Performance Evaluation of Anomaly-Based Detection Approaches for Zero-Day Attack Early Warning in Cloud Infrastructure

Main Article Content

Xiaoyi Long

Abstract

The escalating sophistication of zero-day attacks poses unprecedented challenges to cloud infrastructure security, necessitating advanced detection mechanisms beyond traditional signature-based approaches. This paper presents a comprehensive performance evaluation of anomaly-based detection approaches specifically designed for early warning of zero-day attacks in cloud environments. We systematically analyze multiple detection strategies leveraging multi-source telemetry data, including network traffic patterns, system call sequences, and resource usage metrics. Through extensive experimentation on a realistic cloud infrastructure testbed using synthesized attack scenarios, we compare statistical-, machine learning-, and ensemble-based detection approaches across critical performance dimensions, including detection accuracy, false positive rates, and detection timeliness. Our evaluation reveals significant trade-offs among approaches, with ensemble methods achieving a recall (TPR) of 94.7% while maintaining a false positive rate of 0.20%. The findings provide actionable insights for cloud service providers seeking to optimize their zero-day threat detection capabilities.

Article Details

Section

Articles

How to Cite

Performance Evaluation of Anomaly-Based Detection Approaches for Zero-Day Attack Early Warning in Cloud Infrastructure. (2026). Journal of Science, Innovation & Social Impact, 2(1), 341-352. https://sagespress.com/index.php/JSISI/article/view/115

References

1. W. Ma, Y. Li, S. Lan, W. Wang, W. Huang, and W. Zhu, “Semantic-aware normalizing flow with feature fusion for image anomaly detection,” Neurocomputing, vol. 590, Art. no. 127728, 2024.

2. P. H. Barros, E. T. Chagas, L. B. Oliveira, F. Queiroz, and H. S. Ramos, “Malware-SMELL: A zero-shot learning strategy for detecting zero-day vulnerabilities,” Computers & Security, vol. 120, Art. no. 102785, 2022.

3. A. M. Abdallah, A. S. R. O. Alkaabi, G. B. N. D. Alameri, S. H. Rafique, N. S. Musa, and T. Murugan, “Cloud network anomaly detection using machine and deep learning techniques—recent research advancements,” IEEE Access, vol. 12, pp. 56749–56773, 2024.

4. S. F. Ahmed, M. S. B. Alam, M. Hassan, M. R. Rozbu, T. Ishtiak, N. Rafa, et al., “Deep learning modelling techniques: Current progress, applications, advantages, and challenges,” Artificial Intelligence Review, vol. 56, no. 11, pp. 13521–13617, 2023.

5. Y. Zhang, B. Suleiman, M. J. Alibasa, and F. Farid, “Privacy-aware anomaly detection in IoT environments using FedGroup: A group-based federated learning approach,” Journal of Network and Systems Management, vol. 32, no. 1, Art. no. 20, 2024.

6. M. Ahmad and A. Rehman, “Multi-source information fusion for anomaly detection in smart grids using federated learning,” Chinese Journal of Information Fusion, vol. 2, no. 2, pp. 157–170, 2025.

7. M. Hasnain, M. F. Pasha, I. Ghani, M. Imran, M. Y. Alzahrani, and R. Budiarto, “Evaluating trust prediction and confusion matrix measures for web services ranking,” IEEE Access, vol. 8, pp. 90847–90861, 2020.

8. P. Kumar, R. Kumar, G. P. Gupta, and R. Tripathi, “A distributed framework for detecting DDoS attacks in smart contract-based blockchain-IoT systems by leveraging fog computing,” Transactions on Emerging Telecommunications Technologies, vol. 32, no. 6, Art. no. e4112, 2021.

9. N. J. Patel and R. H. Jhaveri, “Trust based approaches for secure routing in VANET: A survey,” Procedia Computer Science, vol. 45, pp. 592–601, 2015.

10. D. Zhang and X. Ma, “Machine learning-based credit risk assessment for green bonds: Climate factor integration and default prediction analysis,” Journal of Sustainability, Policy, and Practice, vol. 1, no. 2, pp. 121–135, 2025.

11. A. Kang, Z. Li, and S. Meng, “AI-enhanced risk identification and intelligence sharing framework for anti-money laundering in cross-border income swap transactions,” Journal of Advanced Computing Systems, vol. 3, no. 5, pp. 34–47, 2023.

12. Z. Wang and A. Kang, “FTAFO: A federated transparent adaptive financial optimizer for reducing third-party dependencies in workflow management,” Journal of Science, Innovation & Social Impact, vol. 1, no. 1, pp. 329–339, 2025.

13. J. Zhang, “Evaluating machine learning approaches for sensitive data identification: A comparative study of NLP and rule-based methods,” Journal of Advanced Computing Systems, vol. 4, no. 7, pp. 26–38, 2024.

14. Y. Lei, “Adaptive privacy-preserving techniques for multimedia content processing in cloud environments: A differential privacy approach,” Journal of Science, Innovation & Social Impact, vol. 1, no. 1, pp. 278–293, 2025.

15. D. Zhang and E. Feng, “Quantitative assessment of regional carbon neutrality policy synergies based on deep learning,” Journal of Advanced Computing Systems, vol. 4, no. 10, pp. 38–54, 2024.

16. A. Kang, J. Xin, and X. Ma, “Anomalous cross-border capital flow patterns and their implications for national economic security: An empirical analysis,” Journal of Advanced Computing Systems, vol. 4, no. 5, pp. 42–54, 2024.

17. Z. Wang, “Retracted: Adaptive generation of medical education animations for enhanced health literacy: A personalization approach for diabetes, vaccination, and mental health communication,” Journal of Science, Innovation & Social Impact, vol. 1, no. 2, pp. 78–95, 2025.

18. J. Zhang, “A comparative evaluation of deep learning and ensemble algorithms for online payment fraud detection,” Journal of Science, Innovation & Social Impact, vol. 2, no. 1, pp. 164–177, 2026.

19. Y. Lei and Z. Wu, “A real-time detection framework for high-risk content on short video platforms based on heterogeneous feature fusion,” Pinnacle Academic Press Proceedings Series, vol. 3, pp. 93–106, 2025.

20. B. Dong, D. Zhang, and J. Xin, “Deep reinforcement learning for optimizing order book imbalance-based high-frequency trading strategies,” Journal of Computing Innovations and Applications, vol. 2, no. 2, pp. 33–43, 2024.

21. A. Kang, S. Min, and D. Yuan, “Comparative analysis of foreign exchange market shock transmission and recovery resilience among major economies under geopolitical conflicts: Evidence from the Russia-Ukraine crisis,” Journal of Computing Innovations and Applications, vol. 2, no. 1, pp. 46–61, 2024.

22. Z. Wang, “DeepMotionNet: AI-driven predictive animation state transitions for reducing perceptual latency in competitive FPS games,” in Proc. 6th Int. Conf. Computer Engineering and Application (ICCEA), Apr. 2025, pp. 1–8.

23. J. Zhang, “SecureCodeBERT: An AI-powered model for identifying and categorizing high-risk security vulnerabilities in PHP-based critical infrastructure applications,” Journal of Sustainability, Policy, and Practice, vol. 1, no. 4, pp. 80–94, 2025.

24. Y. Lei, “Intelligent prediction and dynamic scheduling optimization strategy for cloud computing resources under burst load scenarios,” in Proc. Int. Symp. Machine Learning and Social Computing, Oct. 2025, pp. 59–67.

25. T. K. Trinh and D. Zhang, “Algorithmic fairness in financial decision-making: Detection and mitigation of bias in credit scoring applications,” Journal of Advanced Computing Systems, vol. 4, no. 2, pp. 36–49, 2024.

26. Z. Li and Z. Wang, “Adaptive cross-cultural medical animation: Bridging language and context in AI-driven healthcare communication,” Artificial Intelligence and Machine Learning Review, vol. 5, no. 1, pp. 117–128, 2024.

27. R. Jia, J. Zhang, and J. Prescot, “An empirical study of large language models for threat intelligence analysis and incident response,” Journal of Computing Innovations and Applications, vol. 2, no. 1, pp. 99–110, 2024.

28. Y. Lei and V. Holloway, “Adaptive learning-enhanced convex optimization for energy-efficient cloud resource scheduling,” Journal of Advanced Computing Systems, vol. 4, no. 11, pp. 73–85, 2024.