A REVIEW STUDY ON THE DEVELOPMENT OF LSTM-BASED INTRUSION DETECTION SYSTEM IN CLOUD COMPUTING ENVIRONMENTS

Authors

  • Deepali Hiraman Gavhane Research Scholar, JSPM University, Pune, Maharashtra, 412207, India
  • Santosh Gaikwad Associate Professor, Department of Science and Technology, JSPM University, Pune, Maharashtra, 412207, India
  • Chitra Desai Professor, Department of Computer Science, National Defence Academy, Pune, Maharashtra, 411023, India

DOI:

https://doi.org/10.29121/shodhkosh.v7.i10s.2026.8147

Keywords:

Intrusion Detection Systems, Long Short-Term Memory, Cloud Computing, Recurrent Neural Networks, Network Traffic, Virtualized Environments

Abstract [English]

Cloud computing environments have become integral to modern IT infrastructure, offering scalable and flexible resources to users worldwide. Despite their advantages, cloud computing environments face significant challenges such as data security vulnerabilities and privacy concerns. Additionally, the complexity of managing dynamic, distributed resources increases the risk of cyberattacks and system breaches. The review of this study is to develop an LSTM-based intrusion detection system to enhance security in cloud computing environments. It aims to accurately detect and prevent cyber threats by analyzing network traffic patterns in real-time. This study examines the critical need for advanced intrusion detection systems (IDS) in cloud computing, focusing on the rising security threats and limitations of traditional IDS techniques. It highlights the advantages of Long Short-Term Memory (LSTM) networks for detecting sequential attack patterns and compares LSTM with other deep learning methods. The study examines various LSTM architectures, hybrid models, and feature engineering approaches used in IDS research, alongside key evaluation metrics. Publicly available datasets like NSL-KDD and CICIDS2017 are discussed, emphasizing challenges in data collection and benchmarking. Finally, the review outlines practical applications of LSTM-based IDS in real-time cloud environments, stressing their role in improving security across IaaS, PaaS, and SaaS platforms. Future research should focus on emerging more robust LSTM models that handle evolving cyber threats in cloud environments.

References

Olaoye, G., 2025. AI-Driven Intrusion Detection and Prevention Systems (IDPS) for Cloud Security. Available at SSRN 5129525.

Thiagarajan, G. and Mahalingam, S., 2025. Advanced Deep Learning Techniques for Anomaly Detection in Cloud Computing Traffic: Methods and Applications. Available at SSRN 5082090.

Aljuaid, W.A.H. and Alshamrani, S.S., 2024. A deep learning approach for intrusion detection systems in cloud computing environments. Applied Sciences, 14(13), p.5381.

Balasubramanian, P., Nazari, S., Kholgh, D.K., Mahmoodi, A., Seby, J. and Kostakos, P., 2025. A cognitive platform for collecting cyber threat intelligence and real-time detection using cloud computing. Decision Analytics Journal, 14, p.100545.

Jim, M.M.I., 2024. Cloud Security Posture Management Automating Risk Identification and Response in Cloud Infrastructures. Academic Journal on Science, Technology, Engineering & Mathematics Education, 4(3), pp.10-69593.

Wang, Y., Zhu, M., Yuan, J., Wang, G. and Zhou, H., 2024. The intelligent prediction and assessment of financial information risk in the cloud computing model. arXiv preprint arXiv:2404.09322.

Chauke, K.O., Muchenje, T. and Makondo, N., Enhancing Network Security in Multi-Cloud Environments through Adaptive Threat Detection.

Bolla, R.L., Jenie, R.P. and Bobba, J., 2025. The Securing Financial Cloud Services: A Novel Approach Using Identity-Chain Technology and Cluster Evaluation: Financial Cloud Services Using Identity-Chain Technology. International Journal of Digital Innovation and Discoveries, 1(01), pp.22-30.

Al-Bayati, B., Continuous User Verification in Cloud Storage Services based on Deep Learning.

Attou, H., Guezzaz, A., Benkirane, S. and Azrour, M., Cloud Security Enhancement Through RBFNN and AdaBoost-Based Model.

Düzgün, B., Çayır, A., Ünal, U. and Dağ, H., 2024. Network intrusion detection system by learning jointly from tabular and text‐based features. Expert Systems, 41(4), p.e13518.

Zhao, F., Li, H., Niu, K., Shi, J. and Song, R., 2024. Application of deep learning-based intrusion detection system (IDS) in network anomaly traffic detection. Applied and Computational Engineering, 86, pp.231-237.

Alashhab, A.A., Zahid, M.S., Isyaku, B., Elnour, A.A., Nagmeldin, W., Abdelmaboud, A., Abdullah, T.A.A. and Maiwada, U.D., 2024. Enhancing DDoS attackdetection and mitigation in SDN using anensembleonlinemachinelearningmodel. IEEE Access, 12, pp.51630-51649.

Khan, N., Ahmad, K., Tamimi, A.A., Alani, M.M., Bermak, A. and Khalil, I., 2024. Explainable AI-based Intrusion Detection System for Industry 5.0: An Overview of the Literature, associated Challenges, the Existing Solutions, and Potential Research Directions. arXiv preprint arXiv:2408.03335.

Gujar, S.S., 2024, October. AI-Enhanced Intrusion Detection Systems for Strengthening Critical Infrastructure Security. In 2024 Global Conference on Communications and Information Technologies (GCCIT) (pp. 1-7). IEEE.

Dash, N., Chakravarty, S., Rath, A.K., Giri, N.C., AboRas, K.M. and Gowtham, N., 2025. An optimized LSTM-based deep learning model for anomaly network intrusion detection. Scientific Reports, 15(1), p.1554.

Rajesh, S.C. and Goel, L., 2025. Architecting Distributed Systems for Real-Time Data Processing in Multi-Cloud Environments.

Akram, F. and Sani, M., 2025. Real-Time AI Systems: Leveraging Cloud Computing and Machine Learning for Big Data Processing.

Wang, P., Lin, H.C., Chen, J.H., Lin, W.H. and Li, H.C., 2025. Improving Cyber Defense Against Ransomware: A Generative Adversarial Networks-Based Adversarial Training Approach for Long Short-Term Memory Network Classifier. Electronics, 14(4), p.810.

Kandasamy, V. and Roseline, A.A., 2025. Harnessing advanced hybrid deep learning model for real-time detection and prevention of man-in-the-middle cyber-attacks. Scientific Reports, 15(1), p.1697.

Rampone, G., Ivaniv, T. and Rampone, S., 2025. A Hybrid Federated Learning Framework for Privacy-Preserving Near-Real-Time Intrusion Detection in IoT Environments. Electronics, 14(7), p.1430.

Manivannan, R. and Senthilkumar, S., 2025. Intrusion detection system for network security using novel adaptive recurrent neural network-based fox optimizer concept. International Journal of Computational Intelligence Systems, 18(1), p.37.

Das, S., Tariq, A., Santos, T., Kantareddy, S.S. and Banerjee, I., 2023. Recurrent Neural Networks (RNNs): architectures, training tricks, and introduction to influential research. Machine learning for Brain disorders, pp.117-138.

Ahmed, S.A., Khalifa, E.H., Nawaz, M., Abdalla, F.A. and Mahmoud, A.F., 2025. Enhancing Cloud Data Center Security through Deep Learning: A Comparative Analysis of RNN, CNN, and LSTM Models for Anomaly and Intrusion Detection. Engineering, Technology & Applied Science Research, 15(1), pp.20071-20076.

Zi, Y., 2024. Time-Series Load Prediction for Cloud Resource Allocation Using Recurrent Neural Networks. Journal of Computer Technology and Software, 3(7).

Scientific, L.L., 2025. Hybrid Deep Learning Framework for Intrusion Detection: Integrating Cnn, Lstm, And Attention Mechanisms to Enhance Cybersecurity. Journal of Theoretical and Applied Information Technology, 103(1).

Sayegh, H.R., Dong, W. and Al-madani, A.M., 2024. Enhanced intrusion detection with LSTM-Based model, feature selection, and SMOTE for imbalanced data. Applied Sciences, 14(2), p.479.

Liu, Y. and Dai, Y., 2024. Deep Learning in Cybersecurity: A Hybrid BERT–LSTM Network for SQL Injection Attack Detection. IET Information Security, 2024(1), p.5565950.

Udurume, M., Shakhov, V. and Koo, I., 2024. Comparative Analysis of Deep Convolutional Neural Network Bidirectional Long Short-Term Memory and Machine Learning Methods in Intrusion Detection Systems. Applied Sciences, 14(16), p.6967.

Lee, M.C., Lin, J.C. and Katsikas, S., 2024. Exploring the effects of RNNs and deep learning frameworks on real‐time, lightweight, adaptive time series anomaly detection. Concurrency and Computation: Practice and Experience, 36(28), p. e8288.

Mungoli, N., 2023. Scalable, distributed AI frameworks: leveraging cloud computing for enhanced deep learning performance and efficiency. arXiv preprint arXiv:2304.13738.

Arjunan, T., 2024. Real-time detection of network traffic anomalies in big data environments using deep learning models. International Journal for Research in Applied Science and Engineering Technology, 12(9), pp.10-22214.

Saha, S., Haque, A. and Sidebottom, G., 2024. Overcoming Data Limitations in Internet Traffic Forecasting: LSTM Models with Transfer Learning and Wavelet Augmentation. arXiv preprint arXiv:2409.13181.

Rajashekaran, K., Kazmi, R. and Jain, R.,2024. Machine Learning-Enhanced IDS: RFE-LSTM-Based Model for Cloud Security.

Aljuaid, W.A.H. and Alshamrani, S.S., 2024. A deep learning approach for intrusion detection systems in cloud computing environments. Applied Sciences, 14(13), p.5381.

Chowdhury, R., Inshi, S., Ould-Slimane, H., Talhi, C. and Mourad, A., 2025. Dynamic Real-Time Framework for Abnormal Detection of IMS Core in Kubernetes Cloud. Computer Networks and Communications, pp.147-166.

Hariharan, S., Jerusha, Y.A., Suganeshwari, G., Ibrahim, S.S., Tupakula, U. and Varadharajan, V., 2025. A Hybrid Deep Learning Model for Network Intrusion Detection System using Seq2Seq and ConvLSTM-Subnets. IEEE Access.

Salman, A.M., Al-Nuaimi, B.T., Subhi, A.A., Alkattan, H. and Alfilh, R.H., 2025. Enhancing cybersecurity with machine learning: A hybrid approach for anomaly detection and threat prediction. Mesopotamian Journal of Cybersecurity, 5(1), pp.202- 215.

Sajid, M., Malik, K.R., Almogren, A., Malik, T.S., Khan, A.H., Tanveer, J. and Rehman, A.U., 2024. Enhancing intrusion detection: a hybrid machine and deep learning approach. Journal of Cloud Computing, 13(1), p.123.

Kamal, H. and Mashaly, M., 2025. Enhanced Hybrid Deep Learning Models-Based Anomaly Detection Method for Two-Stage Binary and Multi-Class Classification of Attacks in Intrusion Detection Systems. Algorithms, 18(2), p.69.

Gong, P., Ma, Y., Li, C., Ma, X. and Noh, S.H., 2023. Understand Data Preprocessing for Effective End-to-End Training of Deep Neural Networks. arXiv preprint arXiv:2304.08925.

Smendowski, M. and Nawrocki, P., 2024. Optimizing multi-time series forecasting for enhanced cloud resource utilization based on machine learning. Knowledge-Based Systems, 304, p.112489.

Brightwood, S. and Seraphina Brightwood, A., 2024. Data Preprocessing and Feature Engineering for Cyber Threat Detection [online]

Omer, S.Z., Hashim, F., Sali, A. and Ahmad, F.A., 2025. Binary classification of Low-Rate DoS attacks using Long Short-Term Memory Feed-Forward (LSTM-FF) Intrusion Detection System (IDS). Engineering Science and Technology, an International Journal, 66, p.102049.

Kaushik, B., Sharma, R., Dhama, K., Chadha, A. and Sharma, S., 2023. Performance evaluation of learning models for intrusion detection system using feature selection. Journal of Computer Virology and Hacking Techniques, 19(4), pp.529-548.

Tripathy, S.S. and Behera, B., 2023. Performance evaluation of machine learning algorithms for intrusion detection system. arXiv preprint arXiv:2310.00594.

M.A.M.A. Hawawreh, E. Sitnikova, N. Aboutorab, X-iiotid: A connectivityagnostic and device-agnostic intrusion data set for industrial internet of things, IEEE Internet Things J. 9 (2022) 3962–3977.

A. Makkar, T.W. Kim, A.K. Singh, J. Kang, J.H. Park, Secureiiot environment: Federated learning empowered approach for securing IIOT from data breach, IEEE Transactions on Industrial Informatics (Early Access. doi: 10.1109/ TII.2022.3149902.

M.A. Hawawreh, E. Sitnikova, N. Aboutorab, Asynchronous peer-to-peer federated capability-based targeted ransomware detection model for industrial iot, IEEE Access 9 (2021) 148738–148755.

L. Thi-Thu-Huong, E. Yustos, K. Howon, Xgboost for imbalanced multiclass classification-based industrial internet of things intrusion detection systems, Sustainability 14. doi: 10.3390/su14148707.

Altunay, H.C. and Albayrak, Z., 2023. A hybrid CNN+ LSTM-based intrusion detection system for industrial IoT networks. Engineering Science and Technology, an International Journal, 38, p.101322.

Mohamed, D. and Ismael, O., 2023. Enhancement of an IoT hybrid intrusion detection system based on fog-to-cloud computing. Journal of Cloud Computing, 12(1), p.41.

Srilatha, D. and Thillaiarasu, N., 2023. Implementation of Intrusion detection and prevention with Deep Learning in Cloud Computing. Journal of Information Technology Management, 15(Special Issue), pp.1-18.

Alohali, M.A., Elsadig, M., Al-Wesabi, F.N., Al Duhayyim, M., Mustafa Hilal, A. and Motwakel, A., 2023. Enhanced Chimp optimization-based feature selection with fuzzy logic-based intrusion detection system in cloud environment. Applied Sciences, 13(4), p.2580.

Al-Ghuwairi, A.R., Sharrab, Y., Al-Fraihat, D., AlElaimat, M., Alsarhan, A. and Algarni, A., 2023. Intrusion detection in cloud computing based on time series anomalies utilizing machine learning. Journal of Cloud Computing, 12(1), p.127.

Gulia, N., Solanki, K., Dalal, S., Dhankhar, A., Dahiya, O. and Salmaan, N.U., 2023. Intrusion Detection System Using the G‐ABC with Deep Neural Network in Cloud Environment. Scientific Programming, 2023(1), p.7210034.

Bakro, M., Kumar, R.R., Alabrah, A., Ashraf, Z., Ahmed, M.N., Shameem, M. and Abdelsalam, A., 2023. An improved design for a cloud intrusion detection system using hybrid features selection approach with ML classifier. IEEE Access, 11, pp.64228-64247.

Alzughaibi, S. and El Khediri, S., 2023. A cloud intrusion detection system based on DNN using backpropagation and PSO on the cse-cic-ids2018 dataset. Applied Sciences, 13(4), p.2276.

Althobaiti, T., Sanjalawe, Y. and Ramzan, N., 2023. Securing Cloud Computing from Flash Crowd Attack Using Ensemble Intrusion Detection System. Computer Systems Science & Engineering, 47(1).

Basahel, A.M., Yamin, M., Basahel, S.M. and Lydia, E.L., 2023. Enhanced coyote optimization with deep learning based cloud-intrusion detection system. Computers, Materials & Continua, 74(2), pp.4319-4336.

Bukhari, O., Agarwal, P., Koundal, D. and Zafar, S., 2023. Anomaly detection using ensemble techniques for boosting the security of intrusion detection system. Procedia Computer Science, 218, pp.1003-1013.

Hidayat, I., Ali, M.Z. and Arshad, A., 2023. Machine learning-based intrusion detection system: an experimental comparison. Journal of Computational and Cognitive Engineering, 2(2), pp.88-97.

Downloads

Published

2026-05-15

How to Cite

Gavhane, D. H., Gaikwad, S., & Desai, C. (2026). A REVIEW STUDY ON THE DEVELOPMENT OF LSTM-BASED INTRUSION DETECTION SYSTEM IN CLOUD COMPUTING ENVIRONMENTS. ShodhKosh: Journal of Visual and Performing Arts, 7(10s), 210–228. https://doi.org/10.29121/shodhkosh.v7.i10s.2026.8147