ARCHIVES
Original Article
Cloud Shield IDS: Design and Evaluation of a Real-Time AI- Powered Intrusion Detection System Using XG Boost and Cloud Integration
Indhushree S1
Elanthamil G. P2
Fathima Mehin3
Jeevanthraj P4
Fathima Jemima P5
1 2 3 4 Department of Computer Science and Engineering (Cyber Security), United Institute of Technology, Coimbatore, Tamil Nadu, India 5 Teaching Assistant (TA), Department of Computer Science and Engineering (Cyber Security), United Institute of Technology, Coimbatore, Tamil Nadu, India.
Published Online: May-August 2026
Pages: 64-71
Cite this article
↗ https://www.doi.org/10.59256/indjcst.20260502007References
1. Bace, R., & Mell, P. (2001). NIST Special Publication on Intrusion Detection Systems (SP 800-31). National Institute of Standards and
Technology.
2. Chen, T., & Guestrin, C. (2016). XGBoost: A Scalable Tree Boosting System. Proceedings of the 22nd ACM SIGKDD International
Conference on Knowledge Discovery and Data Mining, 785–794.
3. Cisco Talos (2024). Snort: Open Source Intrusion Prevention System. Retrieved from https://www.snort.org/
4. IBM Security (2023). Cost of a Data Breach Report 2023. IBM Corporation.
5. Javaid, A., Niyaz, Q., Sun, W., & Alam, M. (2016). A Deep Learning Approach for Network Intrusion Detection System. Proceedings of the
9th EAI International Conference on Bio-inspired Information and Communications Technologies.
6. Kim, J., Kim, J., Thu, H. L. T., & Kim, H. (2016). Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection.
2016 International Conference on Platform Technology and Service, 1–5.
7. Liao, H. J., Lin, C. H. R., Lin, Y. C., & Tung, K. Y. (2013). Intrusion Detection System: A Comprehensive Review. Journal of Network and
Computer Applications, 36(1), 16–24.
8. Open Information Security Foundation (2024). Suricata Open Source IDS/IPS. Retrieved from https://suricata.io/
9. Roesch, M. (1999). Snort: Lightweight Intrusion Detection for Networks. Proceedings of USENIX LISA, 229–238.
10. Sallay, H., Al-Shalfan, K., & Otaibi, M. (2011). A Scalable Distributed IDS Architecture for High-Speed Networks. International Journal of
Computer Networks, 3(2), 87–96.
11. Scarfone, K., & Mell, P. (2007). Guide to Intrusion Detection and Prevention Systems (IDPS). NIST Special Publication 800-94.
12. Supabase Inc. (2024). Supabase: The Open Source Firebase Alternative. Retrieved from https://supabase.com/
13. Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. A. (2009). A Detailed Analysis of the KDD CUP 99 Data Set. IEEE Symposium on
Computational Intelligence for Security and Defense Applications, 1–6.
14. Zhang, H., Li, J. L., Liu, X. M., & Dong, C. (2019). Multi-Dimensional Feature Fusion and Stacking Ensemble Mechanism for Network
Intrusion Detection. Future Generation Computer Systems, 122, 130–143.
15. Anthropic (2024). Claude AI: Large Language Model for Code Generation and Engineering Assistance. Retrieved from
https://www.anthropic.com/
Technology.
2. Chen, T., & Guestrin, C. (2016). XGBoost: A Scalable Tree Boosting System. Proceedings of the 22nd ACM SIGKDD International
Conference on Knowledge Discovery and Data Mining, 785–794.
3. Cisco Talos (2024). Snort: Open Source Intrusion Prevention System. Retrieved from https://www.snort.org/
4. IBM Security (2023). Cost of a Data Breach Report 2023. IBM Corporation.
5. Javaid, A., Niyaz, Q., Sun, W., & Alam, M. (2016). A Deep Learning Approach for Network Intrusion Detection System. Proceedings of the
9th EAI International Conference on Bio-inspired Information and Communications Technologies.
6. Kim, J., Kim, J., Thu, H. L. T., & Kim, H. (2016). Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection.
2016 International Conference on Platform Technology and Service, 1–5.
7. Liao, H. J., Lin, C. H. R., Lin, Y. C., & Tung, K. Y. (2013). Intrusion Detection System: A Comprehensive Review. Journal of Network and
Computer Applications, 36(1), 16–24.
8. Open Information Security Foundation (2024). Suricata Open Source IDS/IPS. Retrieved from https://suricata.io/
9. Roesch, M. (1999). Snort: Lightweight Intrusion Detection for Networks. Proceedings of USENIX LISA, 229–238.
10. Sallay, H., Al-Shalfan, K., & Otaibi, M. (2011). A Scalable Distributed IDS Architecture for High-Speed Networks. International Journal of
Computer Networks, 3(2), 87–96.
11. Scarfone, K., & Mell, P. (2007). Guide to Intrusion Detection and Prevention Systems (IDPS). NIST Special Publication 800-94.
12. Supabase Inc. (2024). Supabase: The Open Source Firebase Alternative. Retrieved from https://supabase.com/
13. Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. A. (2009). A Detailed Analysis of the KDD CUP 99 Data Set. IEEE Symposium on
Computational Intelligence for Security and Defense Applications, 1–6.
14. Zhang, H., Li, J. L., Liu, X. M., & Dong, C. (2019). Multi-Dimensional Feature Fusion and Stacking Ensemble Mechanism for Network
Intrusion Detection. Future Generation Computer Systems, 122, 130–143.
15. Anthropic (2024). Claude AI: Large Language Model for Code Generation and Engineering Assistance. Retrieved from
https://www.anthropic.com/
Related Articles
2026
Artificial Intelligence in Learning and Teaching
2026
Admin Assist: An AI – Driven Configuration and Orchestration for Enterprise Application
2026
Enhancing Blood Group Identification using pigeon inspired optimization: An Innovative Approach
2026
Eco-Genius: Power Up Smart, Power Down Waste
2026
Crowd-Sourced Disaster Response and Rescue Assistant
2026