Intelligent Anomaly Detection for Secure Data Transmission in Cloud Computing Systems over 6G Networks
Received: 12 August 2025 | Revised: 5 September 2025 | Accepted: 16 September 2025 | Online: 5 November 2025
Corresponding author: D. Anil
Abstract
The emergence of sixth-generation (6G) networks facilitates robust capabilities such as ultra-low latency and massive device connectivity, which simultaneously raise critical challenges in securing cloud-based data transmission. This study proposes a novel anomaly detection framework that integrates Autoencoders (AEs), Convolutional Neural Networks (CNNs), and Federated Learning (FL) to deliver real-time, privacy-preserving intrusion detection for 6G-enabled cloud computing environments. The framework is evaluated using four benchmark datasets, including NSL-KDD, UNSW-NB15, CIC-IDS2017, and CIC-DDoS2019. Across all datasets, the model achieved an average accuracy of 99.85%, precision of 99.76%, recall of 99.82%, and F1-score of 99.79%, while maintaining a False Alarm Rate (FAR) as low as 0.0011. The model also demonstrated high efficiency, operating with inference latency below 350 ms, making it highly suitable for the stringent requirements of 6G infrastructure. Enhanced with explainability tools, the system ensures transparent decision-making, offering an interpretable solution towards next-generation cybersecurity threats.
Keywords:
sixth-generation (6G) networks, anomaly detection, Federated Learning (FL), cloud security, Artificial Intelligence (AI)Downloads
References
R. Liu, J. Shi, X. Chen, and C. Lu, "Network anomaly detection and security defense technology based on machine learning: A review," Computers and Electrical Engineering, vol. 119, Oct. 2024, Art. no. 109581. DOI: https://doi.org/10.1016/j.compeleceng.2024.109581
M. Kim and J. H. Park, "Quantum-resilient security for 6G networks: a comprehensive survey on challenges, solutions, and research opportunities," The Journal of Supercomputing, vol. 81, no. 10, July 2025, Art. no. 1132. DOI: https://doi.org/10.1007/s11227-025-07651-7
N. F. Syed, S. W. Shah, A. Shaghaghi, A. Anwar, Z. Baig, and R. Doss, "Zero Trust Architecture (ZTA): A Comprehensive Survey," IEEE Access, vol. 10, pp. 57143–57179, 2022. DOI: https://doi.org/10.1109/ACCESS.2022.3174679
G. S. Hukkeri, R. H. Goudar, G. M. Dhananjaya, V. N. Rathod, and S. Ankalaki, "A Comprehensive Survey on Split-Fed Learning: Methods, Innovations, and Future Directions," IEEE Access, vol. 13, pp. 46312–46333, 2025. DOI: https://doi.org/10.1109/ACCESS.2025.3547641
A. Blika et al., "Federated Learning for Enhanced Cybersecurity and Trustworthiness in 5G and 6G Networks: A Comprehensive Survey," IEEE Open Journal of the Communications Society, vol. 6, pp. 3094–3130, 2025. DOI: https://doi.org/10.1109/OJCOMS.2024.3449563
T. Senevirathna, V. H. La, S. Marcha, B. Siniarski, M. Liyanage, and S. Wang, "A Survey on XAI for 5G and Beyond Security: Technical Aspects, Challenges and Research Directions," IEEE Communications Surveys & Tutorials, vol. 27, no. 2, pp. 941–973, Apr. 2025. DOI: https://doi.org/10.1109/COMST.2024.3437248
N. Moustafa, N. Koroniotis, M. Keshk, A. Y. Zomaya, and Z. Tari, "Explainable Intrusion Detection for Cyber Defences in the Internet of Things: Opportunities and Solutions," IEEE Communications Surveys & Tutorials, vol. 25, no. 3, pp. 1775–1807, 2023. DOI: https://doi.org/10.1109/COMST.2023.3280465
S. Ahmadi, "Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies," Journal of Information Security, vol. 15, no. 2, pp. 148–167, Mar. 2024. DOI: https://doi.org/10.4236/jis.2024.152010
M. M. Saeed, R. A. Saeed, M. Abdelhaq, R. Alsaqour, M. K. Hasan, and R. A. Mokhtar, "Anomaly Detection in 6G Networks Using Machine Learning Methods," Electronics, vol. 12, no. 15, Aug. 2023, Art. no. 3300. DOI: https://doi.org/10.3390/electronics12153300
N. Nezhadsistani and B. Stiller, "ML-Based Anomaly Detection in 6G Networks: A Survey on the Current Status, Challenges, and Future Directions," in 2024 3rd International Conference on 6G Networking, Paris, France, 2024, pp. 75–83. DOI: https://doi.org/10.1109/6GNet63182.2024.10765631
B. K. Khare, D. Sahu, D. Pandey, M. Tiwari, H. Kumar, and N. Siddiqui, "Exploring Machine Learning Solutions for Anomaly Detection in 6G Communication Systems," in Security Issues and Solutions in 6G Communications and Beyond, D. Pandey, B. Pandey, and T. Ahmad, Eds. Hershey, PA, USA: IGI Global Scientific Publishing, 2024, pp. 230–250. DOI: https://doi.org/10.4018/979-8-3693-2931-3.ch014
H. Alshahrani et al., "Energy aware routing with optimal deep learning based anomaly detection in 6G-IoT networks," Sustainable Energy Technologies and Assessments, vol. 60, Dec. 2023, Art. no. 103494. DOI: https://doi.org/10.1016/j.seta.2023.103494
M. M. Kamruzzaman, "6G wireless communication assisted security management using cloud edge computing," Expert Systems, vol. 40, no. 4, May 2023, Art. no. e13061. DOI: https://doi.org/10.1111/exsy.13061
G. Han, J. Tu, L. Liu, M. Martínez-García, and Y. Peng, "Anomaly Detection Based on Multidimensional Data Processing for Protecting Vital Devices in 6G-Enabled Massive IIoT," IEEE Internet of Things Journal, vol. 8, no. 7, pp. 5219–5229, Apr. 2021. DOI: https://doi.org/10.1109/JIOT.2021.3051935
S. Zhang, Y. Yu, X. Tao, and L. Wang, "Towards Robust Video Anomaly Detection in 6G Networks: A Scene-Adaptive Framework," IEEE Network, 2025. DOI: https://doi.org/10.1109/MNET.2025.3535760
J. Shen, R. Tie, Z. Li, B. Liu, Z. Fan, and J. Lu, "Neural Network-Based Log Anomaly Detection Algorithm for 6G Wireless Integrated Cyber-Physical System," Wireless Personal Communications, June 2024. DOI: https://doi.org/10.1007/s11277-024-11218-9
S. Alsubai, M. Umer, N. Innab, S. Shiaeles, and M. Nappi, "Multi-scale convolutional auto encoder for anomaly detection in 6G environment," Computers & Industrial Engineering, vol. 194, Aug. 2024, Art. no. 110396. DOI: https://doi.org/10.1016/j.cie.2024.110396
N. Mishra and S. Mishra, "NSL-KDD Dataset Analysis: A Machine Learning Implementation to Detect Intrusions in the Computer Network," in 2024 2nd International Conference on Signal Processing, Communication, Power and Embedded System, Odisha, India, 2024, pp. 1–6. DOI: https://doi.org/10.1109/SCOPES64467.2024.10990794
M. Jouhari, H. Benaddi, and K. Ibrahimi, "Efficient Intrusion Detection: Combining X2 Feature Selection with CNN-BiLSTM on the UNSW-NB15 Dataset," in 2024 11th International Conference on Wireless Networks and Mobile Communications, Leeds, United Kingdom, 2024, pp. 1–6. DOI: https://doi.org/10.1109/WINCOM62286.2024.10658099
R. Singh and G. Srivastav, "Novel Framework for Anomaly Detection Using Machine Learning Technique on CIC-IDS2017 Dataset," in 2021 International Conference on Technological Advancements and Innovations, Tashkent, Uzbekistan, 2021, pp. 632–636. DOI: https://doi.org/10.1109/ICTAI53825.2021.9673238
D. Kapil, V. Mittal, and D. Gangodkar, "Evaluating Machine Learning Approaches for DDoS Attack Detection Using CIC-DDoS2019," in 2024 Second International Conference on Advanced Computing & Communication Technologies, Sonipat, India, 2024, pp. 762–767. DOI: https://doi.org/10.1109/ICACCTech65084.2024.00127
S. Alqaraleh, "An Efficient Ensemble Network Anomaly Detection System for Cyber-Attacks," Engineering, Technology & Applied Science Research, vol. 15, no. 4, pp. 25549–25554, Aug. 2025. DOI: https://doi.org/10.48084/etasr.11920
S. A. Ahmed, E. H. Khalifa, M. Nawaz, F. A. Abdalla, and A. F. A. Mahmoud, "Enhancing Cloud Data Center Security through Deep Learning: A Comparative Analysis of RNN, CNN, and LSTM Models for Anomaly and Intrusion Detection," Engineering, Technology & Applied Science Research, vol. 15, no. 1, pp. 20071–20076, Feb. 2025. DOI: https://doi.org/10.48084/etasr.9445
Downloads
How to Cite
License
Copyright (c) 2025 A. S. Anshad, Piyush Charan, N. Preethi, Irshad Khan, M. R. Amruthalakshmi, Sudhanshu Maurya, Savitha Hiremath, D. Anil

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.
