Proposed to solve constraints of conventional systems in identifying attacks is a hybrid IDPS model. To increase accuracy and lower false positives, it uses behavioural analysis employing ML in conjunction with signature-based detection. Using Terraform and Ansible, the system is housed on a cloud environment with Suricata or Snort as the central IDS, Docker for scalability, and Kibana for visualisation. On datasets including NSL-KDD, CIC-IDS2017, and UNSW-NB15, it shows better detection and reduced false positive rates. Integrated automated responses improve proactive threat reduction, so stressing the need of combining traditional and contemporary security techniques.
Keywords: Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Network Security, Machine Learning, Cyber Threats, Cloud Security.
I. Introduction
DDoS and APTs are among increasingly complicated cybersecurity risks that call for efficient IDS/IPS solutions. While anomaly-based systems find unusual behaviour but often generate false positives, signature-based systems like Snort and Suricata detect known attacks but miss zero-day threats. A hybrid method improves efficiency as well as precision. This work presents a cloud-based hybrid IDPS framework using Terraform and Ansible for deployment, Suricata or Snort for detection, Kibana for visualisation, and Docker for scalability combining signature detection, behaviour analysis, and automated mitigating. The objective is an automated scalable high-performance IDPS for real-time threat detection and response. It enhances detection and lowers false positives by combining automated actions with rule-based and anomaly-based techniques. This work addresses scalability and accuracy issues while meeting the increasing demand for automated, adaptive defences in dynamic cloud environments.
Case Study 1: Evolution of Hybrid IDPS in a Cloud-Based E-Commerce Platform. A significant e-commerce platform experienced a number of cyberattacks in early 2023, including DDoS and SQL injections, which overpowered its signature-based intrusion detection system. The business implemented a hybrid IDPS that uses machine learning models trained on actual traffic to detect anomalies in addition to signatures. Docker provided scalability, and Terraform and Ansible automated deployment across AWS and Azure. Threats were immediately stopped by real-time response systems. Attack success rates and false positives decreased by 65 % and 40 %, respectively, in just six months. In contrast to traditional systems, this example shows how hybrid IDPS frameworks greatly enhance threat detection and response in dynamic cloud environments.
Case Study 2: Deployment of Automated IDPS in Financial Services for Real-Time Threat Mitigation. A digital banking company encountered APTs in early 2024 that evaded conventional firewalls and signature-based intrusion detection systems, endangering data integrity and attracting regulatory notice. In order to detect unknown threats, the company responded by implementing a cloud-native hybrid IDPS that combines unsupervised machine learning with signature rules. Real-time attack prevention was provided by a dynamic response engine, and consistent worldwide deployment was made possible by Terraform and Ansible. Using NSL-KDD and CIC-IDS2017 datasets, the system achieved 92 % detection accuracy and 55 % faster response. With hybrid models outperforming legacy defences against contemporary cyber threats, this case highlights the need for intelligent, automated IDPS in financial systems.
II. Literature review
Network traffic is analysed by intrusion detection and prevention systems (IDPS) in order to identify and eliminate threats. While IPS blocks malicious activity in real time, IDS components identify suspicious activity. Tools that rely on signatures, such as Snort and Suricata, are effective against known threats but ineffective against zero-day attacks and need to be updated often [4]. Although they require more processing power and precise configuration, hybrid models that combine machine learning with conventional detection increase accuracy and adaptability [5], [6].
2.1 Existing Cloud-Based Security Solutions.
Security solutions now prioritise scalability, automation, and ease of deployment due to the growth of cloud computing. These days, cloud-based IDPS frameworks use Infrastructure as Code (IaC) tools like Terraform and Ansible to automate setup, cutting down on deployment time and human error [7]. Real-time threat visualisation is made possible by tools like Kibana, which facilitate quicker reaction. By increasing resilience and flexibility, this strategy aids security systems in adjusting to changing threats.
2.2 Related Works.
Prior studies have made significant progress in intrusion detection and prevention, concentrating on both conventional and machine learning-enhanced methods. Suricata enhanced performance through multi-threading, while Roesch presented Snort, an early open-source intrusion detection system based on signature detection [1], [4]. As IDS shifted towards more adaptive frameworks, Sommer and Paxson were the first to incorporate machine learning [6].
Recent research has demonstrated the importance of machine learning in threat detection: Vinayakumar et al. suggested hybrid models that combine anomaly and signature detection for increased accuracy and robustness, while Shone et al. employed deep autoencoders to decrease false positives [5], [8]. Even with advancements, problems still exist: current systems are limited by high false positive rates in anomaly detection, scalability problems, particularly in on-premises setups, and a lack of automated mitigation.
To address these challenges, this study proposes a cloud-native, automated hybrid IDPS framework combining machine learning anomaly detection with signature-based methods using Snort and Suricata. It features IPS-driven mitigation with Drop and Reject policies and automation for efficient deployment. Real-time monitoring and forensics are enabled via Kibana, and benchmark datasets such as CIC-IDS2017 and UNSW-NB15 are used for training and evaluation [2], [3].
III. Data collection
3.1 Overview of Existing Methods.
Intrusion Detection Systems (IDS) rely on signature-based and anomaly-based methods, each with pros and cons. Signature-based IDS like Snort and Suricata detect known threats accurately with few false positives but struggle with zero-day attacks and need constant updates. Anomaly-based IDS use machine learning to catch novel threats by identifying abnormal behavior, though they often generate false positives and demand significant resources.
3.2 Proposed Architecture and Advantages.
For a scalable cloud-based solution, the suggested IDPS integrates automated threat mitigation with signature and anomaly detection. While Suricata and Snort manage real-time traffic analysis, Terraform and Ansible automate deployment. Kibana offers comprehensive visualisations, and Docker guarantees scalable, modular deployment. Rapid, hands-free threat response is made possible by automated rule updates that log security events to Elasticsearch.
The main advantages of this architecture are enhanced detection of both known and unknown threats, scalable deployment through Docker and cloud infrastructure, and decreased configuration errors through automation. While Kibana improves monitoring and operational insights for proactive defence management, real-time mitigation capabilities lessen damage from ongoing attacks.
IV. Methodology
4.1 Data Selection and Analysis.
Three reference datasets are used to assess the suggested IDPS. Synthetic traffic from NSL-KDD is categorised but out of date. Class imbalance and increased computational demands are introduced by CIC-IDS2017, which also incorporates realistic modern attacks like brute force and botnets. Though it might require feature improvement for uncommon attack types, UNSW-NB15 provides realistic, varied, and balanced traffic. Preprocessing (dealing with duplicates, missing values, and encoding), cleaning, and normalising numerical features are all part of data analysis. In order to balance classes and lessen overfitting, exploratory data analysis (EDA) uses resampling to find attack patterns, class imbalances, and feature correlations. Time-series techniques are used to examine temporal trends, and false positive and negative rates aid in the optimisation of detection thresholds. Metrics like Accuracy, Precision, Recall, and F1-score are used to evaluate performance in order to balance detection quality on unbalanced data. Although ROC-AUC summarises overall detection effectiveness by balancing sensitivity and false alarms, False Positive Rate (FPR) and False Negative Rate (FNR) measure benign misclassification and missed attacks.
4.2 Detailed Structure of Practical Implementation.
The suggested Intrusion Detection and Prevention System (IDPS) combines anomaly-based and signature-based detection in a scalable cloud environment using a layered, modular architecture. It consists of five key layers:
Fig. 1. Representation of the System Architecture
The proposed IDPS consists of five integrated layers. The Infrastructure Layer uses Terraform to automate cloud provisioning of VMs, VPCs, firewalls, load balancers, and monitoring, allowing horizontal scalability. The Detection Layer uses cloud virtual machines (VMs) to run Suricata and Snort for anomaly and signature-based detection. The Data Management & Visualization Layer logs events to Elasticsearch and uses Kibana for real-time alert visualization and forensic analysis. The Response & Prevention Layer runs Suricata in IPS mode to auto-block threats by updating firewall rules based on predefined thresholds. Finally, the Containerization & Orchestration Layer employs Docker and Docker Compose for modular deployment, fault isolation, and efficient resource use.
V. Discussion and conclusion
In cloud environments, the evaluation of the suggested IDPS showed good scalability, quick response times, and high detection accuracy. Whereas Docker made it easier to deploy and maintain components like Suricata and Kibana, Terraform made it possible to provision resources dynamically. In contrast to conventional passive IDS solutions, system's automated IPS actively blocks attacks in real time. Utilising datasets like NSL-KDD and CIC-IDS2017, machine learning-based behavioural analysis improved anomaly detection and decreased false positives, increasing sensitivity to new threats. Nevertheless, detection of zero-day exploits is limited by Suricata and Snort's reliance on predefined signature rules.
Despite these drawbacks, the IDPS strikes a solid balance between protection and automation, offering proactive threat mitigation well suited for cloud-based enterprises and critical sectors needing minimal downtime. Future improvements could include integrating deep learning for more refined anomaly detection and blockchain for secure event logging, enhancing resilience against evolving cyber threats. This study establishes a foundation for next-generation hybrid, automated IDPS architectures combining machine learning with real-time prevention.
References:
- Roesch, M. (1999). Snort: Lightweight intrusion detection for networks. Proceedings of the 13th USENIX Conference on System Administration (LISA), 229–238.
- Shone, N., Ngoc, T. N., Phai, V. D., & Shi, Q. (2018). A deep learning approach to network intrusion detection. IEEE Transactions on Emerging Topics in Computational Intelligence, 2(1), 41–50. https://doi.org/10.1109/TETCI.2017.27727 92
- Sommer, R., & Paxson, V. (2010). Outside the closed world: On using machine learning for network intrusion detection. 2010 IEEE Symposium on Security and Privacy, 305–316. https://doi.org/10.1109/SP.2010.25
- Scully, T., & McIntosh, M. (2022). Infrastructure as Code: Using Terraform for Secure Cloud Deployments. Journal of Cloud Computing Research, 7(1), 50–67.
- Baker, S., Smith, J., & Wilson, R. (2016). Improving Intrusion Detection Systems Using Multithreaded Architectures. International Journal of Computer Applications, 135(7), 20–25.
- Vinayakumar, R., Soman, K. P., & Poornachandran, P. (2019). Evaluating deep learning approaches to intrusion detection for cloud-based network data. International Journal of Information Security, 18(6), 613–624. https://doi.org/10.1007/s10207–018–0423–5
- Canadian Institute for Cybersecurity. (2017). CIC-IDS2017 Dataset. Retrieved from https://www.unb.ca/cic/datasets/ids 2017.html
- Moustafa, N., & Slay, J. (2015). UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). 2015 Military Communications and Information Systems Conference (MilCIS), 1–6. https://doi.org/10.1109/MilCIS.2015.7348 942