Abstract
The emergence of data today requires the enhancement of cybersecurity due to the importance and sensitivity of the information contained in data. Therefore, Cloud Computing is a new model that has made it convenient to distribute and store data because of its distinctive characteristics. Security, though, is a major worry for cloud services due to the various risks they confront regularly, which increases the danger of losing consumer trust. In this regard, many tools have been used to secure Cloud. Recently, Intrusion Detection System (IDS) is a frequently used security tool because of its effectiveness. But when confronted with an important volume and variety of network data, the current IDS might show overfitting, poor classification accuracy (ACC) and high rates of false positives (FPR). Then to develop IDS, studies used new technologies like Machine Learning, Deep Learning and Ensemble Learning. In this article to mitigate the above problems the used datasets are preprocessed with Min–Max normalization and dummies function. Furthermore, this model is built on the Radial Basis Function Neural Network (RBFNN) and AdaBoost approaches for anomaly detection. In particular, the RBFNN classifier has been added to boost detection precision and support effective decision-making, while the AdaBoost is employed to improve feature selection and training. In addition, the principal idea is to mention the impact of integrating feature selection. To demonstrate this, we give a comparison between the two models. In the first one, we directly apply RBFNN after preprocessing data, in the second one, we integer AdaBoost for feature selection, then we apply RBFNN for prediction. Finally, the NSL-KDD and CICIDS2017 datasets are used in the trials. Our suggested idea achieves 99.7% and 99.5% ACC, 0.6% and 0.18% FPR, respectively. The results produced using AdaBoost for feature selection have demonstrated that our suggested concept is more effective than utilizing RBFNN directly also it performs well compared with the other studies.










Similar content being viewed by others
Data Availability
Available on the request.
References
Ahmad W, Rasool A, Javed AR, Baker T, Jalil Z. Article cyber security in IoT-Based cloud computing: a comprehensive survey. Electronics. 2022;11:16.
Belal MM, Sundaram DM. Comprehensive review on intelligent security defenses in the cloud: taxonomy, security issues, ML/DL techniques, challenges and future trends. J King Saud Univ Comput Inform Sci. 2022;34:9102–31.
Velde V, Mandala SK, Vurukonda N, Ramesh D. WITHDRAWN: enterprise-based data deployment inference methods in cloud infrastructure. Mater Today. 2021.
Azrour M, Mabrouki J, Guezzaz A, Kanwal A. Internet of things security: challenges and key issues, Security and Communication Networks, 2021.
Maray M, Shuja J. Computation offloading in mobile cloud computing and mobile edge computing: survey, taxonomy, and open issues. Mob Inf Syst. 2022;2022:1121822.
Mayuranathan M, Murugan M, Dhanakoti V. Best features based intrusion detection system by RBM model for detecting DDoS in cloud environment. Springer. 2019.
Pallathadka P, Sajja G, Phasinam K, Ritonga M, Naved M, Bansal R, Quiñonez-Choquecota J. An investigation of various applications and related challenges in cloud computing. Materialstoday. 2022;51:2245–8.
Catillo M, Pecchia A, Villano U. A deep learning method for lightweight and cross-device IoT botnet detection. MDPI J. 2022;13:837.
Khraisat A, Gondal I, Vamplew P, Kamruzzaman J. Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity. 2019;2:1–22.
Halbouni A, Gunawan TS, Habaebi MH, Halbouni M, Kartiwi M, Ahmad R. Machine learning and deep learning approaches for CyberSecurity: a review. IEEE Access. 2022;10:19572–85.
AlRazib M, Javeed D, Khan MT, Alkanhel R, Muthanna MSA. Cyber threats detection in smart environments using SDN-Enabled DNN-LSTM Hybrid framework. IEEE Access. 2022;10:53015–26.
Guezzaz A, Asimi Y, Azrour M, Asimi A. Mathematical validation of proposed machine learning classifier for heterogeneous traffic and anomaly detection. Big Data Min Analy. 2021;4:18–24.
Guezzaz A, Asimi A, Tbatou Z, Asimi Y, Sadqi Y. A global intrusion detection system using pcapsocks sniffer and multilayer perceptron classifier. Int J Network Secur. 2019;21(3):438–50.
Guezzaz A, Asimi A, Asimi Y, Azrour M, Benkirane S. A distributed intrusion detection approach based on machine learning techniques for cloud security. Intelligent systems in big data, semantic web and machine learning. Adv Intell Syst Comput. 2021;1344:85–94.
Nassif AB, Talib MA, Nasir Q, Albadani H, Dakalbab FM. Machine learning for cloud security: a systematic review. IEEE Access. 2021;9:20717–35.
Singh A, Chatterjee K. Cloud security issues and challenges: a survey. J Netw Comput Appl. 2016;79:88–115.
Mollah MB, Azad MAK, Vasilakos A. Security and privacy challenges in mobile cloud computing: survey and way ahead. J Netw Comput Appl. 2017;84:38–54.
Brohi SN, Bamiah MA. Challenges and benefits for adopting the paradigm of cloud computing. Int J Adv Eng Sci Technol. 2011;8:286–90.
Chiba Z, Abghour N, Moussaid K, El Omri A, Rida M. A cooperative and hybrid network intrusion detection framework in cloud computing based SNORT and optimized back propagation neural network. Procedia Comput Sci. 2016;83:1200–6.
Patil K, Desai B. Leveraging LLM for zero-day exploit detection in cloud networks. Asian Am Res Lett J. 2024;1:1.
Azzedin F, Suwad H, Rahman MM. An asset-based approach to mitigate zero-day ransomware attacks. Comput Mater Continua. 2022;73:1.
Ahmad R, Alsmadi I, Alhamdani W, Tawalbeh LA. Zero-day attack detection: a systematic literature review. Artif Intell Rev. 2023;56:10733–811.
Khan ZA, Namin AS. A survey of DDOS attack detection techniques for IoT systems using BlockChain technology. Electronics. 2022;11:3892.
Arthi K, Kumarand MR, Bhagyashree B. A novel method to monitor threats in cloud computing environment. Int J Comput Trends Technol. 2017.
Guezzaz A, Asimi A, Asimi Y, Tbatou Z, Sadqi Y. A lightweight neural classifier for intrusion detection. Gen Lett Math. 2017;2(2):57–66.
Baniasadi S, Rostami O, Martín D, Kaveh M. A novel deep supervised learning-based approach for intrusion detection in IoT systems. Sensors. 2022;22:4459.
Butt UA, Mehmood M, Shah SBH, Amin R, Shaukat MW, Raza SM, Suh DY, Piran MJ. A review of machine learning algorithms for cloud computing security. Electronics. 2020;9:1379.
Panker T, Nissim N. Leveraging malicious behavior traces from volatile memory using machine learning methods for trusted unknown malware detection in Linux cloud environments. Knowl Based Syst. 2021.
Xiao Y, Xing C, Zhang T, Zhao Z. An intrusion detection model based on feature reduction and convolutional neural networks. IEEE Access. 2019;7:42210–9.
Jiang F, Fu Y, Gupta BB, Liang Y, Rho S, Lou F, Meng F, Tian Z. Deep learning based multi-channel intelligent attack detection for data security. IEEE Trans Sustain Comput. 2020;5(2):204–12.
Tian Q, Han D, Li KC, Liu X, Duan L, Castiglione A. An intrusion detection approach based on improved deep belief network. Appl Intell. 2020;50:3162–78.
Mohy-eddine M, Guezzaz A, Benkirane S, et al. An effective intrusion detection approach based on ensemble learning for IIoT edge computing. J Comput Virol Hacking Tech. 2022;19:469–81.
Guezzaz A, Azrour M, Benkirane S, Mohyeddine M, Attou H, Douiba M. A Lightweight hybrid intrusion detection framework using machine learning for edge-based IIoT security. Int Arab J Infor Technol. 2022;19(5):822–30.
Mohy-eddine M, Guezzazand A, Benkirane S. An efficient network intrusion detection model for IoT security using K-NN classifier and feature selection. Multimed Tools Appl. 2023;82:23615–33.
Hazman C, Guezzaz A, Benkirane S, Azrour M. IDS-SIoEL: intrusion detection framework for IoT-based smart environments security using ensemble learning. Clust Comput. 2022;26:4069–83.
Douiba M, Benkirane S, Guezzaz A, Azrour M. An improved anomaly detection model for IoT security using decision tree and gradient boosting. J Supercomput. 2022;79:3392–411.
Attou H, Guezzaz A, Benkirane S, Azrour M, Farhaoui Y. Cloud-based intrusion detection approach using machine learning techniques. Big Data Min Anal. 2023;6:311–20.
Marwan M, Kartit A, Ouahmane H. Security enhancement in healthcare cloud using machine learning. Procedia Comput Sci. 2018;127:388–97.
Gao X, Hu C, Shan C, Liu B, Niu Z, Xie H. Malware classification for the cloud via semi-supervised transfer learning. J Infor Secur Appl. 2020;55: 102661.
Abusitta A, Bellaiche M, Dagenais M, Halabi T. A deep learning approach for proactive multi-cloud cooperative intrusion detection system. Futur Gener Comput Syst. 2019;98:308–18.
Kim H, Kim J, Kim Y, Kim I, Kim KJ. Design of network threat detection and classification based on machine learning on cloud computing. Clust Comput. 2018;22:2341–50.
Jaber AN, Rehman SU. FCM–SVM based intrusion detection system for cloud computing. Clust Comput. 2020;23:1–11.
Samriya JK, Kumar N. A novel intrusion detection system using hybrid clustering-optimization approach in cloud computing. Mater Today. 2020;2(1):23–54.
Funding
This study was not funded and without financially supporting. We did this research work as academic researchers of computer sciences at university.
Author information
Authors and Affiliations
Contributions
Hanaa Attouis the main author that manages the contribution and gives the detailed description of the model. AzidineGuezzaz writes the abstract, introduction and analyzes the related works section. Said Benkirane evaluates the results obtained from implementation and drowing the figures. MouradeAzrour participates in implementation of the model prepared the final manuscript and corrected the English language.
Corresponding author
Ethics declarations
Conflict of interest
Our work has not been funded and without financially supporting. We declare that we have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Attou, H., Guezzaz, A., Benkirane, S. et al. A New Secure Model for Cloud Environments Using RBFNN and AdaBoost. SN COMPUT. SCI. 6, 188 (2025). https://doi.org/10.1007/s42979-025-03691-1
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s42979-025-03691-1