{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T10:03:50Z","timestamp":1771236230470,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T00:00:00Z","timestamp":1771027200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T00:00:00Z","timestamp":1771200000000},"content-version":"vor","delay-in-days":2,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"DOI":"10.1186\/s13677-026-00858-w","type":"journal-article","created":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T16:34:53Z","timestamp":1771086893000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An integrated methodology for intrusion detection and mitigation to optimize cloud security"],"prefix":"10.1186","volume":"15","author":[{"given":"N.","family":"Mathivanan","sequence":"first","affiliation":[]},{"given":"B.","family":"Lanitha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,14]]},"reference":[{"key":"858_CR1","first-page":"100612","volume-title":"Intrusion detection system in distributed cloud computing: hybrid clustering and classification methods","author":"K Samunnisa","year":"2023","unstructured":"Samunnisa K, Kumar GSV, Madhavi K (2023) Intrusion detection system in distributed cloud computing: hybrid clustering and classification methods. Sensors, Measurement, p 100612"},{"key":"858_CR2","first-page":"123066","volume":"8","author":"H Kim","year":"2020","unstructured":"Kim H, Kim H, Kim Y, Kim H (2020) A deep learning-based intrusion detection method for security enhancement in cloud computing. IEEE Access 8:123066\u2013123078","journal-title":"IEEE Access"},{"key":"858_CR3","doi-asserted-by":"crossref","unstructured":"Guezzaz A, Benkirane S, Azrour M, Khurram S (2021) A reliable network intrusion detection approach using decision tree with enhanced data quality. Secur Commun Netw 1230593","DOI":"10.1155\/2021\/1230593"},{"key":"858_CR4","doi-asserted-by":"crossref","unstructured":"Heng Z, Manal Y, Ayman K, Nawazish M (2024) Towards a conceptual framework for AI-driven anomaly detection in smart city IoT networks for enhanced cybersecurity. J Innov Knowl 9(4)","DOI":"10.1016\/j.jik.2024.100601"},{"key":"858_CR5","doi-asserted-by":"publisher","first-page":"2735","DOI":"10.1007\/s10489-018-01408-x","volume":"49","author":"U Cavusoglu","year":"2019","unstructured":"Cavusoglu U (2019) A new hybrid approach for intrusion detection using machine learning methods. Appl Intell 49:2735\u20132761","journal-title":"Appl Intell"},{"key":"858_CR6","doi-asserted-by":"crossref","unstructured":"Attou H (Sept 2023) Cloud-based intrusion detection approach using machine learning techniques, big data mining and analytics. 6(3):311\u2013320","DOI":"10.26599\/BDMA.2022.9020038"},{"key":"858_CR7","unstructured":"Lalitha P, Yamaganti R, Rohita D (2023) Investigation into security challenges and approaches in cloud computing. J Eng Sci"},{"key":"858_CR8","doi-asserted-by":"crossref","unstructured":"Bukhari SMS, Zafar MH, Abou Houran M, Moosavi SKR, Mansoor M, Muaaz M, Sanfilippo F (2024) Secure and privacy-preserving intrusion detection in wireless sensor networks: federated learning with SCNN-Bi-LSTM for enhanced reliability. Ad Hoc Networks p. 103407","DOI":"10.1016\/j.adhoc.2024.103407"},{"key":"858_CR9","doi-asserted-by":"crossref","unstructured":"Liu Z, Xu B, Cheng B, Hu X, Darbandi M (2022) Intrusion detection systems in the cloud computing: a comprehensive and deep literature. Concurr Comput Pract Exp p. 6646","DOI":"10.1002\/cpe.6646"},{"key":"858_CR10","doi-asserted-by":"crossref","unstructured":"Zaidi T (2021) A network intrusion based detection system for cloud computing environment","DOI":"10.20944\/preprints202104.0183.v1"},{"key":"858_CR11","doi-asserted-by":"publisher","first-page":"1251","DOI":"10.1007\/s10207-023-00787-8","volume":"23","author":"H Nandanwar","year":"2024","unstructured":"Nandanwar H, Katarya R (2024) TL-BILSTM Iot: transfer learning model for prediction of intrusion detection system in IoT environment. Int J Inf Secure 23:1251\u20131277","journal-title":"Int J Inf Secure"},{"key":"858_CR12","unstructured":"Sharma H (2022) Zero trust in the cloud: implementing zero trust architecture for enhanced cloud security. ESP J Eng Technol Adv 2(2):78\u201391"},{"key":"858_CR13","doi-asserted-by":"crossref","unstructured":"Flora J (2020) Improving the security of microservice systems by detecting and tolerating intrusions. In: Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops pp. 131\u2013134","DOI":"10.1109\/ISSREW51248.2020.00051"},{"key":"858_CR14","unstructured":"Patten D (2024) Architecting zero trust security in cloud environments. Medium"},{"key":"858_CR15","volume-title":"Securing data without borders: an introduction to zero trust","author":"N Gotay","year":"2024","unstructured":"Gotay N (2024) Securing data without borders: an introduction to zero trust. Data Security, Sotero"},{"key":"858_CR16","unstructured":"CrowdStrike, (2024) Global threat report, In CrowdStrike. https:\/\/www.crowdstrike.com\/blog\/crowdstrike-2024-global-threat-report\/"},{"key":"858_CR17","doi-asserted-by":"crossref","unstructured":"Gayatri M, Chintamaneni V, Swapna R, Chanti M, Devarasetty L, Athiraja A (2024) Enhancing cloud security: a hybrid ai approach for intrusion detection using convolutional neural networks and stochastic gradient descent algorithms. In: Proceedings of the 5th International Conference on Electronics and Sustainable Communication Systems (ICESC), pp. 623\u2013628","DOI":"10.1109\/ICESC60852.2024.10689794"},{"key":"858_CR18","doi-asserted-by":"crossref","unstructured":"Khan M, Haroon M (2023) Detecting network intrusion in cloud environment through ensemble learning and feature selection approach. SN Comput Sci p. 84","DOI":"10.1007\/s42979-023-02390-z"},{"key":"858_CR19","doi-asserted-by":"crossref","unstructured":"Ahmadi S (2024) Network intrusion detection in cloud environments: a comparative analysis of approaches. Int J Adv Comput Sci Appl (IJACSA) 15(3)","DOI":"10.14569\/IJACSA.2024.0150301"},{"key":"858_CR20","doi-asserted-by":"crossref","unstructured":"Minhaj K, Mohd H (2023) Detecting network intrusion in cloud environment through ensemble learning and feature selection approach. SN Comput Sci 5","DOI":"10.1007\/s42979-023-02390-z"},{"key":"858_CR21","doi-asserted-by":"publisher","first-page":"2191","DOI":"10.1007\/s11036-023-02176-w","volume":"28","author":"W Xingzhu","year":"2023","unstructured":"Xingzhu W (2023) Fast localization model of network intrusion detection system for enterprises using cloud computing environment. Mob Networks Appl 28:2191\u20132203","journal-title":"Mob Networks Appl"},{"key":"858_CR22","doi-asserted-by":"crossref","unstructured":"Krishnaveni S, Sivamohan S, Sridhar SS, Prabakaran S (2021) Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing. Cluster Comput 24(3):1761\u20131779","DOI":"10.1007\/s10586-020-03222-y"},{"key":"858_CR23","doi-asserted-by":"crossref","unstructured":"Qureshi KN, Jeon G, Piccialli F (Jan 2021) Anomaly detection and trust authority in artificial intelligence and cloud computing. Computer Networks 184","DOI":"10.1016\/j.comnet.2020.107647"},{"key":"858_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.17485\/ijst\/2016\/v9i22\/95170","volume":"9","author":"C Ambikavathi","year":"2016","unstructured":"Ambikavathi C, Srivatsa SK (2016) Integrated intrusion detection approach for cloud computing. Indian J Sci Technol 9:1\u20135","journal-title":"Indian J Sci Technol"},{"issue":"1","key":"858_CR25","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1515\/comp-2020-0214","volume":"11","author":"E Wisam","year":"2021","unstructured":"Wisam E, Akhan A, Zaim A, Halim (2021) A design of an integrated cloud-based intrusion detection system with third party cloud service. Open Comput Sci 11(1):365\u2013379","journal-title":"Open Comput Sci"},{"key":"858_CR26","doi-asserted-by":"crossref","unstructured":"Himanshu N, Katarya R (2025) Securing industry 5.0: an explainable deep learning model for intrusion detection in cyber-physical systems. Comput Electr Eng 123","DOI":"10.1016\/j.compeleceng.2025.110161"},{"key":"858_CR27","doi-asserted-by":"crossref","unstructured":"Danish J, Muhammad Shahid S, Muhammad A, Prabhat K, Alireza J (2024) A federated learning-based zero trust intrusion detection system for the internet of things. Ad Hoc Networks 162","DOI":"10.1016\/j.adhoc.2024.103540"},{"issue":"2","key":"858_CR28","doi-asserted-by":"publisher","first-page":"198","DOI":"10.3390\/electronics11020198","volume":"11","author":"Abdullahi","year":"2022","unstructured":"Abdullahi et al (2022) Detecting cybersecurity attacks in the internet of things using artificial intelligence methods: A systematic literature review. Electronics 11(2):198","journal-title":"Electronics"},{"issue":"16","key":"858_CR29","doi-asserted-by":"publisher","first-page":"14725","DOI":"10.1109\/JIOT.2023.3285359","volume":"10","author":"T Ashraf","year":"2023","unstructured":"Ashraf T, Habaebi, Isoaho QM, Ashraf M, Tahir MH, Habaebi J, Isoaho (2023) Toward autonomic internet of things: recent advances, evaluation criteria, and future research directions. IEEE Internet Things J 10(16):14725\u201314748","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"858_CR30","first-page":"3006","volume":"3","author":"MJ Goswami","year":"2024","unstructured":"Goswami MJ (2024) AI-Based anomaly detection for Real-Time cybersecurity. Int J Res Rev Techniques 3(1):3006\u20131075","journal-title":"Int J Res Rev Techniques"},{"key":"858_CR31","doi-asserted-by":"crossref","unstructured":"Guembe B, Azeta A, Misra S, Osamor VC, Fernandez-Sanz L, Pospelova V (2022) The emerging threat of AI-driven cyber attacks: a review. Appl Artif Intell 36 (1)","DOI":"10.1080\/08839514.2022.2037254"},{"key":"858_CR32","doi-asserted-by":"crossref","unstructured":"Ali S, Rehman SU, Imran A, Adeem G, Iqbal Z, Kim KI (2022) Comparative evaluation of AI-based techniques for zero-day attacks detection. Electronics 11(23):3934","DOI":"10.3390\/electronics11233934"},{"key":"858_CR33","doi-asserted-by":"crossref","unstructured":"Nandanwar H, Katarya R (2024) Deep learning enabled intrusion detection system for industrial IoT environment. Pergamon Press, p. 249","DOI":"10.1016\/j.eswa.2024.123808"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-026-00858-w","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-026-00858-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-026-00858-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T09:04:16Z","timestamp":1771232656000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s13677-026-00858-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,14]]},"references-count":33,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["858"],"URL":"https:\/\/doi.org\/10.1186\/s13677-026-00858-w","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,14]]},"assertion":[{"value":"19 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"18"}}