ARCHIVES

Original Article

Cloud Shield IDS: Design and Evaluation of a Real-Time AI- Powered Intrusion Detection System Using XG Boost and Cloud Integration

Indhushree S1 Elanthamil G. P2 Fathima Mehin3 Jeevanthraj P4 Fathima Jemima P5
1 2 3 4 Department of Computer Science and Engineering (Cyber Security), United Institute of Technology, Coimbatore, Tamil Nadu, India 5 Teaching Assistant (TA), Department of Computer Science and Engineering (Cyber Security), United Institute of Technology, Coimbatore, Tamil Nadu, India.

Published Online: May-August 2026

Pages: 64-71

References

1. Bace, R., & Mell, P. (2001). NIST Special Publication on Intrusion Detection Systems (SP 800-31). National Institute of Standards and
Technology.
2. Chen, T., & Guestrin, C. (2016). XGBoost: A Scalable Tree Boosting System. Proceedings of the 22nd ACM SIGKDD International
Conference on Knowledge Discovery and Data Mining, 785–794.
3. Cisco Talos (2024). Snort: Open Source Intrusion Prevention System. Retrieved from https://www.snort.org/
4. IBM Security (2023). Cost of a Data Breach Report 2023. IBM Corporation.
5. Javaid, A., Niyaz, Q., Sun, W., & Alam, M. (2016). A Deep Learning Approach for Network Intrusion Detection System. Proceedings of the
9th EAI International Conference on Bio-inspired Information and Communications Technologies.
6. Kim, J., Kim, J., Thu, H. L. T., & Kim, H. (2016). Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection.
2016 International Conference on Platform Technology and Service, 1–5.
7. Liao, H. J., Lin, C. H. R., Lin, Y. C., & Tung, K. Y. (2013). Intrusion Detection System: A Comprehensive Review. Journal of Network and
Computer Applications, 36(1), 16–24.
8. Open Information Security Foundation (2024). Suricata Open Source IDS/IPS. Retrieved from https://suricata.io/
9. Roesch, M. (1999). Snort: Lightweight Intrusion Detection for Networks. Proceedings of USENIX LISA, 229–238.
10. Sallay, H., Al-Shalfan, K., & Otaibi, M. (2011). A Scalable Distributed IDS Architecture for High-Speed Networks. International Journal of
Computer Networks, 3(2), 87–96.
11. Scarfone, K., & Mell, P. (2007). Guide to Intrusion Detection and Prevention Systems (IDPS). NIST Special Publication 800-94.
12. Supabase Inc. (2024). Supabase: The Open Source Firebase Alternative. Retrieved from https://supabase.com/
13. Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. A. (2009). A Detailed Analysis of the KDD CUP 99 Data Set. IEEE Symposium on
Computational Intelligence for Security and Defense Applications, 1–6.
14. Zhang, H., Li, J. L., Liu, X. M., & Dong, C. (2019). Multi-Dimensional Feature Fusion and Stacking Ensemble Mechanism for Network
Intrusion Detection. Future Generation Computer Systems, 122, 130–143.
15. Anthropic (2024). Claude AI: Large Language Model for Code Generation and Engineering Assistance. Retrieved from
https://www.anthropic.com/

Related Articles

2026

Artificial Intelligence in Learning and Teaching

2026

Admin Assist: An AI – Driven Configuration and Orchestration for Enterprise Application

2026

Enhancing Blood Group Identification using pigeon inspired optimization: An Innovative Approach

2026

Eco-Genius: Power Up Smart, Power Down Waste

2026

Crowd-Sourced Disaster Response and Rescue Assistant

2026

Unveiling Deepfake Detection Using Vision Transformers: A Survey and Experimental Study

Share Article

X
LinkedIn
Facebook
WhatsApp

Or copy link

https://test.indjcst.com/archives/10.59256/indjcst.20260502007

*Instagram doesn't support direct link sharing from web. Copy the link and share it in your Instagram story or post.