Published on: April 2026
ANOMALY DETECTION USING MACHINE LEARNING TO IMPROVE SECURITY IN CLOUD SYSTEM LOGS
Pujala Pavan Kumar
K Naresh
Article Status
Available Documents
Abstract
During regular operations, cloud computing environments produce a significant amount of system logs and event recordings. It is challenging and time-consuming to manually monitor these logs in order to identify suspect activity. Conventional security measures frequently rely on rule-based methods that might not be able to identify new or developing cyberthreats. This study suggests a machine learning-based method for identifying questionable system activity from event log data in order to overcome this difficulty. The suggested system looks for unusual behaviour patterns in system activities by analysing attributes including process ID, user ID, event ID, and return values. Before the machine learning model is trained, the dataset is cleaned and prepared using data preparation techniques. System events are divided into two categories by the trained model: suspicious and safe. Python and web technologies are used to provide a web-based interface that enables users to view prediction results and effectively analyse system activities. The suggested method can successfully detect suspicious occurrences and enhance the general security monitoring procedure in cloud settings, according to experimental data. The approach improves the ability to identify possible security risks while reducing the need for manual examination.
How to Cite this Paper
Kumar, P. P. (2026). Anomaly Detection using Machine Learning to Improve Security in Cloud System Logs. International Journal of Creative and Open Research in Engineering and Management, <i>02</i>(04). https://doi.org/10.55041/ijcope.v2i4.072
Kumar, Pujala. "Anomaly Detection using Machine Learning to Improve Security in Cloud System Logs." International Journal of Creative and Open Research in Engineering and Management, vol. 02, no. 04, 2026, pp. . doi:https://doi.org/10.55041/ijcope.v2i4.072.
Kumar, Pujala. "Anomaly Detection using Machine Learning to Improve Security in Cloud System Logs." International Journal of Creative and Open Research in Engineering and Management 02, no. 04 (2026). https://doi.org/https://doi.org/10.55041/ijcope.v2i4.072.
References
[1] Sommer, R., & Paxson, V., "Outside the Closed World: On Using Machine Learning for Network Intrusion Detection," IEEE Symposium on Security and Privacy, 2010.[2] Buczak, A. L., & Guven, E., "A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection," IEEE Communications Surveys & Tutorials, 2016.
[3] Chandola, V., Banerjee, A., & Kumar, V., "Anomaly Detection: A Survey," ACM Computing Surveys, 2009.
[4] Scikit-learn Developers, "Scikit-learn: Machine Learning in Python," Available: https://scikit-learn.org
[5] NIST, "Framework for Improving Critical Infrastructure Cybersecurity," National Institute of Standards and Technology, 2018.
Ethical Compliance & Review Process
- •All submissions are screened under plagiarism detection.
- •Review follows editorial policy.
- •Authors retain copyright.
- •Peer Review Type: Double-Blind Peer Review
- •Published on: Apr 06 2026
This article is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. You are free to share and adapt this work for non-commercial purposes with proper attribution.

