{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T21:53:33Z","timestamp":1775598813729,"version":"3.50.1"},"reference-count":46,"publisher":"MDPI AG","issue":"10","license":[{"start":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T00:00:00Z","timestamp":1697414400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Deanship of Scientific Research at Imam Mohammad Ibn Saud Islamic University (IMSIU)","award":["IMSIU-RP23079"],"award-info":[{"award-number":["IMSIU-RP23079"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Systems"],"abstract":"<jats:p>Developing a simple and efficient attack detection system for ensuring the security of cloud systems against cyberthreats is a crucial and demanding process in the present time. In traditional work, various machine-learning-based detection methodologies have been developed for securing the cloud network. However, those methodologies face the complications of overfitting, complex system design, difficulty understanding, and higher time consumption. Hence, the proposed work contributes to the design and development of an effective security model for detecting cyberthreats from cloud systems. The proposed framework encompasses the modules of preprocessing and normalization, feature extraction, optimization, and prediction. An improved principal component analysis (IPCA) model is used to extract the relevant features from the normalized dataset. Then, a hybrid grasshopper\u2013crow search optimization (GSCSO) is employed to choose the relevant features for training and testing operations. Finally, an isolated heuristic neural network (IHNN) algorithm is used to predict whether the data flow is normal or intrusive. Popular and publicly available datasets such as NSL-KDD, BoT-IoT, KDD Cup\u201999, and CICIDS 2017 are used for implementing the detection system. For validation, the different performance indicators, such as detection accuracy (AC) and F1-score, are measured and compared with the proposed GSCSO-IHNN system. On average, the GSCO-IHNN system achieved 99.5% ACC and 0.999 F1 scores on these datasets. The results of the performance study show that the GSCSO-IHNN method outperforms the other security models. Ultimately, this research strives to contribute to the ongoing efforts to fortify the security of cloud systems, making them resilient against cyber threats more simply and efficiently.<\/jats:p>","DOI":"10.3390\/systems11100518","type":"journal-article","created":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T08:32:57Z","timestamp":1697445177000},"page":"518","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["Enhancing Cloud-Based Security: A Novel Approach for Efficient Cyber-Threat Detection Using GSCSO-IHNN Model"],"prefix":"10.3390","volume":"11","author":[{"given":"Divya","family":"Ramachandran","sequence":"first","affiliation":[{"name":"Department of Information Technology, PSNA College of Engineering and Technology, Dindigul 624622, Tamil Nadu, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7205-8373","authenticated-orcid":false,"given":"Mubarak","family":"Albathan","sequence":"additional","affiliation":[{"name":"College of Computer and Information Sciences, Imam Mohammad Ibn Saud Islamic University (IMSIU), Riyadh 11432, Saudi Arabia"}]},{"given":"Ayyaz","family":"Hussain","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Quaid-i-Azam University, Islamabad 44000, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0361-1363","authenticated-orcid":false,"given":"Qaisar","family":"Abbas","sequence":"additional","affiliation":[{"name":"College of Computer and Information Sciences, Imam Mohammad Ibn Saud Islamic University (IMSIU), Riyadh 11432, Saudi Arabia"}]}],"member":"1968","published-online":{"date-parts":[[2023,10,16]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"100827","DOI":"10.1016\/j.measen.2023.100827","article-title":"A comprehensive review of AI based intrusion detection system","volume":"28","author":"Sowmya","year":"2023","journal-title":"Meas. Sens."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"103637","DOI":"10.1016\/j.jnca.2023.103637","article-title":"Intelligent approaches toward intrusion detection systems for Industrial Internet of Things: A systematic comprehensive review","volume":"215","author":"Nuaimi","year":"2023","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Abid, A., Jemili, F., and Korbaa, O. (2023). Real-time data fusion for intrusion detection in industrial control systems based on cloud computing and big data techniques. Clust. Comput., 1\u201322.","DOI":"10.1007\/s10586-023-04087-7"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1593","DOI":"10.1007\/s12559-023-10139-2","article-title":"Enhanced Quantum-Secure Ensemble Intrusion Detection Techniques for Cloud Based on Deep Learning","volume":"15","author":"Salvakkam","year":"2023","journal-title":"Cogn. Comput."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Raj, M.G., and Pani, S.K. (2023). Hybrid feature selection and BWTDO enabled DeepCNN-TL for intrusion detection in fuzzy cloud computing. Soft Comput., 1\u201320.","DOI":"10.1007\/s00500-023-08573-3"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"3999039","DOI":"10.1155\/2022\/3999039","article-title":"Intrusion Detection Systems in Cloud Computing Paradigm: Analysis and Overview","volume":"2022","author":"Rana","year":"2022","journal-title":"Complexity"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"109982","DOI":"10.1016\/j.comnet.2023.109982","article-title":"Res-TranBiLSTM: An Intelligent Approach for Intrusion Detection in the Internet of Things","volume":"235","author":"Wang","year":"2023","journal-title":"Comput. Netw."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1007\/s10586-022-03621-3","article-title":"DMAIDPS: A distributed multi-agent intrusion detection and prevention system for cloud IoT environments","volume":"26","author":"Javadpour","year":"2022","journal-title":"Clust. Comput."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3472753","article-title":"A survey on data-driven network intrusion detection","volume":"54","author":"Chou","year":"2021","journal-title":"ACM Comput. Surv."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Kavitha, C., Gadekallu, T.R.K.N., Kavin, B.P., and Lai, W.C. (2023). Filter-Based Ensemble Feature Selection and Deep Learning Model for Intrusion Detection in Cloud Computing. Electronics, 12.","DOI":"10.3390\/electronics12030556"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"14459","DOI":"10.1007\/s00521-021-06085-5","article-title":"Hybrid semantic deep learning architecture and optimal advanced encryption standard key management scheme for secure cloud storage and intrusion detection","volume":"33","author":"Prabhakaran","year":"2021","journal-title":"Neural Comput. Appl."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"77","DOI":"10.4018\/IJDCF.2021030105","article-title":"An intrusion detection system using modified-firefly algorithm in cloud environment","volume":"13","author":"Ghosh","year":"2021","journal-title":"Int. J. Digit. Crime Forensics (IJDCF)"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Alzaqebah, A., Aljarah, I., Al-Kadi, O., and Dama\u0161evi\u010dius, R. (2022). A Modified Grey Wolf Optimization Algorithm for an Intrusion Detection System. Mathematics, 10.","DOI":"10.3390\/math10060999"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Zivkovic, M., Bacanin, N., Arandjelovic, J., Rakic, A., Strumberger, I., Venkatachalam, K., and Joseph, P.M. (2022, January 19). Novel Harris Hawks Optimization and Deep Neural Network Approach for Intrusion Detection. Proceedings of the International Joint Conference on Advances in Computational Intelligence, Singapore.","DOI":"10.1007\/978-981-19-0332-8_17"},{"key":"ref_15","first-page":"8","article-title":"A Novel Anomaly-based Intrusion Detection System using Whale Optimization Algorithm WOA-Based Intrusion Detection System","volume":"4","author":"Alimardani","year":"2021","journal-title":"Int. J. Web Res."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"6473507","DOI":"10.1155\/2022\/6473507","article-title":"Intrusion Detection System for IoT Based on Deep Learning and Modified Reptile Search Algorithm","volume":"2022","author":"Dahou","year":"2022","journal-title":"Comput. Intell. Neurosci."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"3609","DOI":"10.1007\/s12652-019-01611-9","article-title":"Best features based intrusion detection system by RBM model for detecting DDoS in cloud environment","volume":"12","author":"Mayuranathan","year":"2021","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Kabir, S., Sakib, S., Hossain, A., Islam, S., and Hossain, M.I. (2021, January 4\u20135). A Convolutional Neural Network based Model with Improved Activation Function and Optimizer for Effective Intrusion Detection and Classification. Proceedings of the 2021 International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), Greater Noida, India.","DOI":"10.1109\/ICACITE51222.2021.9404584"},{"key":"ref_19","first-page":"659","article-title":"A survey of intrusion detection from the perspective of intrusion datasets and machine learning techniques","volume":"44","author":"Singh","year":"2021","journal-title":"Int. J. Comput. Appl."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1385","DOI":"10.1007\/s11277-022-09609-x","article-title":"Intrusion Detection System Using Deep Belief Network & Particle Swarm Optimization","volume":"125","author":"Sajith","year":"2022","journal-title":"Wirel. Pers. Commun."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"16062","DOI":"10.1109\/ACCESS.2021.3051074","article-title":"Deep belief network integrating improved kernel-based extreme learning machine for network intrusion detection","volume":"9","author":"Wang","year":"2021","journal-title":"IEEE Access"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Alzahrani, A.O., and Alenazi, M.J.F. (2021). Designing a network intrusion detection system based on machine learning for software defined networks. Future Internet, 13.","DOI":"10.3390\/fi13050111"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"2701","DOI":"10.1016\/j.matpr.2021.07.015","article-title":"A new hybrid teaching learning based Optimization-Extreme learning Machine model based Intrusion-Detection system","volume":"80","author":"Alsudani","year":"2021","journal-title":"Mater. Today Proc."},{"key":"ref_24","first-page":"701","article-title":"Intrusion detection system classification using different machine learning algorithms on KDD-99 and NSL-KDD datasets-a review paper","volume":"11","author":"Ravipati","year":"2019","journal-title":"Int. J. Comput. Sci. Inf. Technol. (IJCSIT)"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1186\/s42400-019-0038-7","article-title":"Survey of intrusion detection systems: Techniques, datasets and challenges","volume":"2","author":"Khraisat","year":"2019","journal-title":"Cybersecurity"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"109557","DOI":"10.1016\/j.knosys.2022.109557","article-title":"A FKPCA-GWO WDBiLSTM classifier for intrusion detection system in cloud environments","volume":"253","author":"Geetha","year":"2022","journal-title":"Knowl. Based Syst."},{"key":"ref_27","unstructured":"Ghosh, P., Karmakar, A., Sharma, J., and Phadikar, S. (2019). Emerging Technologies in Data Mining and Information Security, Springer."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"95864","DOI":"10.1109\/ACCESS.2020.2994931","article-title":"TIDCS: A dynamic intrusion detection and classification system based feature selection","volume":"8","author":"Chkirbene","year":"2020","journal-title":"IEEE Access"},{"key":"ref_29","first-page":"209","article-title":"Calibration of various optimized machine learning classifiers in network intrusion detection system on the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing","volume":"4","author":"Kanimozhi","year":"2019","journal-title":"Int. J. Eng. Appl. Sci. Technol."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Aldallal, A., and Alisa, F. (2021). Effective Intrusion Detection System to Secure Data in Cloud Using Machine Learning. Symmetry, 13.","DOI":"10.3390\/sym13122306"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"9555","DOI":"10.1007\/s12652-020-02696-3","article-title":"A distributed ensemble design based intrusion detection system using fog computing to protect the internet of things networks","volume":"12","author":"Kumar","year":"2021","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"107840","DOI":"10.1016\/j.comnet.2021.107840","article-title":"Machine learning methods for cyber security intrusion detection: Datasets and comparative study","volume":"188","author":"Kilincer","year":"2021","journal-title":"Comput. Netw."},{"key":"ref_33","first-page":"9723","article-title":"MapReduce based intelligent model for intrusion detection using machine learning technique","volume":"4","author":"Asif","year":"2021","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"3323","DOI":"10.1007\/s11276-018-1724-1","article-title":"A methodological review on attack and defense strategies in cyber warfare","volume":"25","author":"Shaji","year":"2019","journal-title":"Wirel. Netw."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"2191","DOI":"10.1016\/j.procs.2020.03.271","article-title":"Attribute selection and ensemble classifier based novel approach to intrusion detection system","volume":"167","author":"Dua","year":"2020","journal-title":"Procedia Comput. Sci."},{"key":"ref_36","first-page":"219","article-title":"A proposed hybrid clustering algorithm using K-means and BIRCH for cluster based cab recommender system (CBCRS)","volume":"15","author":"Mann","year":"2023","journal-title":"Int. J. Inf. Technol."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"3722","DOI":"10.1016\/j.eswa.2012.12.078","article-title":"A comparative study of dimensionality reduction techniques to enhance trace clustering performances","volume":"40","author":"Song","year":"2013","journal-title":"Expert Syst. Appl."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"102861","DOI":"10.1016\/j.cose.2022.102861","article-title":"Comparative research on network intrusion detection methods based on machine learning","volume":"121","author":"Zhang","year":"2022","journal-title":"Comput. Secur."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Chu, Q., Wei, J., Han, X., Li, Z., and Chen, Z. (2022, January 25\u201327). Transformations between opacity for discrete-event systems. Proceedings of the 41st Chinese Control Conference (CCC), Hefei, China.","DOI":"10.23919\/CCC55666.2022.9902458"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Jiao, R., Nguyen, B.H., Xue, B., and Zhang, M. (2023). A Survey on Evolutionary Multiobjective Feature Selection in Classification: Approaches, Applications, and Challenges. IEEE Trans. Evol. Comput., 1\u201313.","DOI":"10.1109\/TEVC.2023.3292527"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"103111","DOI":"10.1016\/j.jnca.2021.103111","article-title":"Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review","volume":"187","author":"Lee","year":"2021","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1186\/s42400-021-00077-7","article-title":"A critical review of intrusion detection systems in the internet of things: Techniques, deployment strategy, validation strategy, attacks, public datasets and challenges","volume":"4","author":"Khraisat","year":"2021","journal-title":"Cybersecurity"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Fatani, A., Dahou, A., Al-Qaness, M.A., Lu, S., and Elaziz, M.A. (2021). Advanced feature extraction and selection approach using deep learning and Aquila optimizer for IoT intrusion detection system. Sensors, 22.","DOI":"10.3390\/s22010140"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"1881","DOI":"10.1007\/s10586-020-03229-5","article-title":"Building an efficient intrusion detection system using grasshopper optimization algorithm for anomaly detection","volume":"24","author":"Dwivedi","year":"2021","journal-title":"Clust. Comput."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"3849","DOI":"10.1038\/s41467-023-39519-w","article-title":"Demonstration of quantum-digital payments","volume":"14","author":"Schiansky","year":"2023","journal-title":"Nat. Commun."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Kaiiali, M., Sezer, S., and Khalid, A. (2019, January 10\u201312). Cloud Computing in the Quantum Era. Proceedings of the IEEE Conference on Communications and Network Security (CNS), Washington, DC, USA.","DOI":"10.1109\/CNS44998.2019.8952589"}],"container-title":["Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2079-8954\/11\/10\/518\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T21:07:46Z","timestamp":1760130466000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2079-8954\/11\/10\/518"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,16]]},"references-count":46,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2023,10]]}},"alternative-id":["systems11100518"],"URL":"https:\/\/doi.org\/10.3390\/systems11100518","relation":{},"ISSN":["2079-8954"],"issn-type":[{"value":"2079-8954","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,16]]}}}