Performance Evaluation of Anomaly-Based Detection Approaches for Zero-Day Attack Early Warning in Cloud Infrastructure
Main Article Content
Abstract
Article Details
Issue
Section
How to Cite
References
1. W. Ma, Y. Li, S. Lan, W. Wang, W. Huang, and W. Zhu, “Semantic-aware normalizing flow with feature fusion for image anomaly detection,” Neurocomputing, vol. 590, Art. no. 127728, 2024.
2. P. H. Barros, E. T. Chagas, L. B. Oliveira, F. Queiroz, and H. S. Ramos, “Malware-SMELL: A zero-shot learning strategy for detecting zero-day vulnerabilities,” Computers & Security, vol. 120, Art. no. 102785, 2022.
3. A. M. Abdallah, A. S. R. O. Alkaabi, G. B. N. D. Alameri, S. H. Rafique, N. S. Musa, and T. Murugan, “Cloud network anomaly detection using machine and deep learning techniques—recent research advancements,” IEEE Access, vol. 12, pp. 56749–56773, 2024.
4. S. F. Ahmed, M. S. B. Alam, M. Hassan, M. R. Rozbu, T. Ishtiak, N. Rafa, et al., “Deep learning modelling techniques: Current progress, applications, advantages, and challenges,” Artificial Intelligence Review, vol. 56, no. 11, pp. 13521–13617, 2023.
5. Y. Zhang, B. Suleiman, M. J. Alibasa, and F. Farid, “Privacy-aware anomaly detection in IoT environments using FedGroup: A group-based federated learning approach,” Journal of Network and Systems Management, vol. 32, no. 1, Art. no. 20, 2024.
6. M. Ahmad and A. Rehman, “Multi-source information fusion for anomaly detection in smart grids using federated learning,” Chinese Journal of Information Fusion, vol. 2, no. 2, pp. 157–170, 2025.
7. M. Hasnain, M. F. Pasha, I. Ghani, M. Imran, M. Y. Alzahrani, and R. Budiarto, “Evaluating trust prediction and confusion matrix measures for web services ranking,” IEEE Access, vol. 8, pp. 90847–90861, 2020.
8. P. Kumar, R. Kumar, G. P. Gupta, and R. Tripathi, “A distributed framework for detecting DDoS attacks in smart contract-based blockchain-IoT systems by leveraging fog computing,” Transactions on Emerging Telecommunications Technologies, vol. 32, no. 6, Art. no. e4112, 2021.
9. N. J. Patel and R. H. Jhaveri, “Trust based approaches for secure routing in VANET: A survey,” Procedia Computer Science, vol. 45, pp. 592–601, 2015.
10. D. Zhang and X. Ma, “Machine learning-based credit risk assessment for green bonds: Climate factor integration and default prediction analysis,” Journal of Sustainability, Policy, and Practice, vol. 1, no. 2, pp. 121–135, 2025.
11. A. Kang, Z. Li, and S. Meng, “AI-enhanced risk identification and intelligence sharing framework for anti-money laundering in cross-border income swap transactions,” Journal of Advanced Computing Systems, vol. 3, no. 5, pp. 34–47, 2023.
12. Z. Wang and A. Kang, “FTAFO: A federated transparent adaptive financial optimizer for reducing third-party dependencies in workflow management,” Journal of Science, Innovation & Social Impact, vol. 1, no. 1, pp. 329–339, 2025.
13. J. Zhang, “Evaluating machine learning approaches for sensitive data identification: A comparative study of NLP and rule-based methods,” Journal of Advanced Computing Systems, vol. 4, no. 7, pp. 26–38, 2024.
14. Y. Lei, “Adaptive privacy-preserving techniques for multimedia content processing in cloud environments: A differential privacy approach,” Journal of Science, Innovation & Social Impact, vol. 1, no. 1, pp. 278–293, 2025.
15. D. Zhang and E. Feng, “Quantitative assessment of regional carbon neutrality policy synergies based on deep learning,” Journal of Advanced Computing Systems, vol. 4, no. 10, pp. 38–54, 2024.
16. A. Kang, J. Xin, and X. Ma, “Anomalous cross-border capital flow patterns and their implications for national economic security: An empirical analysis,” Journal of Advanced Computing Systems, vol. 4, no. 5, pp. 42–54, 2024.
17. Z. Wang, “Retracted: Adaptive generation of medical education animations for enhanced health literacy: A personalization approach for diabetes, vaccination, and mental health communication,” Journal of Science, Innovation & Social Impact, vol. 1, no. 2, pp. 78–95, 2025.
18. J. Zhang, “A comparative evaluation of deep learning and ensemble algorithms for online payment fraud detection,” Journal of Science, Innovation & Social Impact, vol. 2, no. 1, pp. 164–177, 2026.
19. Y. Lei and Z. Wu, “A real-time detection framework for high-risk content on short video platforms based on heterogeneous feature fusion,” Pinnacle Academic Press Proceedings Series, vol. 3, pp. 93–106, 2025.
20. B. Dong, D. Zhang, and J. Xin, “Deep reinforcement learning for optimizing order book imbalance-based high-frequency trading strategies,” Journal of Computing Innovations and Applications, vol. 2, no. 2, pp. 33–43, 2024.
21. A. Kang, S. Min, and D. Yuan, “Comparative analysis of foreign exchange market shock transmission and recovery resilience among major economies under geopolitical conflicts: Evidence from the Russia-Ukraine crisis,” Journal of Computing Innovations and Applications, vol. 2, no. 1, pp. 46–61, 2024.
22. Z. Wang, “DeepMotionNet: AI-driven predictive animation state transitions for reducing perceptual latency in competitive FPS games,” in Proc. 6th Int. Conf. Computer Engineering and Application (ICCEA), Apr. 2025, pp. 1–8.
23. J. Zhang, “SecureCodeBERT: An AI-powered model for identifying and categorizing high-risk security vulnerabilities in PHP-based critical infrastructure applications,” Journal of Sustainability, Policy, and Practice, vol. 1, no. 4, pp. 80–94, 2025.
24. Y. Lei, “Intelligent prediction and dynamic scheduling optimization strategy for cloud computing resources under burst load scenarios,” in Proc. Int. Symp. Machine Learning and Social Computing, Oct. 2025, pp. 59–67.
25. T. K. Trinh and D. Zhang, “Algorithmic fairness in financial decision-making: Detection and mitigation of bias in credit scoring applications,” Journal of Advanced Computing Systems, vol. 4, no. 2, pp. 36–49, 2024.
26. Z. Li and Z. Wang, “Adaptive cross-cultural medical animation: Bridging language and context in AI-driven healthcare communication,” Artificial Intelligence and Machine Learning Review, vol. 5, no. 1, pp. 117–128, 2024.
27. R. Jia, J. Zhang, and J. Prescot, “An empirical study of large language models for threat intelligence analysis and incident response,” Journal of Computing Innovations and Applications, vol. 2, no. 1, pp. 99–110, 2024.
28. Y. Lei and V. Holloway, “Adaptive learning-enhanced convex optimization for energy-efficient cloud resource scheduling,” Journal of Advanced Computing Systems, vol. 4, no. 11, pp. 73–85, 2024.