Deep Learning-Driven Optimized Approaches for Network Anomaly Detection in IoT-Enabled Cloud Ecosystems: A Comprehensive Review

Authors

  • Anjum Ahsan PG Scholor, Department Computer Science and Engineering, Integral University, Lucknow, India
  • Parvez Rauf Assistant Professor, Department of Computer Science and Engineering, Integral University, Lucknow, India
  • Mohd Haroon Professor, Department of Computer Science and Engineering, Integral University, Lucknow, India

Keywords:

Deep Learning, Network Anomaly Detection, IoT-Enabled Cloud, Optimized, Models, Cyber security, IoT Security, Cloud Ecosystems, Threat Detection, Scalability, Real-Time Detection

Abstract

The rapid proliferation of Internet of Things (IoT) devices within cloud environments has introduced unprecedented challenges in securing network infrastructures against anomalies and cyber threats. Traditional detection mechanisms often struggle to meet the dynamic and complex demands of these integrated ecosystems. This review paper focuses on the potential of deep learning (DL)-based optimized models for effective network anomaly detection in IoT-enabled cloud environments. It examines the fundamental role of DL techniques in addressing key challenges, including scalability, adaptability, and real-time threat identification. The paper systematically explores state-of-the-art models, highlighting their architectures, optimization strategies, and performance metrics. A comparative analysis is provided to underscore strengths, limitations, and suitability across diverse use cases. Furthermore, emerging trends, such as lightweight DL models and federated learning, are discussed in the context of resource-constrained IoT networks. The review aims to offer researchers and practitioners insights into current advancements while identifying gaps and future directions for research in enhancing security and reliability in IoT-cloud ecosystems.

This review highlights the role of deep learning in detecting network anomalies in IoT-integrated cloud environments, focusing on optimization strategies to handle challenges like scalability, heterogeneity, and real-time detection. We provide a concise review of existing approaches and optimization methods, identify challenges, and suggest directions for future research.

References

W. Khan and M. Haroon, "An unsupervised deep learning ensemble model for anomaly detection in static attributed social networks," Int. J. Cognitive Comput. Eng., vol. 3, pp. 153–160, 2022. Available from: https://doi.org/10.1016/j.ijcce.2022.08.002

Z. A. Siddiqui and M. Haroon, "Research on significant factors affecting adoption of blockchain technology for enterprise distributed applications based on integrated MCDM FCEM-MULTIMOORA-FG method," Eng. Appl. Artif. Intell., vol. 118, no. 105699, 2023. Available from: https://doi.org/10.1016/j.engappai.2022.105699

M. M. Inuwa and R. Das, "A comparative analysis of various machine learning methods for anomaly detection in cyber attacks on IoT networks," Internet of Things, vol. 26, no. 101162, 2024. Available from: https://doi.org/10.1016/j.iot.2024.101162

W. Khan and M. Haroon, "An efficient framework for anomaly detection in attributed social networks," Int. J. Inf. Technol., vol. 14, no. 6, pp. 3069–3076, 2022. Available from: https://doi.org/10.1016/j.cose.2020.102085

S. Srivastava, M. Haroon, and A. Bajaj, "Web document information extraction using class attribute approach," in Proc. 4th Int. Conf. Comput. Commun. Technol. (ICCCT), Sept. 2013, pp. 17–22. Available from: https://doi.org/10.1109/ICCCT.2013.6749596

W. Khan, M. Haroon, A. N. Khan, M. K. Hasan, A. Khan, U. A. Mokhtar, and S. Islam, "DVAEGMM: Dual variational autoencoder with Gaussian mixture model for anomaly detection on attributed networks," IEEE Access, vol. 10, pp. 91160–91176, 2022. Available from: http://dx.doi.org/10.1109/ACCESS.2022.3201332

A. Nazir, J. He, N. Zhu, S. S. Qureshi, S. U. Qureshi, F. Ullah, ... and M. S. Pathan, "A deep learning-based novel hybrid CNN-LSTM architecture for efficient detection of threats in the IoT ecosystem," Ain Shams Eng. J., vol. 15, no. 7, pp. 102777, 2024. Available from: https://doi.org/10.1016/j.asej.2024.102777

W. Khan, "An exhaustive review on state-of-the-art techniques for anomaly detection on attributed networks," Turkish J. Comput. Math. Educ. (TURCOMAT), vol. 12, no. 10, pp. 6707–6722, 2021. Available from: http://dx.doi.org/10.17762/turcomat.v12i10.5537

O. E. L. Castro, X. Deng, and J. H. Park, "Comprehensive survey on AI-based technologies for enhancing IoT privacy and security: Trends, challenges, and solutions," Human-Centric Comput. Inform. Sci., vol. 13, 2023. Available from: https://doi.org/10.1016/j.prime.2023.100158

M. S. Husain and M. Haroon, "An enriched information security framework from various attacks in the IoT," Int. J. Innov. Res. Comput. Sci. Technol. (IJIRCST), vol. 2347-5552, 2020. Available from: http://dx.doi.org/10.21276/ijircst.2020.8.4.3

Z. A. Siddiqui and M. Haroon, "Application of artificial intelligence and machine learning in blockchain technology," in Artificial Intelligence and Machine Learning for EDGE Computing, Academic Press, 2022, pp. 169–185. Available from: https://doi.org/10.1016/B978-0-12-824054-0.00001-0

M. S. Husain, "A review of information security from consumer’s perspective especially in online transactions," Int. J. Eng. Manag. Res., vol. 10, 2020. Available from: http://dx.doi.org/10.14704/nq.2022.20.6.NQ88037

W. Khan and M. Haroon, "A pilot study and survey on methods for anomaly detection in online social networks," in Human-Centric Smart Computing: Proc. ICHCSC 2022, Singapore: Springer Nature Singapore, 2022, pp. 119–128. Available from: http://dx.doi.org/10.1007/978-981-19-5403-0_10

A. M. Khan, S. Ahmad, and M. Haroon, "A comparative study of trends in security in cloud computing," in Proc. 5th Int. Conf. Commun. Syst. Network Technol., Apr. 2015, pp. 586–590. Available from: https://doi.org/10.1109/CSNT.2015.31

M. Haroon, M. M. Tripathi, and F. Ahmad, "Application of machine learning in forensic science," in Critical Concepts, Standards, and Techniques in Cyber Forensics, pp. 228–239, IGI Global, 2020. Available from: https://doi.org/10.1016/j.fsigen.2023.102994

N. Khan and M. Haroon, "Comparative study of various crowd detection and classification methods for safety control system," SSRN, Paper 4146666, 2022. Available from: https://www.researchgate.net/publication/361952070_Comparative_Study_of_Various_Crowd_Detection_and_Classification_Methods_for_Safety_Control_System

M. Haroon, D. K. Misra, M. Husain, M. M. Tripathi, and A. Khan, "Security issues in the internet of things for the development of smart cities," in Advances in Cyberology and the Advent of the Next-Gen Information Revolution, pp. 123–137, IGI Global, 2023. Available from: http://dx.doi.org/10.1007/978-981-15-1483-8_26

A. Singh, M. Haroon, and M. Arif, "Routing misbehaviour in mobile ad hoc network," Int. J. Eng. Manag. Res. (IJEMR), vol. 4, no. 5, pp. 31–36, 2014. Available from: https://doi.org/10.1109/NGMAST.2008.56

M. M. Tripathi, M. Haroon, and F. Ahmad, "A survey on multimedia technology and internet of things," in Multimedia Technologies in the Internet of Things Environment, vol. 2, pp. 69–87, 2022. Available from: http://dx.doi.org/10.1007/978-981-16-3828-2_4

N. Khan and M. Haroon, "A personalized tour recommender in python using decision tree," International Journal of Engineering and Management Research, vol. 13, no. 3, pp. 168–174, 2023. Available from: https://ijemr.vandanapublications.com/index.php/j/article/view/1273/1098

E. Gyamfi and A. Jurcut, "Intrusion detection in internet of things systems: a review on design approaches leveraging multi-access edge computing, machine learning, and datasets," Sensors, vol. 22, no. 10, p. 3744, 2022. Available from: http://dx.doi.org/10.1109/IPCCC59175.2023.10253831

N. Shakeel, M. Haroon, and F. Ahmad, "A study of WSN and analysis of packet drop during transmission," Int. J. Innov. Res. Comput. Sci. Technol. (IJIRCST), 2021. Available from: http://dx.doi.org/10.21276/ijircst.2021.9.2.11

M. Haroon and F. Ahamad, "Satiating a user-delineated time constraints while scheduling workflow in cloud environments," 2021. Available from: http://dx.doi.org/10.21276/ijircst.2021.9.3.16

M. Haroon, M. Husain, M. M. Tripathi, T. Ahmad, and V. Kumari, "Server controlled mobile agent," Int. J. Comput. Appl., vol. 975, no. 8887, 2010. Available from: http://dx.doi.org/10.5120/1572-2101

S. F. Ahmed, M. S. B. Alam, M. Hoque, L. A. Lameesa, S. Afrin, T. Farah, ... and S. M. Muyeen, "Industrial internet of things enabled technologies, challenges, and future directions," Comput. Electr. Eng., vol. 110, p. 108847, 2023. Available from: https://doi.org/10.1016/j.compeleceng.2023.108847

M. Khan and M. Haroon, "Detecting network intrusion in cloud environment through ensemble learning and feature selection approach," SN Comput. Sci., vol. 5, no. 1, p. 84, 2023. Available from: http://dx.doi.org/10.1007/s42979-023-02390-z

H. S. Kharkwal and M. Haroon, "Automated task allotment in unmanned submarines by smart searching algorithm," unpublished. Available from: https://doi.org/10.1016/j.oceaneng.2022.112911

R. G. Tiwari, M. Haroon, M. M. Tripathi, P. Kumar, A. K. Agarwal, and V. Jain, "A system model of fault tolerance technique in distributed system and scalable system using machine learning," in Software-Defined Network Frameworks, CRC Press, 2024, pp. 1–16. Available from: http://dx.doi.org/10.1201/9781003432869-1

F. A. Alijoyo, R. Pradhan, N. Nalini, S. S. Ahamad, V. S. Rao, and S. R. Godla, "Predictive maintenance optimization in Zigbee-enabled smart home networks: A machine learning-driven approach utilizing fault prediction models," Wireless Personal Commun., pp. 1–25, 2024. Available from: http://dx.doi.org/10.1007/s11277-024-11233-w

Z. A. Siddiqui and M. Haroon, "Ranking of components for reliability estimation of CBSS: an application of entropy weight fuzzy comprehensive evaluation model," Int. J. Syst. Assur. Eng. Manag., pp. 1–15, 2024. Available from: http://dx.doi.org/10.1007/s13198-024-02263-5

N. Azeem, "Designing a model for speech synthesis using HMM," unpublished, 2020. Available from: http://dx.doi.org/10.5120/ijca2015906965

Ș. A. Ionescu, N. M. Jula, G. Hurduzeu, A. M. Păuceanu, and A. G. Sima, "PRISMA on machine learning techniques in smart city development," Appl. Sci., vol. 14, no. 16, p. 7378, 2024. Available from: http://dx.doi.org/10.3390/app14167378

M. Haroon, A. Khan, M. M. Tripathi, S. Ahmad, and K. Ahmad, "Cyber-security technique for profound analytics of big data using AI," in Computational Intelligence Applications in Cyber Security, CRC Press, 2024, pp. 247–265. Available from: http://dx.doi.org/10.51903/jtie.v3i3.200

M. Khan and M. Haroon, "Ensemble random forest and deep convolutional neural networks in detecting and classifying the multiple intrusions from near real-time cloud datasets," Security Privacy, vol. 7, no. 5, p. e408, 2024. Available from: https://doi.org/10.1002/spy2.408

N. Khan, M. Haroon, and M. Husain, "Intelligent hybrid tourist recommendations: Unifying data analysis and machine learning," in Recent Advances in Computational Intelligence and Cyber Security: The Int. Conf. Comput. Intell. Cyber Security, CRC Press, Jul. 2024, p. 1. Available from: http://dx.doi.org/10.1109/InCIT50588.2020.9310777

P. Kumar, G. P. Gupta, and R. Tripathi, "A review on intrusion detection systems and cyber threat intelligence for secure IoT-enabled networks: challenges and directions," in Big Data Analytics in Fog-Enabled IoT Networks, pp. 51–76, 2023. Available from: http://dx.doi.org/10.1201/9781003264545-3

W. Strielkowski, A. Vlasov, K. Selivanov, K. Muraviev, and V. Shakhnov, "Prospects and challenges of the machine learning and data-driven methods for the predictive analysis of power systems: A review," Energies, vol. 16, no. 10, p. 4025, 2023. Available from: http://dx.doi.org/10.3390/en16104025

M. Haroon, Z. A. Siddiqui, M. Husain, A. Ali, and T. Ahmad, "A proactive approach to fault tolerance using predictive machine learning models in distributed systems," Int. J. Exp. Res. Rev., vol. 44, pp. 208–220, 2024. Available from: https://doi.org/10.52756/ijerr.2024.v44spl.018

M. Khan and M. Haroon, "Artificial neural network-based intrusion detection in cloud computing using CSE-CIC-IDS2018 datasets," in Proc. 3rd Asian Conf. Innov. Technol. (ASIANCON), Aug. 2023, pp. 1–4. Available from: http://dx.doi.org/10.1109/ASIANCON58793.2023.10269948

M. Alalhareth and S. C. Hong, "An adaptive intrusion detection system in the Internet of Medical Things using fuzzy-based learning," Sensors, vol. 23, no. 22, p. 9247, 2023. Available from: http://dx.doi.org/10.3390/s23229247

R. Arthi, S. Krishnaveni, and S. Zeadally, "An intelligent SDN-IoT enabled intrusion detection system for healthcare systems using a hybrid deep learning and machine learning approach," China Commun., 2024. Available from: http://dx.doi.org/10.23919/JCC.ja.2022-0681

N. Khan and M. Haroon, "Trends and techniques used in tourist recommender system: A review," unpublished, 2023. Available from: http://dx.doi.org/10.32628/CSEIT23902105

A. Odeh and A. Abu Taleb, "Ensemble-based deep learning models for enhancing IoT intrusion detection," Appl. Sci., vol. 13, no. 21, p. 11985, 2023. Available from: http://dx.doi.org/10.3390/app132111985

S. M. Muzammal, R. K. Murugesan, and N. Z. Jhanjhi, "A comprehensive review on secure routing in internet of things: Mitigation methods and trust-based approaches," IEEE Internet Things J., vol. 8, no. 6, pp. 4186–4210, 2020. Available from: https://doi.org/10.1109/JIOT.2020.3031162

H. Li, M. B. Kaleem, Z. Liu, Y. Wu, W. Liu, and Z. Huang, "IoB: Internet-of-batteries for electric vehicles–architectures, opportunities, and challenges," Green Energy Intelligent Transp., p. 100128, 2023. Available from: http://dx.doi.org/10.1016/j.geits.2023.100128

M. Khalid, "Energy 4.0: AI-enabled digital transformation for sustainable power networks," Comput. Ind. Eng., p. 110253, 2024. Available from: https://doi.org/10.1016/j.cie.2024.110253

Downloads

Published

2025-01-02

How to Cite

[1]
Anjum Ahsan, Parvez Rauf, and Mohd Haroon, “Deep Learning-Driven Optimized Approaches for Network Anomaly Detection in IoT-Enabled Cloud Ecosystems: A Comprehensive Review”, IJIRCST, vol. 13, no. 1, pp. 12–18, Jan. 2025.

Issue

Section

Articles

Similar Articles

1 2 3 4 5 6 7 8 9 > >> 

You may also start an advanced similarity search for this article.