Anomaly Detection in Cloud Computing: A Systematic Review of Machine Learning Approaches

Authors

  • Dhananjay Kumar Department of Computer Science Engineering, Bhabha University, Bhopal, Madhya Pradesh, India Author
  • Jeetendra Singh Yadav Department of Computer Science Engineering, Bhabha University, Bhopal, Madhya Pradesh, India Author

Keywords:

Cloud Computing, Anomaly Detection, Machine Learning, Supervised Learning, Unsupervised Learning, Semi-Supervised Learning, Cloud Performance, System Reliability, Real-Time Monitoring, Cloud Security

Abstract

Cloud computing has become an essential pillar of digital infrastructure, offering on-demand services with high scalability and flexibility. However, ensuring consistent performance and reliability in such dynamic environments remains a significant challenge. Anomaly detection plays a critical role in identifying deviations from normal behavior that could indicate system faults, performance bottlenecks, or security breaches. Recently, machine learning (ML) techniques have shown remarkable success in detecting such anomalies due to their ability to analyze large volumes of heterogeneous data and adapt to evolving patterns. This systematic review explores various ML-based anomaly detection methods applied within cloud computing environments. The paper categorizes the approaches into supervised, unsupervised, and semi-supervised models, examining their performance, scalability, real-time capabilities, and implementation complexity. Additionally, it highlights the challenges related to data labeling, model generalization, and integration into live cloud systems. Key publicly available datasets and evaluation metrics used in the literature are also reviewed. The study concludes by identifying research gaps and proposing future directions to enhance the robustness, interpretability, and efficiency of ML-driven anomaly detection frameworks in cloud settings.

Downloads

Download data is not yet available.

References

A. Tanam and G. Raja, "A Systematic Analysis on Security and Anomaly Detection using Machine Learning in Cloud Computing," 2024 IEEE 6th International Conference on Cybernetics, Cognition and Machine Learning Applications (ICCCMLA), Hamburg, Germany, 2024, pp. 417–422, doi: 10.1109/ICCCMLA63077.2024.10871879.

X. Zhang, F. Meng and J. Xu, "PerfInsight: A Robust Clustering-Based Abnormal Behavior Detection System for Large-Scale Cloud," 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), San Francisco, CA, USA, 2018, pp. 896–899, doi: 10.1109/CLOUD.2018.00130.

T. L. Yasarathna and L. Munasinghe, "Anomaly Detection in Cloud Network Data," 2020 International Research Conference on Smart Computing and Systems Engineering (SCSE), Colombo, Sri Lanka, 2020, pp. 62–67, doi: 10.1109/SCSE49731.2020.9313014.

X. Zhao and W. Zhang, "An Anomaly Intrusion Detection Method Based on Improved K-Means of Cloud Computing," 2016 Sixth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC), Harbin, China, 2016, pp. 284–288, doi: 10.1109/IMCCC.2016.108.

M. S. Islam and A. Miranskyy, "Anomaly Detection in Cloud Components," 2020 IEEE 13th International Conference on Cloud Computing (CLOUD), Beijing, China, 2020, pp. 1–3, doi: 10.1109/CLOUD49709.2020.00008.

L. Jie, L. Xiangxiang and L. Haoxiang, "Anomaly Detection Method of Power Dispatching Data Based on Cloud Computing Platform," 2020 International Conference on Big Data & Artificial Intelligence & Software Engineering (ICBASE), Bangkok, Thailand, 2020, pp. 23–26, doi: 10.1109/ICBASE51474.2020.00012.

R. Kumar and D. Sharma, "HyINT: Signature-Anomaly Intrusion Detection System," 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Bengaluru, India, 2018, pp. 1–7, doi: 10.1109/ICCCNT.2018.8494088.

D. Kadam, R. Patil and C. Modi, "An Enhanced Approach for Intrusion Detection in Virtual Network of Cloud Computing," 2018 Tenth International Conference on Advanced Computing (ICoAC), Chennai, India, 2018, pp. 80–87, doi: 10.1109/ICoAC44903.2018.8939107.

D. Fernando, M. A. Rodriguez and R. Buyya, "iAnomaly: A Toolkit for Generating Performance Anomaly Datasets in Edge-Cloud Integrated Computing Environments," 2024 IEEE/ACM 17th International Conference on Utility and Cloud Computing (UCC), Sharjah, United Arab Emirates, 2024, pp. 236–245, doi: 10.1109/UCC63386.2024.00041.

B. Cha and J. Kim, "Study of Multistage Anomaly Detection for Secured Cloud Computing Resources in Future Internet," 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing (DASC), Sydney, NSW, Australia, 2011, pp. 1046–1050, doi: 10.1109/DASC.2011.171.

L. Liang, "Simulation of Big Data Anomaly Detection Algorithm Based on Neural Network Under Cloud Computing Platform," 2024 International Conference on Electrical Drives, Power Electronics & Engineering (EDPEE), Athens, Greece, 2024, pp. 603–608, doi: 10.1109/EDPEE61724.2024.00118.

H. H. Bin Suhaimi and H. T. Zubair, "Data Leakage Detection in Cloud Computing Environment," in Proc. 2024 1st Int. Conf. Cyber Security and Computing (CyberComp), Melaka, Malaysia, 2024, pp. 7–12, doi: 10.1109/CyberComp60759.2024.10913619.

S. Ma et al., "Privacy-Preserving Anomaly Detection in Cloud Manufacturing Via Federated Transformer," IEEE Trans. Ind. Informat., vol. 18, no. 12, pp. 8977–8987, Dec. 2022, doi: 10.1109/TII.2022.3167478.

K. R. Shreesha, S. Anjana and B. Padma, "Enhancing the Stadam SLA Trust Model with Machine Learning for Improved Anomaly Detection," in Proc. 2025 Int. Conf. Next Generation Communication & Information Processing (INCIP), Bangalore, India, 2025, pp. 727–731, doi: 10.1109/INCIP64058.2025.11019740.

W. Guo, L. Shi and Z. Wu, "Research on anomaly detection algorithm of time series data in cloud environment," in Proc. 2022 World Automation Congress (WAC), San Antonio, TX, USA, 2022, pp. 499–503, doi: 10.23919/WAC55640.2022.9934501.

Downloads

Published

02-07-2025

Issue

Section

Research Articles

How to Cite

[1]
Dhananjay Kumar and Jeetendra Singh Yadav, “Anomaly Detection in Cloud Computing: A Systematic Review of Machine Learning Approaches”, Int J Sci Res Sci Eng Technol, vol. 12, no. 4, pp. 15–22, Jul. 2025, Accessed: Jul. 14, 2025. [Online]. Available: https://www.ijsrset.com/index.php/home/article/view/IJSRSET2512402