This is a preview and has not been published. View submission

Enhancing Cloud Data Center Security through Deep Learning: A Comparative Analysis of RNN, CNN, and LSTM Models for Anomaly and Intrusion Detection

Authors

  • Shimaa A. Ahmed Department of Electrical Engineering, College of Engineering, Northern Border University, Arar, Saudi Arabia
  • Entisar H. Khalifa Department of Computer Science, College of Science, Northern Border University, Arar, Saudi Arabia
  • Majid Nawaz Department of Computer Science, College of Science, Northern Border University, Arar, Saudi Arabia
  • Faroug A. Abdalla Department of Computer Science, College of Science, Northern Border University, Arar, Saudi Arabia
  • Ashraf F. A. Mahmoud Department of Computer Science, College of Science, Northern Border University, Arar, Saudi Arabia
Volume: 15 | Issue: 1 | Pages: 20071-20076 | February 2025 | https://doi.org/10.48084/etasr.9445

Abstract

Cloud data centers form the backbone of modern digital ecosystems, enabling critical operations for businesses, governments, and individuals around the world. However, their high connectivity and complexity make them prime targets for cyberattacks, leading to service disruptions and data breaches. This paper investigates the use of deep learning techniques, namely Recurrent Neural Networks (RNNs), Convolutional Neural Networks (CNNs), and Long Short-Term Memory (LSTM) networks, to enhance cloud data center security. By employing these models for anomaly detection and intrusion prevention, the study performs a comparative analysis. The results indicate that the LSTMs achieved the highest ROC AUC score (0.90), demonstrating better detection of persistent threats. These findings highlight the potential of deep learning to revolutionize cloud security by providing scalable, accurate, and proactive measures against evolving cyber threats.

Keywords:

cloud data centers, deep learning, downtime, cyberattacks, predictive analytics, anomaly detection, intrusion prevention

Downloads

Download data is not yet available.

References

"Cost of a data breach 2023," IBM. https://www.ibm.com/reports/data-breach.

S. G. Kene and D. P. Theng, "A review on intrusion detection techniques for cloud computing and security challenges," in 2015 2nd International Conference on Electronics and Communication Systems (ICECS), Coimbatore, India, Feb. 2015, pp. 227–232.

L. Abrams, "Over 500,000 Zoom accounts sold on hacker forums, the dark web," BleepingComputer. https://www.bleepingcomputer.com/news/security/over-500-000-zoom-accounts-sold-on-hacker-forums-the-dark-web/.

V. Chandola, A. Banerjee, and V. Kumar, "Anomaly detection: A survey," ACM Computing Surveys, vol. 41, no. 3, Apr. 2009.

I. Ahmad, M. Basheri, M. J. Iqbal, and A. Rahim, "Performance Comparison of Support Vector Machine, Random Forest, and Extreme Learning Machine for Intrusion Detection," IEEE Access, vol. 6, pp. 33789–33795, 2018.

Z. Chkirbene, A. Erbad, R. Hamila, A. Gouissem, A. Mohamed, and M. Hamdi, "Machine Learning Based Cloud Computing Anomalies Detection," IEEE Network, vol. 34, no. 6, pp. 178–183, Nov. 2020.

S. Rahman, S. Pal, S. Mittal, T. Chawla, and C. Karmakar, "SYN-GAN: A robust intrusion detection system using GAN-based synthetic data for IoT security," Internet of Things, vol. 26, Jul. 2024, Art. no. 101212.

B. Mopuru and Y. Pachipala, "Enhanced Intrusion Detection in IoT with a Novel PRBF Kernel and Cloud Integration," Engineering, Technology & Applied Science Research, vol. 14, no. 4, pp. 14988–14993, Aug. 2024.

A. A. Alhashmi, A. A. Darem, A. B. Alshammari, L. A. Darem, H. K. Sheatah, and R. Effghi, "Ransomware Early Detection Techniques," Engineering, Technology & Applied Science Research, vol. 14, no. 3, pp. 14497–14503, Jun. 2024.

S. Ahmad, A. Lavin, S. Purdy, and Z. Agha, "Unsupervised real-time anomaly detection for streaming data," Neurocomputing, vol. 262, pp. 134–147, Nov. 2017.

J. B. Awotunde, C. Chakraborty, and A. E. Adeniyi, "Intrusion Detection in Industrial Internet of Things Network-Based on Deep Learning Model with Rule-Based Feature Selection," Wireless Communications and Mobile Computing, vol. 2021, no. 1, 2021, Art. no. 7154587.

T. A. Devi and A. Jain, "Enhancing Cloud Security with Deep Learning-Based Intrusion Detection in Cloud Computing Environments," in 2024 2nd International Conference on Advancement in Computation & Computer Technologies (InCACCT), Gharuan, India, May 2024, pp. 541–546.

I. Ullah and Q. H. Mahmoud, "Design and Development of RNN Anomaly Detection Model for IoT Networks," IEEE Access, vol. 10, pp. 62722–62750, 2022.

B. Lindemann, B. Maschler, N. Sahlab, and M. Weyrich, "A survey on anomaly detection for technical systems using LSTM networks," Computers in Industry, vol. 131, Oct. 2021, Art. no. 103498.

L. Mohammadpour, T. C. Ling, C. S. Liew, and A. Aryanfar, "A Survey of CNN-Based Network Intrusion Detection," Applied Sciences, vol. 12, no. 16, Jan. 2022, Art. no. 8162.

M. Nour and J. Slay, "UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)," in 2015 Military Communications and Information Systems Conference (MilCIS), Canberra, Australia, Nov. 2015, pp. 1–6.

M. S. Al-Daweri, K. A. Zainol Ariffin, S. Abdullah, and M. F. E. Md. Senan, "An Analysis of the KDD99 and UNSW-NB15 Datasets for the Intrusion Detection System," Symmetry, vol. 12, no. 10, p. 1666, Oct. 2020.

D. M. W. Powers, "Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation." arXiv, Oct. 11, 2020.

M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, "A detailed analysis of the KDD CUP 99 data set," in 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, Ottawa, ON, Canada, Jul. 2009, pp. 1–6.

F. M. Shiri, T. Perumal, N. Mustapha, and R. Mohamed, "A Comprehensive Overview and Comparative Analysis on Deep Learning Models: CNN, RNN, LSTM, GRU." arXiv, Oct. 24, 2024.

J. Brownlee, "How to Grid Search Hyperparameters for Deep Learning Models in Python with Keras," MachineLearningMastery.com, 2022. https://www.machinelearningmastery.com/grid-search-hyperparameters-deep-learning-models-python-keras/.

Downloads

How to Cite

[1]
Ahmed, S.A., Khalifa, E.H., Nawaz, M., Abdalla, F.A. and Mahmoud, A.F.A. 2025. Enhancing Cloud Data Center Security through Deep Learning: A Comparative Analysis of RNN, CNN, and LSTM Models for Anomaly and Intrusion Detection. Engineering, Technology & Applied Science Research. 15, 1 (Feb. 2025), 20071–20076. DOI:https://doi.org/10.48084/etasr.9445.

Metrics

Abstract Views: 12
PDF Downloads: 6

Metrics Information

Most read articles by the same author(s)