In the digital era, rapid developments in interconnected Internet of Things (IoT) devices and the increasing integration of edge computing have significantly reshaped the current landscape, allowing a large number of connected systems to manage data quickly and effectively with minimal latency. On the other hand, cloud computing provides a flexible digital infrastructure in which data and resources are distributed across multiple locations, enabling users to access them from numerous industrial settings via the internet. However, the extensive interconnectedness of IoT networks, combined with the inherently limited security of many devices, creates heightened risks that can threaten the vital operations of hospitals, cities, and organizations. Reinforcing the security features of IoT devices before they are used across diverse systems can help reduce the attack surface. Conventional security systems often fail or are poorly suited to the dynamic and shared nature of cloud environments, making them insufficient for cloud-based systems. Despite ongoing use and a surge in complex cyberattacks, cloud platforms have tackled their inherent security challenges and vulnerabilities in the past three years. The rapid advancement of deep learning in artificial intelligence has brought numerous benefits for addressing industrial security concerns in the cloud. This manuscript presents an Advancing Intelligent Cybersecurity through Ensemble Deep Representation Learning and Feature Dimensionality Reduction (AICEDRL-FDR) technique in cloud-edge-IoT environments. The AICEDRL-FDR technique aims to provide a reliable framework for proactive threat mitigation in next-generation digital infrastructures. The AICEDRL-FDR method uses data pre-processing stages—cleaning, normalization, and standardization—to improve dataset consistency and quality. The maximum relevance minimum redundancy (mRMR) technique is utilized for dimensionality reduction to reduce redundant and irrelevant features. Ensemble deep representation methods, such as deep convolutional autoencoder (DCAE), fuzzy deep belief network (FDBN), and temporal convolutional network (TCN), are applied to the attack detection procedure. A broad array of experimental studies was conducted to ensure the AICEDRL-FDR method achieves superior performance on the Edge-IIoT [
Citation: Khalid A. Alattas. Advancing artificial intelligence-enabled cybersecurity framework using ensemble deep representation learning for intelligent cybersecurity in cloud-edge-IoT environments[J]. AIMS Mathematics, 2025, 10(12): 28981-29011. doi: 10.3934/math.20251275
In the digital era, rapid developments in interconnected Internet of Things (IoT) devices and the increasing integration of edge computing have significantly reshaped the current landscape, allowing a large number of connected systems to manage data quickly and effectively with minimal latency. On the other hand, cloud computing provides a flexible digital infrastructure in which data and resources are distributed across multiple locations, enabling users to access them from numerous industrial settings via the internet. However, the extensive interconnectedness of IoT networks, combined with the inherently limited security of many devices, creates heightened risks that can threaten the vital operations of hospitals, cities, and organizations. Reinforcing the security features of IoT devices before they are used across diverse systems can help reduce the attack surface. Conventional security systems often fail or are poorly suited to the dynamic and shared nature of cloud environments, making them insufficient for cloud-based systems. Despite ongoing use and a surge in complex cyberattacks, cloud platforms have tackled their inherent security challenges and vulnerabilities in the past three years. The rapid advancement of deep learning in artificial intelligence has brought numerous benefits for addressing industrial security concerns in the cloud. This manuscript presents an Advancing Intelligent Cybersecurity through Ensemble Deep Representation Learning and Feature Dimensionality Reduction (AICEDRL-FDR) technique in cloud-edge-IoT environments. The AICEDRL-FDR technique aims to provide a reliable framework for proactive threat mitigation in next-generation digital infrastructures. The AICEDRL-FDR method uses data pre-processing stages—cleaning, normalization, and standardization—to improve dataset consistency and quality. The maximum relevance minimum redundancy (mRMR) technique is utilized for dimensionality reduction to reduce redundant and irrelevant features. Ensemble deep representation methods, such as deep convolutional autoencoder (DCAE), fuzzy deep belief network (FDBN), and temporal convolutional network (TCN), are applied to the attack detection procedure. A broad array of experimental studies was conducted to ensure the AICEDRL-FDR method achieves superior performance on the Edge-IIoT [
| [1] | Edge-IIoTset cyber security dataset of IoT & IioT, 2021. Available from: https://www.kaggle.com/datasets/mohamedamineferrag/edgeiiotset-cyber-security-dataset-of-iot-iiot. |
| [2] | CIC-ToN-IoT, 2022. Available from: https://www.kaggle.com/datasets/dhoogla/cictoniot. |
| [3] |
C. Gbaja, Next-generation edge computing: Leveraging Ai-driven Iot for autonomous, real-time decision making and cyber security, Journal of Artificial Intelligence General Science, 5 (2024), 357–371. https://doi.org/10.60087/jaigs.v5i1.204 doi: 10.60087/jaigs.v5i1.204
|
| [4] | S. K. Sundaramurthy, N. Ravichandran, A. C. Inaganti, R. Muppalaneni, AI-driven threat detection: leveraging machine learning for real-time cybersecurity in cloud environments, Artificial Intelligence and Machine Learning Review, 6 (2025), 23–43. |
| [5] | F. M. Rasel, B. Peter, AI-driven frameworks for enhancing cybersecurity in multi-cloud environments, International Journal of Advanced Engineering Technologies and Innovations, 1 (2025), 24–32. https://ijaeti.com/index.php/Journal/article/view/849 |
| [6] |
P. Prachi, AI-driven security mechanisms in IOT cloud solutions, Smart Internet of Things, 1 (2024), 260–264. https://doi.org/10.22105/siot.v1i4.137 doi: 10.22105/siot.v1i4.137
|
| [7] | S. Lad, Cybersecurity trends: Integrating ai to combat emerging threats in the cloud era, Integrated Journal of Science and Technology, 1 (2024), 12. |
| [8] | I. E. Kezron, Cybersecurity framework for securing cloud and AI-driven services in small and medium-sized businesses, Journal of Tianjin University Science and Technology, 58 (2025), 526–558. |
| [9] |
R. Akbar, A. Zafer, Next-gen information security: AI-driven solutions for real-time cyber threat detection in cloud and network environments, J. Cybersecur. Res., 12 (2024), 123–145. https://doi.org/10.13140/RG.2.2.11705.38245 doi: 10.13140/RG.2.2.11705.38245
|
| [10] |
M. Kumari, M. Gaikwad, S. A. Chavan, A secure IoT-edge architecture with data-driven AI techniques for early detection of cyber threats in healthcare, Discov. Internet Things, 5 (2025), 54. https://doi.org/10.1007/s43926-025-00147-z doi: 10.1007/s43926-025-00147-z
|
| [11] |
M. M. Rashid, O. M. Yaseen, AI-driven cybersecurity measures for hybrid cloud environments: A framework for multi-cloud security management, International Journal on Engineering Artificial Intelligence Management, Decision Support, and Policies, 2 (2025), 30–39. https://doi.org/10.63503/j.ijaimd.2025.39 doi: 10.63503/j.ijaimd.2025.39
|
| [12] |
U. V. Menon, V. B. Kumaravelu, C. V. Kumar, A. Rammohan, S. Chinnadurai, R. Venkatesan, et al., AI-powered IoT: A survey on integrating artificial intelligence with IoT for enhanced security, efficiency, and smart applications, IEEE Access, 13 (2025), 50296–50339. https://doi.org/10.1109/ACCESS.2025.3551750 doi: 10.1109/ACCESS.2025.3551750
|
| [13] | A. B. Dorothy, B. Madhavidevi, B. Nachiappan, G. Manikandan, P. K. Patjoshi, M. Sindhuja, AI-driven threat intelligence in cloud computing detecting and responding to cyber attacks, 2024 International Conference on Intelligent Algorithms for Computational Intelligence Systems (IACIS), Hassan, India, 2024, 1–6. https://doi.org/10.1109/IACIS61494.2024.10721888 |
| [14] |
G. D. Iyer, AI enhanced cybersecurity for cloud-IOT infrastructure in smart cities, Metaversalize, 2 (2025), 31–39. https://doi.org/10.22105/metaverse.v2i1.48 doi: 10.22105/metaverse.v2i1.48
|
| [15] |
M. A. M. Farzaan, M. C. Ghanem, A. El-Hajjar, D. N. Ratnayake, AI-powered system for an efficient and effective cyber incidents detection and response in cloud environments, IEEE Transactions on Machine Learning in Communications and Networking, 3 (2025), 623–643. https://doi.org/10.1109/TMLCN.2025.3564912 doi: 10.1109/TMLCN.2025.3564912
|
| [16] |
K. A. Awan, I. U. Din, A. Almogren, A. Nawaz, M. Y. Khan, A. Altameem, SecEdge: A novel deep learning framework for real-time cybersecurity in mobile IoT environments, Heliyon, 11 (2025), e40874. https://doi.org/10.1016/j.heliyon.2024.e40874 doi: 10.1016/j.heliyon.2024.e40874
|
| [17] |
F. Alblehai, Artificial intelligence-driven cybersecurity system for internet of things using self-attention deep learning and metaheuristic algorithms, Sci. Rep., 15 (2025), 13215. https://doi.org/10.1038/s41598-025-98056-2 doi: 10.1038/s41598-025-98056-2
|
| [18] | D. Chaudhary, S. K. Verma, V. M. Shrimal, R. Madala, R. Baliyan, M. Sathish, Ai-based methods to detect and counter cyber threats in cloud environments to strengthen cloud security, 2024 International Conference on Electrical Electronics and Computing Technologies (ICEECT), Greater Noida, India, 2024, 1–6. https://doi.org/10.1109/ICEECT61758.2024.10739173 |
| [19] |
K. Sathupadi, S. Achar, S. V. Bhaskaran, N. Faruqui, M. Abdullah-Al-Wadud, J. Uddin, Edge-cloud synergy for AI-enhanced sensor network data: A real-time predictive maintenance framework, Sensors, 24 (2024), 7918. https://doi.org/10.3390/s24247918 doi: 10.3390/s24247918
|
| [20] |
F. M. Alrowais, S. Althahabi, S. S. Alotaibi, A. Mohamed, M. A. Hamza, R. Marzouk, Automated machine learning enabled cybersecurity threat detection in internet of things environment, Comput. Syst. Sci. Eng., 45 (2023), 687–700. https://doi.org/10.32604/CSSE.2023.030188 doi: 10.32604/CSSE.2023.030188
|
| [21] |
G. Bhandari, A. Lyth, A. Shalaginov, T. M. Grø nli, Distributed deep neural-network-based middleware for cyber-attacks detection in smart IoT ecosystem: A novel framework and performance evaluation approach, Electronics, 12 (2023), 298. https://doi.org/10.3390/electronics12020298 doi: 10.3390/electronics12020298
|
| [22] |
N. S. Suryavanshi, P. S. Acharya, A. N. Jadhav, A trust-security-resource optimization framework for cloud-edge-IoT collaboration in industrial applications, IJSAT-International Journal on Science and Technology, 16 (2025), 1626. https://doi.org/10.71097/IJSAT.v16.i1.1626 doi: 10.71097/IJSAT.v16.i1.1626
|
| [23] |
O. Aouedi, K. Piamrat, Toward a scalable and energy-efficient framework for industrial cloud-edge-IoT continuum, IEEE Internet of Things Magazine, 7 (2024), 14–20. https://doi.org/10.1109/IOTM.001.2300229 doi: 10.1109/IOTM.001.2300229
|
| [24] |
J. Ali, S. K. Singh, W. W. Jiang, A. M. Alenezi, M. Islam, Y. I. Daradkeh, et al., A deep dive into cybersecurity solutions for AI-driven IoT-enabled smart cities in advanced communication networks, Comput. Commun., 229 (2025), 108000. https://doi.org/10.1016/j.comcom.2024.108000 doi: 10.1016/j.comcom.2024.108000
|
| [25] |
G. Y. Xu, M. D. Xu, An effective prediction of resource using machine learning in edge environments for the smart healthcare industry, J. Grid Computing, 22 (2024), 54. https://doi.org/10.1007/s10723-024-09768-0 doi: 10.1007/s10723-024-09768-0
|
| [26] |
X. D. Zang, Z. L. Zheng, H. S. Zheng, X. Liu, M. K. Khan, W. W. Jiang, HyperEye: A lightweight features fusion model for unknown encrypted malware traffic detection, IEEE T. Consum. Electr., 71 (2025), 5079–5089. https://doi.org/10.1109/TCE.2025.3558353 doi: 10.1109/TCE.2025.3558353
|
| [27] |
N. J. Singh, N. Hoque, K. R. Singh, D. K. Bhattacharyya, Botnet‐based IoT network traffic analysis using deep learning, Secur. Privacy, 7 (2024), e355. https://doi.org/10.1002/spy2.355 doi: 10.1002/spy2.355
|
| [28] |
K. Saravanan, R. Santhosh, TBBS-TO: Trustable blockchain and bandwidth sensible-based task offloading and resource allocation in cloud-IoT network, Journal of Cybersecurity and Information Management, 15 (2025), 133–150. https://doi.org/10.54216/JCIM.150111 doi: 10.54216/JCIM.150111
|
| [29] |
M. Sahi, N. Auluck, A. Azim, M. A. Maruf, Dynamic hierarchical intrusion detection task offloading in IoT edge networks, Software: Practice and Experience, 54 (2024), 2249–2271. https://doi.org/10.1002/spe.3338 doi: 10.1002/spe.3338
|
| [30] | C. Banse, B. Fanta, J. Alonso, C. Martinez, EMERALD: Evidence management for continuous certification as a service in the cloud, 2025, arXiv: 2502.07330. https://doi.org/10.48550/arXiv.2502.07330 |
| [31] |
A. V. Nagarjun, S. Rajkumar, Design of an anomaly detection framework for delay and privacy-aware blockchain-based cloud deployments, IEEE Access, 12 (2024), 84843–84862. https://doi.org/10.1109/ACCESS.2024.3414998 doi: 10.1109/ACCESS.2024.3414998
|
| [32] |
G. Logeswari, J. D. Roselind, K. Tamilarasi, V. Nivethitha, A comprehensive approach to intrusion detection in IoT environments using hybrid feature selection and multi-stage classification techniques, IEEE Access, 13 (2025), 24970–24987. https://doi.org/10.1109/ACCESS.2025.3532895 doi: 10.1109/ACCESS.2025.3532895
|
| [33] |
N. Papaioannou, G. Myllis, A. Tsimpiris, V. Vrana, The role of mutual information estimator choice in feature selection: An empirical study on mRMR, Information, 16 (2025), 724. https://doi.org/10.3390/info16090724 doi: 10.3390/info16090724
|
| [34] |
A. Ponraj, P. Nagaraj, D. Balakrishnan, P. N. Srinivasu, J. Shafi, W. Kim, et al., A multi-patch-based deep learning model with VGG19 for breast cancer classifications in the pathology images, Digit. Health, 11 (2025). 20552076241313161. https://doi.org/10.1177/20552076241313161 doi: 10.1177/20552076241313161
|
| [35] |
A. K. Shukla, P. K. Muhuri, Deep belief network with fuzzy parameters and its membership function sensitivity analysis, Neurocomputing, 614 (2025), 128716. https://doi.org/10.1016/j.neucom.2024.128716 doi: 10.1016/j.neucom.2024.128716
|
| [36] |
J. Y. Bai, W. Zhu, S. H. Liu, C. H. Ye, P. Zheng, X. C. Wang, A temporal convolutional network-bidirectional long short-term memory (TCN-BiLSTM) prediction model for temporal faults in industrial equipment, Appl. Sci., 15 (2025), 1702. https://doi.org/10.3390/app15041702 doi: 10.3390/app15041702
|
| [37] |
M. J. C. S. Reis, AI-driven anomaly detection for securing IoT devices in 5G-enabled smart cities, Electronics, 14 (2025), 2492. https://doi.org/10.3390/electronics14122492 doi: 10.3390/electronics14122492
|
| [38] |
A. H. Salem, S. M. Azzam, O. E. Emam, A. A. Abohany, Advancing cybersecurity: A comprehensive review of AI-driven detection techniques, J. Big Data, 11 (2024), 105. https://doi.org/10.1186/s40537-024-00957-y doi: 10.1186/s40537-024-00957-y
|
| [39] |
R. Lyu, M. S. He, Y. Zhang, L. Jin, X. L. Wang, Network intrusion detection based on an efficient neural architecture search, Symmetry, 13 (2021), 1453. https://doi.org/10.3390/sym13081453 doi: 10.3390/sym13081453
|