ARCHIVES

Original Article

Cloud Shield IDS: Design and Evaluation of a Real-Time AI- Powered Intrusion Detection System Using XG Boost and Cloud Integration

Indhushree S1Elanthamil G. P2Fathima Mehin3Jeevanthraj P4Fathima Jemima P5

¹ ² ³ ⁴ Department of Computer Science and Engineering (Cyber Security), United Institute of Technology, Coimbatore, Tamil Nadu, India ⁵ Teaching Assistant (TA), Department of Computer Science and Engineering (Cyber Security), United Institute of Technology, Coimbatore, Tamil Nadu, India.

Published Online: May-August 2026

Pages: 64-71

Abstract

The proliferation of sophisticated cyber-attacks against networked systems demands robust, real-time intrusion detection capabilities that transcend the limitations of purely rule-based approaches. This paper presents CloudShield IDS, a hybrid intrusion detection system that integrates machine learning-based classification with deterministic rule-based heuristics, cloud-based persistent storage via Supabase (PostgreSQL), and an interactive real-time Streamlit dashboard. The system employs an XGBoost classifier trained on network traffic features to distinguish normal activity from malicious patterns including port scans, distributed denial-of-service (DDoS) attacks, brute-force login attempts, and SQL injection exploits. The proposed pipeline captures raw network events through a dedicated listener module, classifies them through a dual-layer processor, and persists structured alerts to a cloud database from which the dashboard retrieves and visualises threat intelligence. Experimental evaluation demonstrates an overall detection rate of 97.8%, a precision of 97.2%, and a false positive rate of approximately 2.8%, outperforming conventional rule-based systems such as Snort and Suricata across multiple attack categories. The architecture is modular, extensible, and deployable both locally and on cloud infrastructure, making it suitable for enterprise and research environments. Claude AI was leveraged throughout the development lifecycle for code generation, architecture design, debugging, and optimisation, illustrating the practical utility of large language models in applied cybersecurity engineering.

Related Articles

2026

Artificial Intelligence in Learning and Teaching

2026

Admin Assist: An AI – Driven Configuration and Orchestration for Enterprise Application

2026

Enhancing Blood Group Identification using pigeon inspired optimization: An Innovative Approach

2026

Eco-Genius: Power Up Smart, Power Down Waste

2026

Crowd-Sourced Disaster Response and Rescue Assistant

2026

Unveiling Deepfake Detection Using Vision Transformers: A Survey and Experimental Study

2026

A Novel Stateful Orchestration Pattern for Data Affinity and Transactional Integrity in Sharded Backend Architectures

2026

Legal Challenges of Agentic AI Systems in Education and Employment Decision-Making

2026

New-Hybrid Soft Computing Model for Stock Market Predictions

2026

Human Emotion Distribution Learning from Face Images Using CNN