Intelligent Anomaly Detection for Secure Data Transmission in Cloud Computing Systems over 6G Networks

Authors

  • A. S. Anshad Department of ECE, John Cox Memorial CSI Institute of Technology, Thiruvananthapuram, Kerala, India
  • Piyush Charan Department of Interdisciplinary Engineering-Robotics & AI, Manav Rachna University, Faridabad, India
  • Preethi N. Department of CSE (IoT, Cybersecurity including Blockchain), BMS College of Engineering, Bangalore, India
  • Irshad Khan Department of ISE, Dayananda Sagar College of Engineering, Bangalore, India
  • Amruthalakshmi M. R. Department of Mathematics, Dayananda Sagar College of Engineering, Bengaluru, India
  • Sudhanshu Maurya Department of Computer Science & Engineering, School of Engineering & Technology, Manav Rachna International Institute of Research and Studies (Deemed to be University), Faridabad, India
  • Savitha Hiremath Department of Computer Science and Engineering, Dayananda Sagar University, Bengaluru South District, Karnataka, India
  • D. Anil Department of Computer Science and Business Systems, Dayananda Sagar College of Engineering, Bengaluru, India
Volume: 15 | Issue: 6 | Pages: 30349-30355 | December 2025 | https://doi.org/10.48084/etasr.14022

Abstract

The emergence of sixth-generation (6G) networks facilitates robust capabilities such as ultra-low latency and massive device connectivity, which simultaneously raise critical challenges in securing cloud-based data transmission. This study proposes a novel anomaly detection framework that integrates Autoencoders (AEs), Convolutional Neural Networks (CNNs), and Federated Learning (FL) to deliver real-time, privacy-preserving intrusion detection for 6G-enabled cloud computing environments. The framework is evaluated using four benchmark datasets, including NSL-KDD, UNSW-NB15, CIC-IDS2017, and CIC-DDoS2019. Across all datasets, the model achieved an average accuracy of 99.85%, precision of 99.76%, recall of 99.82%, and F1-score of 99.79%, while maintaining a False Alarm Rate (FAR) as low as 0.0011. The model also demonstrated high efficiency, operating with inference latency below 350 ms, making it highly suitable for the stringent requirements of 6G infrastructure. Enhanced with explainability tools, the system ensures transparent decision-making, offering an interpretable solution towards next-generation cybersecurity threats.

Keywords:

sixth-generation (6G) networks, anomaly detection, Federated Learning (FL), cloud security, Artificial Intelligence (AI)

Downloads

Download data is not yet available.

Author Biographies

A. S. Anshad, Department of ECE, John Cox Memorial CSI Institute of Technology, Thiruvananthapuram, Kerala, India

 

 

Irshad Khan, Department of ISE, Dayananda Sagar College of Engineering, Bangalore, India

 

    

Amruthalakshmi M. R., Department of Mathematics, Dayananda Sagar College of Engineering, Bengaluru, India

 

 

References

R. Liu, J. Shi, X. Chen, and C. Lu, "Network anomaly detection and security defense technology based on machine learning: A review," Computers and Electrical Engineering, vol. 119, Oct. 2024, Art. no. 109581. DOI: https://doi.org/10.1016/j.compeleceng.2024.109581

M. Kim and J. H. Park, "Quantum-resilient security for 6G networks: a comprehensive survey on challenges, solutions, and research opportunities," The Journal of Supercomputing, vol. 81, no. 10, July 2025, Art. no. 1132. DOI: https://doi.org/10.1007/s11227-025-07651-7

N. F. Syed, S. W. Shah, A. Shaghaghi, A. Anwar, Z. Baig, and R. Doss, "Zero Trust Architecture (ZTA): A Comprehensive Survey," IEEE Access, vol. 10, pp. 57143–57179, 2022. DOI: https://doi.org/10.1109/ACCESS.2022.3174679

G. S. Hukkeri, R. H. Goudar, G. M. Dhananjaya, V. N. Rathod, and S. Ankalaki, "A Comprehensive Survey on Split-Fed Learning: Methods, Innovations, and Future Directions," IEEE Access, vol. 13, pp. 46312–46333, 2025. DOI: https://doi.org/10.1109/ACCESS.2025.3547641

A. Blika et al., "Federated Learning for Enhanced Cybersecurity and Trustworthiness in 5G and 6G Networks: A Comprehensive Survey," IEEE Open Journal of the Communications Society, vol. 6, pp. 3094–3130, 2025. DOI: https://doi.org/10.1109/OJCOMS.2024.3449563

T. Senevirathna, V. H. La, S. Marcha, B. Siniarski, M. Liyanage, and S. Wang, "A Survey on XAI for 5G and Beyond Security: Technical Aspects, Challenges and Research Directions," IEEE Communications Surveys & Tutorials, vol. 27, no. 2, pp. 941–973, Apr. 2025. DOI: https://doi.org/10.1109/COMST.2024.3437248

N. Moustafa, N. Koroniotis, M. Keshk, A. Y. Zomaya, and Z. Tari, "Explainable Intrusion Detection for Cyber Defences in the Internet of Things: Opportunities and Solutions," IEEE Communications Surveys & Tutorials, vol. 25, no. 3, pp. 1775–1807, 2023. DOI: https://doi.org/10.1109/COMST.2023.3280465

S. Ahmadi, "Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies," Journal of Information Security, vol. 15, no. 2, pp. 148–167, Mar. 2024. DOI: https://doi.org/10.4236/jis.2024.152010

M. M. Saeed, R. A. Saeed, M. Abdelhaq, R. Alsaqour, M. K. Hasan, and R. A. Mokhtar, "Anomaly Detection in 6G Networks Using Machine Learning Methods," Electronics, vol. 12, no. 15, Aug. 2023, Art. no. 3300. DOI: https://doi.org/10.3390/electronics12153300

N. Nezhadsistani and B. Stiller, "ML-Based Anomaly Detection in 6G Networks: A Survey on the Current Status, Challenges, and Future Directions," in 2024 3rd International Conference on 6G Networking, Paris, France, 2024, pp. 75–83. DOI: https://doi.org/10.1109/6GNet63182.2024.10765631

B. K. Khare, D. Sahu, D. Pandey, M. Tiwari, H. Kumar, and N. Siddiqui, "Exploring Machine Learning Solutions for Anomaly Detection in 6G Communication Systems," in Security Issues and Solutions in 6G Communications and Beyond, D. Pandey, B. Pandey, and T. Ahmad, Eds. Hershey, PA, USA: IGI Global Scientific Publishing, 2024, pp. 230–250. DOI: https://doi.org/10.4018/979-8-3693-2931-3.ch014

H. Alshahrani et al., "Energy aware routing with optimal deep learning based anomaly detection in 6G-IoT networks," Sustainable Energy Technologies and Assessments, vol. 60, Dec. 2023, Art. no. 103494. DOI: https://doi.org/10.1016/j.seta.2023.103494

M. M. Kamruzzaman, "6G wireless communication assisted security management using cloud edge computing," Expert Systems, vol. 40, no. 4, May 2023, Art. no. e13061. DOI: https://doi.org/10.1111/exsy.13061

G. Han, J. Tu, L. Liu, M. Martínez-García, and Y. Peng, "Anomaly Detection Based on Multidimensional Data Processing for Protecting Vital Devices in 6G-Enabled Massive IIoT," IEEE Internet of Things Journal, vol. 8, no. 7, pp. 5219–5229, Apr. 2021. DOI: https://doi.org/10.1109/JIOT.2021.3051935

S. Zhang, Y. Yu, X. Tao, and L. Wang, "Towards Robust Video Anomaly Detection in 6G Networks: A Scene-Adaptive Framework," IEEE Network, 2025. DOI: https://doi.org/10.1109/MNET.2025.3535760

J. Shen, R. Tie, Z. Li, B. Liu, Z. Fan, and J. Lu, "Neural Network-Based Log Anomaly Detection Algorithm for 6G Wireless Integrated Cyber-Physical System," Wireless Personal Communications, June 2024. DOI: https://doi.org/10.1007/s11277-024-11218-9

S. Alsubai, M. Umer, N. Innab, S. Shiaeles, and M. Nappi, "Multi-scale convolutional auto encoder for anomaly detection in 6G environment," Computers & Industrial Engineering, vol. 194, Aug. 2024, Art. no. 110396. DOI: https://doi.org/10.1016/j.cie.2024.110396

N. Mishra and S. Mishra, "NSL-KDD Dataset Analysis: A Machine Learning Implementation to Detect Intrusions in the Computer Network," in 2024 2nd International Conference on Signal Processing, Communication, Power and Embedded System, Odisha, India, 2024, pp. 1–6. DOI: https://doi.org/10.1109/SCOPES64467.2024.10990794

M. Jouhari, H. Benaddi, and K. Ibrahimi, "Efficient Intrusion Detection: Combining X2 Feature Selection with CNN-BiLSTM on the UNSW-NB15 Dataset," in 2024 11th International Conference on Wireless Networks and Mobile Communications, Leeds, United Kingdom, 2024, pp. 1–6. DOI: https://doi.org/10.1109/WINCOM62286.2024.10658099

R. Singh and G. Srivastav, "Novel Framework for Anomaly Detection Using Machine Learning Technique on CIC-IDS2017 Dataset," in 2021 International Conference on Technological Advancements and Innovations, Tashkent, Uzbekistan, 2021, pp. 632–636. DOI: https://doi.org/10.1109/ICTAI53825.2021.9673238

D. Kapil, V. Mittal, and D. Gangodkar, "Evaluating Machine Learning Approaches for DDoS Attack Detection Using CIC-DDoS2019," in 2024 Second International Conference on Advanced Computing & Communication Technologies, Sonipat, India, 2024, pp. 762–767. DOI: https://doi.org/10.1109/ICACCTech65084.2024.00127

S. Alqaraleh, "An Efficient Ensemble Network Anomaly Detection System for Cyber-Attacks," Engineering, Technology & Applied Science Research, vol. 15, no. 4, pp. 25549–25554, Aug. 2025. DOI: https://doi.org/10.48084/etasr.11920

S. A. Ahmed, E. H. Khalifa, M. Nawaz, F. A. Abdalla, and A. F. A. Mahmoud, "Enhancing Cloud Data Center Security through Deep Learning: A Comparative Analysis of RNN, CNN, and LSTM Models for Anomaly and Intrusion Detection," Engineering, Technology & Applied Science Research, vol. 15, no. 1, pp. 20071–20076, Feb. 2025. DOI: https://doi.org/10.48084/etasr.9445

Downloads

How to Cite

[1]
A. S. Anshad, “Intelligent Anomaly Detection for Secure Data Transmission in Cloud Computing Systems over 6G Networks”, Eng. Technol. Appl. Sci. Res., vol. 15, no. 6, pp. 30349–30355, Dec. 2025.

Metrics

Abstract Views: 491
PDF Downloads: 285

Metrics Information