ARCHIVES
Cloud Shield IDS: Design and Evaluation of a Real-Time AI- Powered Intrusion Detection System Using XG Boost and Cloud Integration
¹ ² ³ ⁴ Department of Computer Science and Engineering (Cyber Security), United Institute of Technology, Coimbatore, Tamil Nadu, India ⁵ Teaching Assistant (TA), Department of Computer Science and Engineering (Cyber Security), United Institute of Technology, Coimbatore, Tamil Nadu, India.
Published Online: May-August 2026
Pages: 64-71
Cite this article
↗ https://www.doi.org/10.59256/indjcst.20260502007The proliferation of sophisticated cyber-attacks against networked systems demands robust, real-time intrusion detection capabilities that transcend the limitations of purely rule-based approaches. This paper presents CloudShield IDS, a hybrid intrusion detection system that integrates machine learning-based classification with deterministic rule-based heuristics, cloud-based persistent storage via Supabase (PostgreSQL), and an interactive real-time Streamlit dashboard. The system employs an XGBoost classifier trained on network traffic features to distinguish normal activity from malicious patterns including port scans, distributed denial-of-service (DDoS) attacks, brute-force login attempts, and SQL injection exploits. The proposed pipeline captures raw network events through a dedicated listener module, classifies them through a dual-layer processor, and persists structured alerts to a cloud database from which the dashboard retrieves and visualises threat intelligence. Experimental evaluation demonstrates an overall detection rate of 97.8%, a precision of 97.2%, and a false positive rate of approximately 2.8%, outperforming conventional rule-based systems such as Snort and Suricata across multiple attack categories. The architecture is modular, extensible, and deployable both locally and on cloud infrastructure, making it suitable for enterprise and research environments. Claude AI was leveraged throughout the development lifecycle for code generation, architecture design, debugging, and optimisation, illustrating the practical utility of large language models in applied cybersecurity engineering.
Related Articles
2026
Artificial Intelligence in Learning and Teaching
2026
Admin Assist: An AI – Driven Configuration and Orchestration for Enterprise Application
2026
Enhancing Blood Group Identification using pigeon inspired optimization: An Innovative Approach
2026
Eco-Genius: Power Up Smart, Power Down Waste
2026
Crowd-Sourced Disaster Response and Rescue Assistant
2026
Unveiling Deepfake Detection Using Vision Transformers: A Survey and Experimental Study
2026
A Novel Stateful Orchestration Pattern for Data Affinity and Transactional Integrity in Sharded Backend Architectures
2026
Legal Challenges of Agentic AI Systems in Education and Employment Decision-Making
2026
New-Hybrid Soft Computing Model for Stock Market Predictions
2026
Human Emotion Distribution Learning from Face Images Using CNN


