{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T04:49:58Z","timestamp":1773722998222,"version":"3.50.1"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T00:00:00Z","timestamp":1764201600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T00:00:00Z","timestamp":1764201600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"DOI":"10.1186\/s13677-025-00797-y","type":"journal-article","created":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T11:21:42Z","timestamp":1764242502000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A hybrid metaheuristic federated learning approach based attack detection system for multi-cloud environment"],"prefix":"10.1186","volume":"14","author":[{"given":"Rashmi","family":"Verma","sequence":"first","affiliation":[]},{"given":"Manisha","family":"Jailia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,27]]},"reference":[{"issue":"11","key":"797_CR1","first-page":"10063","volume":"20","author":"SR Julakanti","year":"2022","unstructured":"Julakanti SR, Sattiraju NSK, Julakanti R (2022) Multi-cloud security: strategies for managing hybrid environments. Neuro Quantology 20(11):10063\u201310074","journal-title":"NeuroQuantology"},{"key":"797_CR2","doi-asserted-by":"crossref","unstructured":"Merseedi KJ, Zeebaree SR (2024) The cloud architectures for distributed multi-cloud computing: a review of hybrid and federated cloud environment. Indones J Comput Sci. 13(2)","DOI":"10.33022\/ijcs.v13i2.3811"},{"issue":"2","key":"797_CR3","first-page":"61","volume":"4","author":"NH Anh","year":"2024","unstructured":"Anh NH (2024. [Online]. Available: Hybrid cloud migration strategies: balancing flexibility, security, and cost in a multi-cloud environment. Trans Mach Learn Artif Intell Appl Inf Syst. 4(2):61\u201373. https:\/\/monteinstitute.com\/index.php\/TMLAIAIS\/article\/download\/2024-OCT-07\/2","journal-title":"Trans. Mach. Learn. Artif. Intell. Appl. Inf. Syst"},{"key":"797_CR4","doi-asserted-by":"crossref","unstructured":"Gupta S (2025) Hybrid cloud integration and multi-cloud deployments: a comprehensive review of strategies, challenges, and best practices. Int J Adv Res Comput Sci. 16(2)","DOI":"10.26483\/ijarcs.v16i2.7233"},{"key":"797_CR5","unstructured":"Institute P (2019. [Online]. Available: Costs and consequences of gaps in vulnerability response: a Ponemon institute study. Service Now. https:\/\/www.servicenow.com\/lpayr\/ponemon-vulnerability-survey.html"},{"key":"797_CR6","unstructured":"Networks PA \u201cWhat is lateral movement?\u201d 2023. [Online]. Available: https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-lateral-movement"},{"key":"797_CR7","unstructured":"Chauke KO, Muchenje T, Makondo N Enhancing network security in multi-cloud environments through adaptive threat detection"},{"key":"797_CR8","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1007\/s12243-019-00724-8","volume":"74","author":"A Abusitta","year":"2019","unstructured":"Abusitta A, Bellaiche M, Dagenais M (2019) Multi-cloud cooperative intrusion detection system: trust and fairness assurance. Ann Telecommun. 74:637\u2013653","journal-title":"Ann Telecommun"},{"key":"797_CR9","unstructured":"Chinamanagonda S (2019) Security in multi-cloud environments: heightened focus on securing multi-cloud deployments. J Innov Technol. 2(1)"},{"key":"797_CR10","unstructured":"Gupta AK, Kumar R (2025) Enhancing security for sap applications in complex multi-cloud deployments"},{"key":"797_CR11","doi-asserted-by":"crossref","unstructured":"Seth D, Nerella H, Najana M, Tabbassum A (2024) Navigating the multi-cloud maze: benefits, challenges, and future trends. Int J Global Innov Solutions (IJGIS)","DOI":"10.21428\/e90189c8.8c704fe4"},{"key":"797_CR12","first-page":"13","volume":"20","author":"S Somanathan","year":"2024","unstructured":"Somanathan S (2024) Blockchain for data integrity in multi-cloud environments: a project management approach. Nanotechnol. Percept 20:13","journal-title":"Nanotechnol. Percept"},{"key":"797_CR13","unstructured":"Brum RC (2023) \u201cMulti-FedLS: a scheduler of federated learning applications in a multi-cloud environment,\u201d Ph.D. dissertation, Sorbonne Univ Fed. Fluminense (Brazil)"},{"key":"797_CR14","unstructured":"Tiwari S, Sarma W, Srivastava A (2022) Federated learning in zero trust security: decentralized ai for real-time threat detection and policy enforcement"},{"key":"797_CR15","unstructured":"Brum RC, de Castro MCS, Arantes L, Drummond LMDA, Sens P (2023) \u201cMulti-FedLS: a framework for cross-silo federated learning applications on multi-cloud environments,\u201d arXiv preprint arXiv: 2308.08967"},{"issue":"5","key":"797_CR16","doi-asserted-by":"publisher","first-page":"1019","DOI":"10.3390\/electronics14051019","volume":"14","author":"L Albshaier","year":"2025","unstructured":"Albshaier L, Almarri S, Albuali A (2025) Federated learning for cloud and edge security: a systematic review of challenges and ai opportunities. Electronics 14(5):1019","journal-title":"Electronics"},{"key":"797_CR17","unstructured":"Ethan A, Osaka M (2024) Deep learning-powered cyber threat intelligence for multi-cloud environments"},{"issue":"12","key":"797_CR18","doi-asserted-by":"publisher","first-page":"403","DOI":"10.3390\/fi15120403","volume":"15","author":"J Alsamiri","year":"2023","unstructured":"Alsamiri J, Alsubhi K (2023) Federated learning for intrusion detection systems in internet of vehicles: a general taxonomy, applications, and future directions. Future Internet 15(12):403","journal-title":"Future Internet"},{"key":"797_CR19","unstructured":"Sajjad A (2015) \u201cA secure and scalable communication framework for inter-cloud services,\u201d Ph.D. dissertation, City Univ. London"},{"key":"797_CR20","doi-asserted-by":"publisher","first-page":"41238","DOI":"10.1109\/ACCESS.2018.2858277","volume":"6","author":"B Yan","year":"2018","unstructured":"Yan B, Han G (2018) Effective feature extraction via stacked sparse autoencoder to improve intrusion detection system. IEEE Access. 6:41238\u201341248","journal-title":"IEEE Access."},{"key":"797_CR21","unstructured":"Albuquerque I, Filho MJB, Neto F (2017) Weight-based fish school search algorithm for many-objective optimization,\u201d arXiv preprint arXiv: 1708.04745"},{"issue":"5\u20136","key":"797_CR22","doi-asserted-by":"publisher","first-page":"2166","DOI":"10.1166\/jctn.2019.7868","volume":"16","author":"MH Ali","year":"2019","unstructured":"Ali MH, Mohammed MA (2019) An improved fast learning network with harmony search based on intrusion-detection system. J Comput Theor Nanosci. 16(5\u20136):2166\u20132171","journal-title":"J Comput Theor Nanosci"},{"key":"797_CR23","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1016\/j.future.2019.03.043","volume":"98","author":"A Abusitta","year":"2019","unstructured":"Abusitta A, Bellaiche M, Dagenais M, Halabi T (2019) A deep learning approach for proactive multi-cloud cooperative intrusion detection system. Future Gener Comput Syst. 98:308\u2013318","journal-title":"Future Gener Comput Syst"},{"key":"797_CR24","unstructured":"Kevin J, Karan D (2024) Federated deep learning for privacy-preserving cloud data analytics"},{"key":"797_CR25","doi-asserted-by":"publisher","first-page":"102459","DOI":"10.1016\/j.rineng.2024.102459","volume":"23","author":"M Aljohani","year":"2024","unstructured":"Aljohani M et al. (2024) An automated metaheuristic-optimized approach for diagnosing and classifying brain tumors based on a convolutional neural network. Results Eng 23:102459","journal-title":"Results Eng"},{"key":"797_CR26","doi-asserted-by":"publisher","first-page":"1325","DOI":"10.1109\/OJCOMS.2024.3365976","volume":"5","author":"Y Luo","year":"2024","unstructured":"Luo Y et al. (2024) Securing 5G\/6G IoT using transformer and personalized federated learning: an access-side distributed malicious traffic detection framework. IEEE Open J Commun Soc 5:1325\u20131339","journal-title":"IEEE Open J Commun Soc"},{"issue":"4","key":"797_CR27","doi-asserted-by":"publisher","first-page":"12","DOI":"10.52866\/2788-7421.1218","volume":"5","author":"MQ Mohammed","year":"2024","unstructured":"Mohammed MQ, Alrahman ZA, Shehab AR (2024) Investigating intrusion detection system using federated learning for IoT security challenges. Iraqi J Comput Sci Math. 5(4):12","journal-title":"Iraqi J. Comput. Sci. Math"},{"key":"797_CR28","doi-asserted-by":"crossref","unstructured":"Olaoye G (2025. [Online]. Available: AI-driven intrusion detection and prevention systems (IDPS) for cloud security. SSRN. https:\/\/ssrn.com\/abstract=5129525","DOI":"10.2139\/ssrn.5129525"},{"key":"797_CR29","doi-asserted-by":"crossref","unstructured":"AlOtaibi NS, Felemban M, Mahmood S (2024) Edge-assisted label-flipping attack detection in federated learning. In IEEE Open J Commun Soc.","DOI":"10.1109\/OJCOMS.2024.3496872"},{"key":"797_CR30","unstructured":"Rasel FM, Jeremy J (2025) Federated learning and data security: challenges and opportunities in ai workloads"},{"issue":"6","key":"797_CR31","doi-asserted-by":"publisher","first-page":"102742","DOI":"10.1016\/j.asej.2024.102742","volume":"15","author":"AM Alhassan","year":"2024","unstructured":"Alhassan AM (2024) Secure multi-cloud resource allocation with SDN and self-adaptive authentication. Ain Shams Eng J. 15(6):102742","journal-title":"Ain Shams Eng J"},{"issue":"3","key":"797_CR32","first-page":"5233","volume":"14","author":"BA Brahmandam","year":"2025","unstructured":"Brahmandam BA (2025) Multi-cloud environments: ml enhanced cost optimization. Int. J. Innov. Res. Sci. Eng. Technol. 14(3):5233\u20135246","journal-title":"Int. J. Innov. Res. Sci. Eng. Technol"},{"key":"797_CR33","first-page":"6829","volume":"4195","author":"P Prajapat","year":"2025","unstructured":"Prajapat P (2025) Federated artificial intelligence systems for achieving seamless interoperability and robust performance in multi-cloud frameworks. J. ID, vol. 4195:6829","journal-title":"J"},{"issue":"5","key":"797_CR34","doi-asserted-by":"publisher","first-page":"4929","DOI":"10.1109\/TNSM.2024.3469308","volume":"21","author":"M Tornatore","year":"2024","unstructured":"Tornatore M et al. (2024) Guest editors\u2019 introduction: special issue on robust and resilient future communication networks. IEEE Trans Netw Serv Manag. 21(5):4929\u20134935","journal-title":"IEEE Trans. Netw. Serv. Manag"},{"issue":"1","key":"797_CR35","doi-asserted-by":"publisher","first-page":"4041","DOI":"10.1038\/s41598-025-88163-5","volume":"15","author":"NN Albogami","year":"2025","unstructured":"Albogami NN (2025) Intelligent deep federated learning model for enhancing security in internet of things enabled edge computing environment. Sci Rep. 15(1):4041","journal-title":"Sci Rep"},{"issue":"10","key":"797_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s40747-025-02001-9","volume":"11","author":"MA Hossain","year":"2025","unstructured":"Hossain MA, Saif S, Islam MS (2025) A novel federated learning approach for IoT botnet intrusion detection using SHAP-based knowledge distillation. Complex Intell Syst. 11(10):1\u201323","journal-title":"Complex Intell Syst"},{"issue":"1","key":"797_CR37","doi-asserted-by":"publisher","first-page":"28050","DOI":"10.1038\/s41598-025-10826-0","volume":"15","author":"M Anjum","year":"2025","unstructured":"Anjum M et al. (2025) GraphFedAI framework for DDoS attack detection in IoT systems using federated learning and graph based artificial intelligence. Sci Rep. 15(1):28050","journal-title":"Sci Rep"},{"issue":"1","key":"797_CR38","first-page":"e70039","volume":"36","author":"A Mazid","year":"2025","unstructured":"Mazid A, Kirmani S, Manaullah, Yadav M (2025) FL-IDPP: a federated learning based intrusion detection approach with privacy preservation. Trans. Emerg. Telecommun. 36(1):e70039","journal-title":"Technol"},{"key":"797_CR39","doi-asserted-by":"crossref","unstructured":"Mazid A, Kirmani S, Abid M (2024) Enhanced intrusion detection framework for securing IoT network using principal component analysis and CNN. Inf Secur J Glob Perspect. 1\u201321","DOI":"10.1080\/19393555.2024.2408256"},{"key":"797_CR40","doi-asserted-by":"publisher","first-page":"103509","DOI":"10.1016\/j.compind.2021.103509","volume":"132","author":"TT Huong","year":"2021","unstructured":"Huong TT et al. (2021) Detecting cyberattacks using anomaly detection in industrial control systems: a federated learning approach. Comput Ind. 132:103509","journal-title":"Comput Ind"},{"issue":"11","key":"797_CR41","doi-asserted-by":"publisher","first-page":"3827","DOI":"10.3390\/app10113827","volume":"10","author":"L Abualigah","year":"2020","unstructured":"Abualigah L, Diabat A, Geem ZW (2020) A comprehensive survey of the harmony search algorithm in clustering applications. Appl Sci. 10(11):3827","journal-title":"Appl Sci"},{"key":"797_CR42","doi-asserted-by":"publisher","first-page":"6693","DOI":"10.1109\/TIFS.2024.3420126","volume":"19","author":"A Yazdinejad","year":"2024","unstructured":"Yazdinejad A, Dehghantanha A, Karimipour H, Srivastava G, Parizi RM (2024) A robust privacy-preserving federated learning model against model poisoning attacks. IEEE Trans Inf Forensics Secur. 19:6693\u20136708","journal-title":"IEEE Trans. Inf. Forensics Secur"},{"key":"797_CR43","doi-asserted-by":"publisher","unstructured":"Saeed-Uz-Zaman BL, Hamid M, Saleem M, Aman M (2025) A4FL: federated adversarial defense via adversarial training and pruning against backdoor attack. In IEEE Access. 91070\u201391088. https:\/\/doi.org\/10.1109\/ACCESS.2025.3568275","DOI":"10.1109\/ACCESS.2025.3568275"},{"key":"797_CR44","unstructured":"NSL-KDD dataset. [Online]. Available: https:\/\/www.kaggle.com\/datasets\/hassan06\/nslkdd"},{"key":"797_CR45","doi-asserted-by":"publisher","first-page":"103236","DOI":"10.1016\/j.advengsoft.2022.103236","volume":"173","author":"M Mayuranathan","year":"2022","unstructured":"Mayuranathan M, Saravanan SK, Muthusenthil B, Samydurai A (2022) An efficient optimal security system for intrusion detection in cloud computing environment using hybrid deep learning technique. Adv Eng Softw. 173:103236","journal-title":"Adv. Eng. Softw"},{"key":"797_CR46","doi-asserted-by":"crossref","unstructured":"Masoodi HJKA (2024) Evaluating the effectiveness of machine learning-based intrusion detection in multi-cloud environments. Babylonian J Internet Things. 94\u2013105","DOI":"10.58496\/BJIoT\/2024\/012"},{"key":"797_CR47","doi-asserted-by":"crossref","unstructured":"Verma R, Jailia M, Kumar M, Kaliraman B (2024 May) CNN-based detection of DDoS attacks in multi-cloud environments. Proc. 2024 Int. Conf. Commun. Comput. Sci. Eng(IC3SE)1011\u20131016","DOI":"10.1109\/IC3SE62002.2024.10593351"},{"key":"797_CR48","doi-asserted-by":"crossref","unstructured":"Chaudhary A, Tiwaskar SA, Vijayalakshmi VJ, Sharma S (2024 Oct) Deep reinforcement learning for accurate anomaly detection in multi-cloud environment. Proc. 2024 Global Conf. Commun. Inf. Technol. (GCCIT) 1\u20138","DOI":"10.1109\/GCCIT63234.2024.10862913"},{"issue":"1","key":"797_CR49","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1186\/s13677-023-00509-4","volume":"12","author":"SM Nizamudeen","year":"2023","unstructured":"Nizamudeen SM (2023) Intelligent intrusion detection framework for multi-clouds-IoT environment using swarm-based deep learning classifier. J Cloud Comput. 12(1):134","journal-title":"J. Cloud Comput"},{"key":"797_CR50","doi-asserted-by":"publisher","first-page":"101322","DOI":"10.1016\/j.jestch.2022.101322","volume":"38","author":"HC Altunay","year":"2023","unstructured":"Altunay HC, Albayrak Z (2023 Feb) A hybrid CNN+LSTM-based intrusion detection system for industrial IoT networks. Eng Sci Technol Int J. 38:101322. https:\/\/doi.org\/10.1016\/j.jestch.2022.101322","journal-title":"Eng. Sci. Technol. Int. J"},{"issue":"3","key":"797_CR51","first-page":"202","volume":"10","author":"X Yang","year":"2024","unstructured":"Yang X, Zhang J, Kuang L, Pang M (2024) Network intrusion detection model based on fusion CNN-BiGRU and attention mechanism. Inf Secur Res. 10(3):202\u2013208","journal-title":"Inf. Secur. Res"},{"issue":"12","key":"797_CR52","first-page":"326","volume":"38","author":"M Tan","year":"2021","unstructured":"Tan M, Yang S, Ding L, Peng M (2021) Research on PSO-CNN intrusion detection based on random forest fusion. Comput Appl Softw. 38(12):326\u2013331","journal-title":"Comput. Appl. Softw"},{"key":"797_CR53","doi-asserted-by":"publisher","first-page":"666","DOI":"10.1016\/j.neucom.2020.07.154","volume":"456","author":"T-Y Kim","year":"2021","unstructured":"Kim T-Y, Cho S-B (2021 Oct) Optimizing CNN-LSTM neural networks with pso for anomalous query access control. Neurocomputing. 456:666\u2013677. https:\/\/doi.org\/10.1016\/j.neucom.2020.07.154","journal-title":"Neurocomputing"},{"key":"797_CR54","doi-asserted-by":"publisher","unstructured":"Xia Z, He S, Liu C, Liu Y, Yang X, Bu H (2024) PSO-GA hyperparameter optimized ResNet-BiGRU-Based intrusion detection method. In IEEE Access. 12:135535\u2013135550. https:\/\/doi.org\/10.1109\/ACCESS.2024.3464529","DOI":"10.1109\/ACCESS.2024.3464529"},{"issue":"3","key":"797_CR55","first-page":"479","volume":"7","author":"R Panigrahi","year":"2018","unstructured":"Panigrahi R, Borah S (2018) A detailed analysis of CICIDS2017 dataset for designing intrusion detection systems. Int J Eng Technol. 7(3):479\u2013482","journal-title":"Int J Eng Technol"},{"issue":"9","key":"797_CR56","doi-asserted-by":"publisher","first-page":"5427","DOI":"10.3390\/app13095427","volume":"13","author":"S Alosaimi","year":"2023","unstructured":"Alosaimi S, Almutairi SM (2023) An intrusion detection system using BoT-IoT. Appl Sci 13(9):5427. https:\/\/doi.org\/10.3390\/app13095427","journal-title":"Appl Sci"},{"key":"797_CR57","doi-asserted-by":"publisher","unstructured":"Masum M, Shahriar H, Haddad H, Faruk MJH, Valero M, Khan MA, Rahman MA, Adnan MI, Cuzzocrea A, Wu F (2021) Bayesian hyperparameter optimization for deep neural network-based network intrusion detection. In 2021 IEEE International Conference on Big Data (Big Data), Orlando, FL, USA, 5413\u20135419. https:\/\/doi.org\/10.1109\/BigData52589.2021.9671576","DOI":"10.1109\/BigData52589.2021.9671576"},{"key":"797_CR58","doi-asserted-by":"crossref","unstructured":"Kilichev D, Kim W (2023) Hyperparameter optimization for 1D-CNN-based network intrusion detection using GA and PSO. Mathematics 11(17, Art. no. 3724)","DOI":"10.3390\/math11173724"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-025-00797-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-025-00797-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-025-00797-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T11:21:45Z","timestamp":1764242505000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-025-00797-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,27]]},"references-count":58,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["797"],"URL":"https:\/\/doi.org\/10.1186\/s13677-025-00797-y","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,27]]},"assertion":[{"value":"3 June 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"73"}}