Credit Risk Analysis using Explainable Artificial Intelligence
Volume-6 | Issue-3

Fuel Sales Forecasting with SARIMA-GARCH and Rolling Window
Volume-5 | Issue-3

A Comprehensive Review on Advanced Driver Assistance System
Volume-4 | Issue-2

An Accurate Bitcoin Price Prediction using logistic regression with LSTM Machine Learning model
Volume-3 | Issue-3

Multi-UAV Path Planning using Grey Wolf Optimization and RRT Algorithm
Volume-7 | Issue-2

Implications of Tokenizers in BERT Model for Low-Resource Indian Language
Volume-4 | Issue-4

Performance Evaluation and Comparison using Deep Learning Techniques in Sentiment Analysis
Volume-3 | Issue-2

Robotic Surgery with Computer Vision: A Case Study on Da Vinci Systems
Volume-7 | Issue-3

Literature Review on Detection Systems for Wild Animal Intrusions
Volume-5 | Issue-1

Wind Compensation in Drones using PID Control Enhanced by Extended Kalman Filtering
Volume-7 | Issue-3

An Integrated Approach for Crop Production Analysis from Geographic Information System Data using SqueezeNet
Volume-3 | Issue-4

An Accurate Bitcoin Price Prediction using logistic regression with LSTM Machine Learning model
Volume-3 | Issue-3

Design of Distribution Transformer Health Management System using IoT Sensors
Volume-3 | Issue-3

Design of a Food Recommendation System using ADNet algorithm on a Hybrid Data Mining Process
Volume-3 | Issue-4

Automatic Diagnosis of Alzheimer’s disease using Hybrid Model and CNN
Volume-3 | Issue-4

Effective Prediction of Online Reviews for Improvement of Customer Recommendation Services by Hybrid Classification Approach
Volume-3 | Issue-4

Acoustic Features Based Emotional Speech Signal Categorization by Advanced Linear Discriminator Analysis
Volume-3 | Issue-4

PAPR Analysis of OFDM using Selective Mapping Method
Volume-4 | Issue-3

Analysis of Statistical Trends of Future Air Pollutants for Accurate Prediction
Volume-3 | Issue-4

Identification of Electricity Threat and Performance Analysis using LSTM and RUSBoost Methodology
Volume-3 | Issue-4

Home / Archives / Volume-7 / Issue-4 / Article-3

A Review of Deep Learning Techniques for Intrusion Detection in Cloud Computing

Duraipandian M. 
Open Access
Volume - 7 • Issue - 4 • december 2025
346-361  85 PDF
Abstract

The rapid expansion of cloud has computing caused numerous security problems, particularly in distributed designs and resource expansion steps. This situation has led to the development of advanced threat detection mechanisms that exceed the standard signature-based systems. The implementation of these new technologies into security operations is complicated by a number of issues, including limited communication. The effective use of dynamic situations presents additional challenges including concept drift, scalability problems, and real-time delays. This review paper highlights the importance of deep learning for improving cloud security, particularly in intrusion detection systems, which are key components of smart cloud security. This study discusses the deep learning techniques currently in use for cloud intrusion detection, analyses new research topics, and focuses on the continuous limitations in the field. These reviewed techniques will improve the accuracy of protecting cloud computing systems from evolving cyber threats.

Cite this article
M., Duraipandian. "A Review of Deep Learning Techniques for Intrusion Detection in Cloud Computing." Journal of Soft Computing Paradigm 7, no. 4 (2025): 346-361. doi: 10.36548/jscp.2025.4.003
Copy Citation
M., D. (2025). A Review of Deep Learning Techniques for Intrusion Detection in Cloud Computing. Journal of Soft Computing Paradigm, 7(4), 346-361. https://doi.org/10.36548/jscp.2025.4.003
Copy Citation
M., Duraipandian "A Review of Deep Learning Techniques for Intrusion Detection in Cloud Computing." Journal of Soft Computing Paradigm, vol. 7, no. 4, 2025, pp. 346-361. DOI: 10.36548/jscp.2025.4.003.
Copy Citation
M. D. A Review of Deep Learning Techniques for Intrusion Detection in Cloud Computing. Journal of Soft Computing Paradigm. 2025;7(4):346-361. doi: 10.36548/jscp.2025.4.003
Copy Citation
D. M., "A Review of Deep Learning Techniques for Intrusion Detection in Cloud Computing," Journal of Soft Computing Paradigm, vol. 7, no. 4, pp. 346-361, Dec. 2025, doi: 10.36548/jscp.2025.4.003.
Copy Citation
M., D. (2025) 'A Review of Deep Learning Techniques for Intrusion Detection in Cloud Computing', Journal of Soft Computing Paradigm, vol. 7, no. 4, pp. 346-361. Available at: https://doi.org/10.36548/jscp.2025.4.003.
Copy Citation
@article{m.2025,
  author    = {Duraipandian M.},
  title     = {{A Review of Deep Learning Techniques for Intrusion Detection in Cloud Computing}},
  journal   = {Journal of Soft Computing Paradigm},
  volume    = {7},
  number    = {4},
  pages     = {346-361},
  year      = {2025},
  publisher = {IRO Journals},
  doi       = {10.36548/jscp.2025.4.003},
  url       = {https://doi.org/10.36548/jscp.2025.4.003}
}
Copy Citation
Keywords
Deep Learning Cloud Security Intrusion Detection Systems Cyber Threats
References
  1. Nassif, Ali Bou, Manar Abu Talib, Qassim Nasir, Halah Albadani, and Fatima Mohamad Dakalbab. "Machine Learning for Cloud Security: A Systematic Review." IEEE Access 9 (2021): 20717-20735.
  2. Alzoubi, Yehia Ibrahim, Alok Mishra, and Ahmet Ercan Topcu. "Research Trends in Deep Learning and Machine Learning for Cloud Computing Security." Artificial intelligence review 57, no. 5 (2024): 132.
  3. Hasimi, Lumbardha, Dimitrios Zavantis, Elhadi Shakshuki, and Ansar Yasar. "Cloud Computing Security and Deep Learning: an ANN Approach." Procedia Computer Science 231 (2024): 40-47.
  4. Salem, Israa Ezzat. "Enhancing Cloud Security through the Integration of Deep Learning and Data Mining Techniques: A Comprehensive Review." Periodicals of Engineering and Natural Sciences 11, no. 3 (2023): 176-192.
  5. Gangwani, Divya, Harshal A. Sanghvi, Viral Parmar, Riki H. Patel, and Abhijit S. Pandya. "A Comprehensive Review on Cloud Security using Machine Learning Techniques." Artificial Intelligence in Cyber Security: Theories and Applications (2023): 1-24.
  6. Butt, Umer Ahmed, Muhammad Mehmood, Syed Bilal Hussain Shah, Rashid Amin, M. Waqas Shaukat, Syed Mohsan Raza, Doug Young Suh, and Md Jalil Piran. "A Review of Machine Learning Algorithms for Cloud Computing Security." Electronics 9, no. 9 (2020): 1379.
  7. Sivaprasad Yerneni, K., A. Ravi Teja, K. Sri Harsha, and Y. Naresh Kiran Kumar Reddy. "Towards Proactive Cloud Security: A Survey on ML and Deep Learning-Based Intrusion Detection Systems." J Contemp Edu Theo Artific Intel: JCETAI-116 (2025).
  8. Hizal, Selman, Ünal ÇAVUŞOĞLU, and Devrim AKGÜN. "A New Deep Learning Based Intrusion Detection System for Cloud Security." In 2021 3rd International Congress on Human-Computer Interaction, Optimisation and Robotic Applications (HORA), pp. 1-4. IEEE, 2021.
  9. Qayyum, Adnan, Aneeqa Ijaz, Muhammad Usama, Waleed Iqbal, Junaid Qadir, Yehia Elkhatib, and Ala Al-Fuqaha. "Securing Machine Learning in the Cloud: A Systematic Review of Cloud Machine Learning Security." Frontiers in Big Data 3 (2020): 587139.
  10. Reddy, Premkumar, Yemi Adetuwo, and Anil Kumar Jakkani. "Implementation of Machine Learning Techniques for Cloud Security in Detection of DDoS Attacks." International Journal of Computer Engineering and Technology (IJCET) 15, no. 2 (2024): 25-34.
  11. Garikipati, Venkat, and Veerandra Kumar. "Optimising Traffic Management and Cloud Security in Software Networks Using Advanced Deep Learning Models for Application and Attack Classification." International Journal of HRM and Organisational Behaviour 8, no. 3 (2020): 127-134.
  12. Andi, Hari Krishnan. "Estimating the Role of Blockchain, Deep Learning and Cryptography Algorithms in Cloud Security." Journal of Trends in Computer Science and Smart Technology 3, no. 4 (2021): 305-313.
  13. Vashishth, Tarun Kumar, Vikas Sharma, Kewal Krishan Sharma, Bhupendra Kumar, Sachin Chaudhary, and Rajneesh Panwar. "Enhancing Cloud Security: The Role of Artificial Intelligence and Machine Learning." In Improving security, privacy, and trust in cloud computing, pp. 85-112. IGI Global Scientific Publishing, 2024.
  14. Marwan, Mbarek, Ali Kartit, and Hassan Ouahmane. "Security Enhancement in Healthcare Cloud using Machine Learning." Procedia Computer Science 127 (2018): 388-397.
  15. Alhazmi, Lamia. "Enhancing Cloud Security: Optimisation-based Deep Learning Model for Detecting Denial-of-Service Attacks." International Journal of Advanced Computer Science and Applications 14, no. 7 (2023).
  16. Sokolov, Strahil A., Teodor B. Iliev, and Ivaylo S. Stoyanov. "Analysis of Cybersecurity Threats in Cloud Applications using Deep Learning Techniques." In 2019, 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 441-446. IEEE, 2019.
  17. Prabhu, M., G. Revathy, and R. Raja Kumar. "Deep Learning Based Authentication Secures Data Storage in Cloud Computing." International Journal of Computer and Engineering Optimisation 1, no. 01 (2023): 10-14.
  18. Tiwari, Pradeep Kumar, K. Kannan, Duggineni Veeraiah, Nikhil Ranjan, Jain Singh, Ghalib H. Alshammri, and Awal Halifa. "Security Protection Mechanism in Cloud Computing Authorisation Model Using Machine Learning Techniques." Wireless Communications and Mobile Computing 2022, no. 1 (2022): 1907511.
  19. Srilatha, Doddi, and N. Thillaiarasu. "Implementation of Intrusion Detection and Prevention with Deep Learning in Cloud Computing." Journal of Information Technology Management 15, no. Special Issue (2023): 1-18.
  20. Bhaskaran, Shinoy Vengaramkode, and Sandesh Achar. "A Study of Evolving Cloud Computing Data Security: A Machine Learning Perspective." International Journal of Professional Business Review: Int. J. Prof. Bus. Rev. 10, no. 3 (2025): 5.
  21. Attou, Hanaa, Azidine Guezzaz, Said Benkirane, Mourade Azrour, and Yousef Farhaoui. "Cloud-Based Intrusion Detection Approach using Machine Learning Techniques." Big Data Mining and Analytics 6, no. 3 (2023): 311-320.
  22. Ţălu, Mircea. "Exploring Machine Learning Algorithms to Enhance Cloud Computing Security." Digital Technologies Research and Applications 4, no. 2 (2025): 33-47.
  23. Shaik, Sajeeda Parveen. "Enhancing Cloud Computing Security Through Deep Learning: An Artificial Neural Network Approach." (2021).
  24. Patell, Jay. "Prospects of Cloud-Driven Deep Learning-Leading the Way for Safe and Secure AI." INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING & APPLIED SCIENCES 8, no. 3 (2020): 10-55083.
  25. Raju, K., N. Ramshankar, J. Anvar Shathik, and R. Lavanya. "Blockchain-Assisted Cloud Security and Privacy Preservation using Hybridised Encryption and Deep Learning Mechanism in IoT-Healthcare Application." Journal of Grid Computing 21, no. 3 (2023): 45.
  26. Diana, Lorenzo, Pierpaolo Dini, and Davide Paolini. "Overview on Intrusion Detection Systems for Computer Networking Security." Computers 14, no. 3 (2025): 87.
  27. Market.us. 2023. “Cloud Security Market Size, Share | CAGR of 22.5%.” October 31, 2023. https://market.us/report/cloud-security-market/.
Published
02 January, 2026
×

Currently, subscription is the only source of revenue. The subscription resource covers the operating expenses such as web presence, online version, pre-press preparations, and staff wages.

To access the full PDF, please complete the payment process.

Subscription Details

Category Fee
Article Access Charge
15 USD
Open Access Fee Nil
Annual Subscription Fee
200 USD
After payment,
please send an email to irojournals.contact@gmail.com / journals@iroglobal.com requesting article access.
Subscription form: click here