IJMAT Journal

Announcements

  • Peer Review Policy
    Ijcope follows Strict Peer Review Policy
  • Guidelines
    IARJET follows double-blind peer review process to ensure high quality of Guidelines
  • ISSN IS: 2583-0813
    An International Open Access, Peer Reviewed Journal
  • Call for Papers
    July 2025. Ijcop invites all research papers for publication in Volume 4, Issue 4
  • Peer Review Policy
    Ijcope follows Strict Peer Review Policy
  • Guidelines
    IARJET follows double-blind peer review process to ensure high quality of Guidelines
  • ISSN IS: 2583-0813
    An International Open Access, Peer Reviewed Journal
  • Call for Papers
    July 2025. Ijcop invites all research papers for publication in Volume 4, Issue 4
Announcements
Journal Cover Page

Submit Your Article Now

Machine Learning Techniques for Cybersecurity Threat Detection in Cloud Environments

 

Sourav Das, Priya Chatterjee, Arindam Ghosh
Mentor: Dr. Ujjwal Maulik
Department of Computer Science & Engineering
Jadavpur University, Kolkata, India

Abstract

The rapid adoption of cloud computing has revolutionized business operations by offering scalability, flexibility, and cost efficiency. However, it has also introduced significant cybersecurity challenges, including sophisticated cyberattacks, insider threats, and vulnerabilities due to misconfigurations. Traditional security measures often fail to address the dynamic and complex nature of cloud environments. This paper explores the application of machine learning (ML) techniques to enhance cybersecurity threat detection in cloud systems. We present a comprehensive framework leveraging supervised, unsupervised, and reinforcement learning algorithms for anomaly detection, malware classification, and threat intelligence. The study includes a literature review of current ML applications, a proposed methodology, implementation details, and testing results using real-world datasets. Our findings demonstrate that ML-driven approaches significantly improve detection accuracy and response times, though challenges such as adversarial attacks and data quality persist. Future research directions include federated learning and explainable AI (XAI) to further enhance cloud security.The rapid adoption of cloud computing has indeed transformed business operations, offering unprecedented scalability, flexibility, and cost efficiency. This paradigm shift has enabled organizations to streamline their processes, reduce infrastructure costs, and rapidly deploy new services. However, the complex and distributed nature of cloud environments has introduced a new set of cybersecurity challenges that traditional security measures struggle to address effectively. These challenges include sophisticated cyberattacks that exploit the interconnected nature of cloud systems, insider threats that leverage privileged access, and vulnerabilities arising from misconfigurations in the complex cloud architecture.

 

To combat these evolving threats, the application of machine learning (ML) techniques has emerged as a promising approach to enhance cybersecurity threat detection in cloud systems. This paper proposes a comprehensive framework that leverages various ML algorithms, including supervised, unsupervised, and reinforcement learning, to tackle different aspects of cloud security. The framework aims to improve anomaly detection by identifying unusual patterns in network traffic and user behavior, enhance malware classification through advanced feature extraction and analysis, and bolster threat intelligence by correlating data from multiple sources. While the results demonstrate significant improvements in detection accuracy and response times, the study also acknowledges persistent challenges such as adversarial attacks designed to deceive ML models and the critical importance of high-quality, diverse datasets for effective training. Future research directions, including the exploration of federated learning for privacy-preserving collaborative model training and the integration of explainable AI (XAI) techniques to enhance trust and interpretability in ML-driven security decisions, hold promise for further advancing the field of cloud cybersecurity.

 

Keywords

Machine Learning, Cybersecurity, Cloud Computing, Threat Detection, Anomaly Detection, Malware Classification, Deep Learning, Adversarial Attacks, Explainable AI, Federated Learning

References

  • Lee, J., Kim, J., Kim, I., & Han, K. (2019). Cyber Threat Detection Based on Artificial Neural Networks Using Event Profiles. IEEE Access, 7, 165607–165626.
  • Manimurugan, S. (2021). IoT-Fog-Cloud model for anomaly detection using improved Naïve Bayes and principal component analysis. Journal of Ambient Intelligence and Humanized Computing.
  • Apruzzese, G., et al. (2023). The Role of Machine Learning in Cybersecurity. Digital Threats: Research and Practice, 4(1), 1–38.
  • (2025). Artificial intelligence and machine learning in cybersecurity: a deep dive into state-of-the-art techniques and future paradigms. Knowledge and Information Systems.
  • Journal of Big Data. (2024). Advancing cybersecurity: a comprehensive review of AI-driven detection techniques.
  • (2025). AI-Driven Threat Detection in Cloud Environments.
  • (2025). Cloud Computing Cybersecurity Enhanced by Machine Learning Techniques.
  • Tech Science Press. (2024). Enhancing Cyber Security through Artificial Intelligence and Machine Learning: A Literature Review.
  • Lee, J., Kim, I., Han, K., & Kim, J. (2019). Cyber Threat Detection Based on Artificial Neural Networks Using Event Profiles. IEEE Access, 7, 165607–165626. https://doi.org/10.1109/access.2019.2953095
  • Thapliyal, V., & Thapliyal, P. (2024). Machine Learning for Cybersecurity: Threat Detection, Prevention, and Response. Darpan International Research Analysis, 12(1), 1–7. https://doi.org/10.36676/dira.v12.i1.01
  • Kim, H., Kim, J., Kim, I., Kim, K. J., & Kim, Y. (2018). Design of network threat detection and classification based on machine learning on cloud computing. Cluster Computing, 22(S1), 2341–2350. https://doi.org/10.1007/s10586-018-1841-8
  • Kasula, V., Yenugula, M., Yadulla, A., & Konda, B. (2024). Fortifying cloud environments against data breaches: A novel AI-driven security framework. World Journal of Advanced Research and Reviews, 24(1), 1613–1626. https://doi.org/10.30574/wjarr.2024.24.1.3194
  • Farooq, H. M., & Otaibi, N. M. (2018). Optimal Machine Learning Algorithms for Cyber Threat Detection. 32–37. https://doi.org/10.1109/uksim.2018.00018
  • Omar, M. (2022). Application of Machine Learning (ML) to Address Cybersecurity Threats (pp. 1–11). springer. https://doi.org/10.1007/978-3-031-15893-3_1
  • Batchu, S. (2025). Cloud Infrastructure Fortification: Advanced Security Strategies in the Era of Emerging Threats. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 11(1), 1407–1414. https://doi.org/10.32628/cseit251112150
  • Ahsan, M., Rifat, N., Connolly, J. F., Chowdhury, M. M., Gomes, R., & Nygard, K. E. (2022). Cybersecurity Threats and Their Mitigation Approaches Using Machine Learning—A Review. Journal of Cybersecurity and Privacy, 2(3), 527–555. https://doi.org/10.3390/jcp2030027
  • Meng, X. (2024). Advanced AI and ML techniques in cybersecurity: Supervised and unsupervised learning, reinforcement learning, and neural networks in threat detection and response. Applied and Computational Engineering, 82(1), 24–28. https://doi.org/10.54254/2755-2721/82/2024glg0054
  • Shelke, P., & Hamalainen, T. (2024). Analysing Multidimensional Strategies for Cyber Threat Detection in Security Monitoring. European Conference on Cyber Warfare and Security, 23(1), 780–787. https://doi.org/10.34190/eccws.23.1.2123
  •  
Call for Papers
Volume 01 Issue 01 October 2025
Submission
Last Date
31/10/2025
Acceptance
Status
within 6 Days
Paper Publish within 5 Days
Scroll to Top