Enhancing Cloud Service Performance Using Machine Learning-Based Anomaly Detection

Authors

  • Dhananjay Kumar Department of Computer Science Engineering, Bhabha University, Bhopal, India Author
  • Jeetendra Singh Yadav Department of Computer Science Engineering, Bhabha University, Bhopal, India Author

Abstract

Cloud computing has become an essential backbone for modern digital services, offering scalable, on-demand resources to meet dynamic user needs. However, maintaining optimal performance and reliability in cloud environments is challenging due to the complexity and unpredictability of system behavior. This paper proposes a machine learning-based anomaly detection framework to enhance cloud service performance. The proposed approach utilizes advanced algorithms such as Support Vector Machines (SVM), Random Forest, and Long Short-Term Memory (LSTM) networks to identify abnormal patterns in real-time system metrics, including CPU utilization, memory usage, network latency, and disk I/O. By accurately detecting anomalies and initiating proactive corrective actions, the system minimizes downtime, prevents service degradation, and optimizes resource utilization. Experimental results on benchmark cloud datasets demonstrate the effectiveness of the proposed model in achieving high detection accuracy with low false alarm rates. This research highlights the potential of intelligent anomaly detection systems in ensuring robust, efficient, and resilient cloud service delivery. Keywords: 4 or 5 key words or phrases in alphabetical order, separated by comma.

Downloads

Download data is not yet available.

References

Armbrust, M., Fox, A., Griffith, R., et al. (2010). A view of cloud computing. Communications of the ACM, 53(4), 50–58.

[Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM Computing Surveys (CSUR), 41(3), 1–58.

[Ahmed, M., Mahmood, A. N., & Hu, J. (2016). A survey of network anomaly detection techniques. Journal of Network and Computer Applications, 60, 19–31.

D. F. Pedroso, L. Almeida, L. E. G. Pulcinelli, W. A. A. Aisawa, I. Dutra and S. M. Bruschi, "Anomaly Detection and Root Cause Analysis in Cloud-Native Environments Using Large Language Models and Bayesian Networks," in IEEE Access, vol. 13, pp. 77550-77564, 2025, doi: 10.1109/ACCESS.2025.3565220.

H. Le, T. Hoang, M. Gabriel, G. Neumann and N. A. Vien, "Enhancing Exploration With Diffusion Policies in Hybrid Off-Policy RL: Application to Non-Prehensile Manipulation," in IEEE Robotics and Automation Letters, vol. 10, no. 6, pp. 6143-6150, June 2025, doi: 10.1109/LRA.2025.3564780.

H. Goumidi and S. Pierre, "Real-Time Anomaly Detection in IoMT Networks Using Stacking Model and a Healthcare- Specific Dataset," in IEEE Access, vol. 13, pp. 70352-70365, 2025, doi: 10.1109/ACCESS.2025.3563158.

M. Al-Sharafi et al., "Ensuring Zero Trust Security in Consumer Internet of Things Using Federated Learning-Based Attack Detection Model," in IEEE Access, vol. 13, pp. 54423-54438, 2025, doi: 10.1109/ACCESS.2025.3551212.

P. Renukadevi, S. Amaran, A. Vikram, T. Prabhakara Rao and M. K. Ishak, "Enhancing Cybersecurity Through Fusion of Optimization With Deep Wavelet Neural Networks on Denial of Wallet Attack Detection in Serverless Computing," in IEEE Access, vol. 13, pp. 47111-47122, 2025, doi: 10.1109/ACCESS.2025.3550735.

J. Liu et al., "SMore: Enhancing GPU Utilization in Deep Learning Clusters by Serverless-Based Co-Location Scheduling," in IEEE Transactions on Parallel and Distributed Systems, vol. 36, no. 5, pp. 903-917, May 2025, doi: 10.1109/TPDS.2025.3548320.

Downloads

Published

26-06-2025

Issue

Section

Research Articles

How to Cite

[1]
Dhananjay Kumar and Jeetendra Singh Yadav, “Enhancing Cloud Service Performance Using Machine Learning-Based Anomaly Detection”, Int J Sci Res Sci Eng Technol, vol. 12, no. 3, pp. 1367–1373, Jun. 2025, Accessed: Jul. 06, 2025. [Online]. Available: https://www.ijsrset.com/index.php/home/article/view/IJSRSET2512183