References [1] M. Nadeem, A. Arshad, S. Riaz, S. S. Band and A. Mosavi , “Intercept the cloud network from brute force and ddos attacks via intrusion detection and prevention system,”IEEE Access, vol. 9, pp. 152300–152309, 2021. [2] S. Ustebay , Z. Turgut and M. A. Aydin, “Intrusion detection system with recursive feature elimination by using random forest and deep learning classifier,” in 2018 Int. Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), Ankara, Turkey, pp. 71–76, 2018. [3] S. K. Wagh , V. Pachghare and S. Kolhe , “Survey on intrusion detection system using machine learning techniques,” International Journal of Computer Applications, vol. 78, no. 16, pp. 30–37, 2013. [4] C. Stergiou, K. E. Psannis , B. GyuKim and B. Gupta, “Secure integration of iot and cloud computing,” Future Generation Computer Systems, vol. 78, no. 54, pp. 964–975, 2018. [5] N. G. McDonald, “Past, present and future methods of cryptography and data encryption,”in A Research Review. University of Utah, 2020.