization of Tor traffic using time-based features. Proceedings of ICISSP.
  13. Laskov, P., et al. (2005). Learning intrusion detection: Supervised or unsupervised? Proceedings of the International Conference on Image Analysis and Processing.
  14. Mirsky, Y., et al. (2018). Kitsune: An ensemble of autoencoders for online network intrusion detection. Proceedings of NDSS.
  15. Moustafa, N., & Slay, J. (2015). UNSW-NB15: A comprehensive data set for network intrusion detection systems. Proceedings of MilCIS.
  16. Patcha, A., & Park, J. M. (2007). An overview of anomaly detection techniques. Computer Networks, 51(12), 3448–3470.
  17. Ring, M., Wunderlich, S., Grüdl, D., Landes, D., & Hotho, A. (2019). A survey of network-based intrusion detection data sets. Computers & Security, 86, 147–167.
  18. Scarfone, K., & Mell, P. (2007). Guide to intrusion detection and prevention systems (IDPS). NIST.
  19. Sharafaldin, I., Lashkari, A. H., & Ghorbani, A. A. (2018). Toward generating a new intrusion detection dataset. Proceedings of ICISSP.
  20. Shone, N., Ngoc, T. N., Phai, V. D., & Shi, Q. (2018). A deep learning approach to network intrusion detection. IEEE Transactions on Emerging Topics in Computational Intelligence, 2(1), 41–50.
  21. Sommer, R., & Paxson, V. (2010). On using machine learning for network intrusion detection. IEEE Symposium on Security and Privacy.
  22. Sethi, K., et al. (2020). Deep reinforcement learning for intrusion detection in cyber-physical systems. IEEE Internet of Things Journal, 7(7), 6185–6197.
  23. Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. A. (2009). A detailed analysis of the KDD Cup 99 dataset. IEEE Symposium.
  24. Yin, C., Zhu, Y., Fei, J., & He, X. (2017). Intrusion detection using recurrent neural networks. IEEE Access, 5, 21954–21961.
  25. Zhang, J., & Zulkernine, M. (2006). Anomaly-based network intrusion detection. IEEE ICC.
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion Detection System Cloud Security Machine Learning Anomaly Detection Random Forest Autoencoder Cybersecurity