A Deep Learning Driven Cloud Edge Intelligence Framework for Real-Time Big Data Based Cyber-Security Threat Detection

Authors

  • Dr. Abdinasir Ismael Hashi Somali National University
  • Abdirizak Mohamed Hashi Jazeera university

DOI:

https://doi.org/10.47941/ijce.3447

Keywords:

Cloud–Edge Intelligence, Cyber-security, Deep Learning, Intrusion Detection, Big Data Analytics

Abstract

Purpose: This paper proposes a Secure Unified Data Model (UDM) Approach that enhances data security, trust, and reliability in Cyber-Physical Systems (CPS) by addressing data security risks such as breaches and unauthorized access.

Methodology: The methodology involved several steps. Reviewing existing literature to understand the current state of data modeling in Cyber-Physical Systems (CPS) and identify potential vulnerabilities. Supported by threat modeling and risk assessment frameworks, it analyzed data security risks for the Unified Data Model (UDM) in CPS. The focus was on protecting the UDM through strong encryption, access controls, security training, and regular assessments, safeguarding data at rest and in transit.

Findings: The findings show that a Secure Unified Data Model (UDM) approach improves data security in Cyber-Physical Systems (CPS) by strengthening access controls, encryption, and anomaly detection, thereby increasing CPS resilience against cyber threats. This promotes adoption in healthcare, smart cities, and governance. The secure UDM in CPS lowers breach risks, protects vendors and organizations, and offers scalable solutions that enhance productivity and reduce analytics costs. It supports safe data visualization, Business Intelligence (BI), and Artificial Intelligence (AI) tools, with potential applications in law enforcement for secure information sharing. The Secure UDM boosts trust, reliability, and compliance with data protection laws, encouraging adoption and innovation in critical sectors.

Unique Contribution to Theory, Practice and Policy: involves developing a conceptual Secure UDM framework that combines access controls, encryption, and anomaly detection for CPS. It also enhances understanding of UDM security in CPS contexts. Practically, this study provides actionable strategies for implementing secure UDMs across sectors such as healthcare, smart cities, and governance, thereby improving data security and trust in CPS through practical mitigation measures. Policy-wise, the study informs data protection regulations and standards for CPS and UDMs and encourages the adoption of secure UDM practices in critical sectors.

Downloads

Download data is not yet available.

References

1. Sundaramurthy, Senthil Kumar, Nischal Ravichandran, Anil Chowdary Inaganti, and Rajendra Muppalaneni. "AI-Driven Threat Detection: Leveraging Machine Learning for Real-Time Cybersecurity in Cloud Environments." Artificial Intelligence and Machine Learning Review 6, no. 1 (2025): 23-43.

2. Ofoegbu, Kingsley David Onyewuchi, Olajide Soji Osundare, Chidiebere Somadina Ike, Ololade Gilbert Fakeyede, and Adebimpe Bolatito Ige. "Real-Time Cybersecurity threat detection using machine learning and big data analytics: A comprehensive approach." Computer Science & IT Research Journal 4, no. 3 (2024).

3. Dey, Saswata, Writuraj Sarma, and Sundar Tiwari. "Deep learning applications for real-time cybersecurity threat analysis in distributed cloud systems." World Journal of Advanced Research and Reviews 17, no. 3 (2023): 1044-1058.

4. Ameedeen, Mohamed Ariff, Rula A. Hamid, Theyazn HH Aldhyani, Laith Abdul Khaliq Mohammed Al-Nassr, Sunday Olusanya Olatunji, and Priyavahani Subramanian. "A framework for automated big data analytics in cybersecurity threat detection." Mesopotamian Journal of Big Data 2024 (2024): 175-184.

5. Jha, Krishna Madhav, Varun Bodepudi, Suneel Babu Boppana, Niharika Katnapally, Srinivasa Rao Maka, and Manikanth Sakuru. "Deep Learning-Enabled Big Data Analytics for Cybersecurity Threat Detection in ERP Ecosystems." (2023).

6. Santhadevi, D., and B. Janet. "Stacked deep learning framework for edge-based intelligent threat detection in IoT network." The Journal of Supercomputing 79, no. 11 (2023): 12622-12655.

7. Andrés, Pereira, Ivanov Nikolai, and Wang Zhihao. "Real-Time AI-Based Threat Intelligence for Cloud Security Enhancement." Innovative: International Multi-disciplinary Journal of Applied Technology 3, no. 3 (2025): 36-54.

8. Sarker, Iqbal H. "Machine learning for intelligent data analysis and automation in cybersecurity: current and future prospects." Annals of Data Science 10, no. 6 (2023): 1473-1498.

9. Biswas, Shaikat. "Artificial Intelligence–Enhanced Cybersecurity Frameworks for Real-Time Threat Detection In Cloud And Enterprise." ASRC Procedia: Global Perspectives in Science and Scholarship 1, no. 01 (2025): 737-770.

10. Kumar, Busireddy Hemanth, Sai Teja Nuka, Murali Malempati, Harish Kumar Sriram, Someshwar Mashetty, and Sathya Kannan. "Big Data in Cybersecurity: Enhancing Threat Detection with AI and ML." Metallurgical and Materials Engineering 31, no. 3 (2025): 12-20.

11. Sivaprasad Yerneni, K., A. Ravi Teja, K. Sri Harsha, and Y. Naresh Kiran Kumar Reddy. "Towards Proactive Cloud Security: A Survey on ML and Deep Learning-Based Intrusion Detection Systems." J Contemp Edu Theo Artific Intel: JCETAI-116 (2025).

12. Okafor, Maureen Oluchukwuamaka. "Deep learning in cybersecurity: Enhancing threat detection and response." World Journal of Advanced Research and Reviews 24, no. 3 (2024): 1116-1132.

13. Sarker, Iqbal H. "Deep cybersecurity: a comprehensive overview from neural network and deep learning perspective." SN Computer Science 2, no. 3 (2021): 154.

14. Okoli, Ugochukwu Ikechukwu, Ogugua Chimezie Obi, Adebunmi Okechukwu Adewusi, and Temitayo Oluwaseun Abrahams. "Machine learning in cybersecurity: A review of threat detection and defense mechanisms." World Journal of Advanced Research and Reviews 21, no. 1 (2024): 2286-2295.

15. Khaleel, Yahya Layth, Mustafa Abdulfattah Habeeb, A. S. Albahri, Tahsien Al-Quraishi, O. S. Albahri, and A. H. Alamoodi. "Network and cybersecurity applications of defense in adversarial attacks: A state-of-the-art using machine learning and deep learning methods." Journal of Intelligent Systems 33, no. 1 (2024): 20240153.

16. Tirulo, Aschalew, Siddhartha Chauhan, and Kamlesh Dutta. "Machine learning and deep learning techniques for detecting and mitigating cyber threats in IoT-enabled smart grids: a comprehensive review." International Journal of Information and Computer Security 24, no. 3-4 (2024): 284-321.

17. https://www.xenonstack.com/blog/deep-learning-in-cybersecurity

18. Santhadevi, D., and B. Janet. "Stacked deep learning framework for edge-based intelligent threat detection in IoT network." The Journal of Supercomputing 79, no. 11 (2023): 12622-12655.

19. Vankayalapati, Ravi Kumar. "Unifying Edge and Cloud Computing: A Framework for Distributed AI and Real-Time Processing." Available at SSRN 5048827 (2023).

20. Lilhore, Umesh Kumar, Sarita Simaiya, Yogesh Kumar Sharma, Anjani Kumar Rai, S. M. Padmaja, Khan Vajid Nabilal, Vimal Kumar, Roobaea Alroobaea, and Hamed Alsufyani. "Cloud-edge hybrid deep learning framework for scalable IoT resource optimization." Journal of Cloud Computing 14, no. 1 (2025): 5.

21. Cao, Zhigang, Bo Liu, Dongzhan Gao, Ding Zhou, Xiaopeng Han, and Jiuxin Cao. "A Dynamic Spatiotemporal Deep Learning Solution for Cloud–Edge Collaborative Industrial Control System Distributed Denial of Service Attack Detection." Electronics 14, no. 9 (2025): 1843.

22. Awan, Kamran Ahmad, Ikram Ud Din, Ahmad Almogren, Ali Nawaz, Muhammad Yasar Khan, and Ayman Altameem. "SecEdge: A novel deep learning framework for real-time cybersecurity in mobile IoT environments." Heliyon 11, no. 1 (2025).

23. Khalaf, Noora Zidan, Israa Ibraheem Al Barazanchi, A. D. Radhi, Sushma Parihar, Pritesh Shah, and Ravi Sekhar. "Development of real-time threat detection systems with AI-driven cybersecurity in critical infrastructure." Mesopotamian Journal of CyberSecurity 5, no. 2 (2025): 501-513.

24. Hussen, Noha, Sally M. Elghamrawy, Mofreh Salem, and Ali I. El-Desouky. "A fully streaming big data framework for cyber security based on optimized deep learning algorithm." IEEE Access 11 (2023): 65675-65688.

25. Malik, Anum, Kaleem Arshid, Nooruddin Noonari, and Rizwan Munir. "Artificial Intelligence-Driven Cybersecurity Framework Using Machine Learning for Advanced Threat Detection and Prevention." Sch J Eng Tech 6 (2025): 401-423.

26. Farzaan, Mohammed AM, Mohamed Chahine Ghanem, Ayman El-Hajjar, and Deepthi N. Ratnayake. "AI-powered system for an efficient and effective cyber incidents detection and response in cloud environments." IEEE Transactions on Machine Learning in Communications and Networking (2025).

27. Ezeh Ebere, M., and T. C. Asogwa. "A DEEP LEARNING FRAMEWORK FOR REAL-TIME CYBER THREAT DETECTION AND MITIGATION IN NETWORKED ENVIRONMENTS." International Journal Of Real-Time Applications And Computing Systems 4, no. 1 (2025).

28. Adeniyi, Olusola, Ali Safaa Sadiq, Prashant Pillai, Mohammad Aljaidi, and Omprakash Kaiwartya. "Securing mobile edge computing using hybrid deep learning method." Computers 13, no. 1 (2024): 25.

29. Sathupadi, Kaushik, Sandesh Achar, Shinoy Vengaramkode Bhaskaran, Nuruzzaman Faruqui, M. Abdullah-Al-Wadud, and Jia Uddin. "Edge-cloud synergy for AI-enhanced sensor network data: A real-time predictive maintenance framework." Sensors 24, no. 24 (2024): 7918.

30. Areghan, Edoise, and Osondu Onwuegbuchi. "Predictive Cyber Threat Analysis in Cloud Platforms Using Artificial Intelligence and Machine Learning Algorithms." Applied Sciences, Computing, and Energy 1, no. 1 (2024): 197-205.

31. Saxena, Deepika, Ishu Gupta, Rishabh Gupta, Ashutosh Kumar Singh, and Xiaoqing Wen. "An AI-driven VM threat prediction model for multi-risks analysis-based cloud cybersecurity." IEEE Transactions on Systems, Man, and Cybernetics: Systems 53, no. 11 (2023): 6815-6827.

32. Al-Ghuwairi, Abdel-Rahman, Yousef Sharrab, Dimah Al-Fraihat, Majed AlElaimat, Ayoub Alsarhan, and Abdulmohsen Algarni. "Intrusion detection in cloud computing based on time series anomalies utilizing machine learning." Journal of Cloud Computing 12, no. 1 (2023): 127.

33. Tyagadurgam, Mukund Sai Vikram, Venkataswamy Naidu Gangineni, Sriram Pabbineedi, Mitra Penmetsa, Jayakeshav Reddy Bhumireddy, and Rajiv Chalasani. "Designing an Intelligent Cybersecurity Intrusion Identify Framework Using Advanced Machine Learning Models in Cloud Computing." Universal Library of Engineering Technology Issue (2022).

34. https://www.kaggle.com/datasets/chethuhn/network-intrusion-dataset

35. Khan, Attiya, Muhammad Rizwan, Ovidiu Bagdasar, Abdulatif Alabdulatif, Sulaiman Alamro, and Abdullah Alnajim. "Deep Learning-Driven Anomaly Detection for IoMT-Based Smart Healthcare Systems." CMES-Computer Modeling in Engineering & Sciences 141, no. 3 (2024).

36. Ni, C., and S. C. Li. "Machine learning enabled Industrial IoT Security: Challenges, Trends and Solutions. Journal of Industrial Information Integration." (2024).

37. Saini, Dinesh Kumar, Krishan Kumar, and Punit Gupta. "[Retracted] Security Issues in IoT and Cloud Computing Service Models with Suggested Solutions." Security and Communication Networks 2022, no. 1 (2022): 4943225.

38. Kilichev, Dusmurod, Dilmurod Turimov, and Wooseong Kim. "Next–generation intrusion detection for iot evcs: Integrating cnn, lstm, and gru models." Mathematics 12, no. 4 (2024): 571

39. Deore, Bhushan, and Surendra Bhosale. "Hybrid optimization enabled robust CNN-LSTM technique for network intrusion detection." Ieee Access 10 (2022): 65611-65622

40. Imrana, Yakubu, Yanping Xiang, Liaqat Ali, Adeeb Noor, Kwabena Sarpong, and Muhammed Amin Abdullah. "CNN-GRU-FF: a double-layer feature fusion-based network intrusion detection system using convolutional neural network and gated recurrent units." Complex & Intelligent Systems 10, no. 3 (2024): 3353-3370.

41. Noor, Ayman. "Cloud-Based Deep Learning for Real-Time URL Anomaly Detection: LSTM/GRU and CNN/LSTM Models." Comput. Syst. Sci. Eng 49 (2025): 259-286

42. Afraji, Doaa Mohsin Abd Ali, Jaime Lloret, and Lourdes Peñalver. "An Integrated Hybrid Deep Learning Framework for Intrusion Detection in IoT and IIoT Networks Using CNN-LSTM-GRU Architecture." Computation 13, no. 9 (2025): 222.

43. Dini, Pierpaolo, and Sergio Saponara. "Analysis, design, and comparison of machine-learning techniques for networking intrusion detection." Designs 5, no. 1 (2021): 9.

44. Dini, Pierpaolo, Andrea Begni, Stefano Ciavarella, Emiliano De Paoli, Giuseppe Fiorelli, Carmelo Silvestro, and Sergio Saponara. "Design and testing novel one-class classifier based on polynomial interpolation with application to networking security." IEEE Access 10 (2022): 67910-67924.

45. Santhadevi, D., and B. Janet. "Stacked deep learning framework for edge-based intelligent threat detection in IoT network." The Journal of Supercomputing 79, no. 11 (2023): 12622-12655.

46. Akinbolaji, TAIWO JOSEPH. "Advanced integration of artificial intelligence and machine learning for real-time threat detection in cloud computing environments." Iconic Research and Engineering Journals 6, no. 10 (2024): 980-991.

47. Farzaan, Mohammed AM, Mohamed Chahine Ghanem, Ayman El-Hajjar, and Deepthi N. Ratnayake. "AI-powered system for an efficient and effective cyber incidents detection and response in cloud environments." IEEE Transactions on Machine Learning in Communications and Networking (2025).

48. Ethan, Amelia, and Motohisa Osaka. "Deep Learning-Powered Cyber Threat Intelligence for Multi-Cloud Environments." (2024).

Downloads

Published

2026-01-15

How to Cite

Hashi, A. I., & Hashi, A. M. (2026). A Deep Learning Driven Cloud Edge Intelligence Framework for Real-Time Big Data Based Cyber-Security Threat Detection. International Journal of Computing and Engineering, 8(1), 13–44. https://doi.org/10.47941/ijce.3447

Issue

Section

Articles