Cybersecurity in Cloud Computing AI-Driven Intrusion Detection and Mitigation Strategies

This paper explores the development and evaluation of advanced machine learning models for intrusion detection in cloud environments. We focus on Transformer-based Spatio-Temporal Graph Neural Networks (ST-GNN), CNN, LSTM, Isolation Forest, and conventional GNNs, analyzing their performance on three...

Full description

Saved in:
Bibliographic Details
Main Authors: Fei Wang, Sanshan Xie
Format: Article
Language:English
Published: IEEE 2025-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/11037724/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850163490782707712
author Fei Wang
Sanshan Xie
author_facet Fei Wang
Sanshan Xie
author_sort Fei Wang
collection DOAJ
description This paper explores the development and evaluation of advanced machine learning models for intrusion detection in cloud environments. We focus on Transformer-based Spatio-Temporal Graph Neural Networks (ST-GNN), CNN, LSTM, Isolation Forest, and conventional GNNs, analyzing their performance on three distinct datasets: NSL-KDD, CICIDS2017, and a custom synthetic dataset. The models were assessed based on key metrics such as precision, recall, F1 score, ROC-AUC, and detection latency. Our results demonstrate that Transformer-based ST-GNN exhibits superior performance, showing robustness, scalability, and efficient real-time detection capabilities, making it a promising candidate for next-generation intrusion detection systems (IDS). We also discuss the mathematical foundations behind model superiority, including generalization bounds, and acknowledge the limitations of current models, such as vulnerability to adversarial attacks. The study highlights the potential for improvements in real-time federated deployment, hardware-aware acceleration through FPGA/GPU-based inference, and integration with Zero-Trust Architecture (ZTA) for enhanced cybersecurity. This paper provides a comprehensive comparison of IDS models, offering valuable insights for future research and real-world applications in network security.
format Article
id doaj-art-62c403aee4c245afa0806243761a9e2c
institution OA Journals
issn 2169-3536
language English
publishDate 2025-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj-art-62c403aee4c245afa0806243761a9e2c2025-08-20T02:22:15ZengIEEEIEEE Access2169-35362025-01-011310805110805810.1109/ACCESS.2025.358056911037724Cybersecurity in Cloud Computing AI-Driven Intrusion Detection and Mitigation StrategiesFei Wang0Sanshan Xie1https://orcid.org/0009-0001-8570-3922School of Automobile and Transportation, Chengdu Technological University, Chengdu, ChinaSchool of Automobile and Transportation, Chengdu Technological University, Chengdu, ChinaThis paper explores the development and evaluation of advanced machine learning models for intrusion detection in cloud environments. We focus on Transformer-based Spatio-Temporal Graph Neural Networks (ST-GNN), CNN, LSTM, Isolation Forest, and conventional GNNs, analyzing their performance on three distinct datasets: NSL-KDD, CICIDS2017, and a custom synthetic dataset. The models were assessed based on key metrics such as precision, recall, F1 score, ROC-AUC, and detection latency. Our results demonstrate that Transformer-based ST-GNN exhibits superior performance, showing robustness, scalability, and efficient real-time detection capabilities, making it a promising candidate for next-generation intrusion detection systems (IDS). We also discuss the mathematical foundations behind model superiority, including generalization bounds, and acknowledge the limitations of current models, such as vulnerability to adversarial attacks. The study highlights the potential for improvements in real-time federated deployment, hardware-aware acceleration through FPGA/GPU-based inference, and integration with Zero-Trust Architecture (ZTA) for enhanced cybersecurity. This paper provides a comprehensive comparison of IDS models, offering valuable insights for future research and real-world applications in network security.https://ieeexplore.ieee.org/document/11037724/Intrusion detection systemsgraph neural networkstransformer-based ST-GNNcybersecurityreal-time detection
spellingShingle Fei Wang
Sanshan Xie
Cybersecurity in Cloud Computing AI-Driven Intrusion Detection and Mitigation Strategies
IEEE Access
Intrusion detection systems
graph neural networks
transformer-based ST-GNN
cybersecurity
real-time detection
title Cybersecurity in Cloud Computing AI-Driven Intrusion Detection and Mitigation Strategies
title_full Cybersecurity in Cloud Computing AI-Driven Intrusion Detection and Mitigation Strategies
title_fullStr Cybersecurity in Cloud Computing AI-Driven Intrusion Detection and Mitigation Strategies
title_full_unstemmed Cybersecurity in Cloud Computing AI-Driven Intrusion Detection and Mitigation Strategies
title_short Cybersecurity in Cloud Computing AI-Driven Intrusion Detection and Mitigation Strategies
title_sort cybersecurity in cloud computing ai driven intrusion detection and mitigation strategies
topic Intrusion detection systems
graph neural networks
transformer-based ST-GNN
cybersecurity
real-time detection
url https://ieeexplore.ieee.org/document/11037724/
work_keys_str_mv AT feiwang cybersecurityincloudcomputingaidrivenintrusiondetectionandmitigationstrategies
AT sanshanxie cybersecurityincloudcomputingaidrivenintrusiondetectionandmitigationstrategies