Research Paper #1 — Serverless Intelligent Firewall Series
Four steps to understand this research
Understand how the LSTM-based intelligent firewall integrates with AWS Lambda for serverless Zero-Trust enforcement.
Explore Architecture →Our research video walks through the problem statement, proposed framework, experimental setup, and key findings.
Watch Video →Explore model performance charts, confusion matrix, training curves, and comparative analysis showing LSTM at 98% accuracy.
View Results →Access the full 40-page comprehensive research report and interactive poster. Subscribe to unlock the full paper.
Get Report →The stateful and transient nature of serverless computing environments presents significant challenges to traditional network security, particularly in implementing Zero-Trust Architecture (ZTA) principles. Rule-based intrusion detection systems and traditional firewalls tend to be inflexible and context-insensitive, with little ability to protect transient, stateless functions.
This work proposes a Serverless Intelligent Firewall framework that combines deep learning-based intrusion detection with Zero-Trust enforcement for delivering adaptive, real-time threat detection in cloud-native systems. Drawing on the CICIDS2017 dataset, the novel approach employs a Long Short-Term Memory (LSTM) model to capture temporal patterns in traffic behavior, thereby discovering thinly disguised anomalies and synchronized attacks that stateless models often miss.
To address the inherent bias in class-imbalanced datasets, an undersampling approach was designed through preprocessing to mitigate model bias. The LSTM architecture achieved 98% accuracy, precision, recall, and F1-score, outperforming baseline models including Decision Trees (DT), Support Vector Machines (SVM), and Convolutional Neural Networks (CNN). The results validate the efficacy of our suggested architecture in enabling innovative, scalable, and Zero-Trust-compliant security within serverless settings.
Click any component to explore its role in the pipeline
👉 Click any component above to see details
| Parameter | Value |
|---|---|
| Architecture | 3-Layer LSTM |
| Hidden Units | 128 → 64 → 32 |
| Dropout Rate | 0.3 |
| Dense Layer | 64 units (ReLU) |
| Output | Softmax (5 classes) |
| Loss Function | Categorical Cross-Entropy |
| Optimizer | Adam |
| Learning Rate | 0.001 |
| Batch Size | 64 |
| Epochs | 120 (Early stop: 10) |
| Train/Test Split | 80% / 20% stratified |
| Class Imbalance | Weighted inverse frequency |
Complete walkthrough — problem, methodology, results, and implications
A look at the published IEEE paper — first page shown below. Full access requires the steps on the next section.
The ephemeral, stateless nature of serverless computing presents unique challenges to traditional network security. Conventional perimeter-based defenses and rule-based IDS are ill-equipped for transient, event-driven functions. We present a Serverless Intelligent Firewall (SIF) integrating LSTM-based deep learning intrusion detection with Zero-Trust Architecture (ZTA) enforcement on AWS Lambda. Using CICIDS2017 (2.8M+ flows, 78 features), our 3-layer LSTM achieved 98% accuracy, precision, recall, and F1-score, outperforming SVM (88.4%), Decision Tree (90.2%), and CNN (93.0%) at p < 0.05. Inference latency under 15 ms warm and 100 ms cold-start validates real-time deployment feasibility.
Keywords — Serverless computing, LSTM, Zero-Trust, IDS, CICIDS2017, AWS Lambda, deep learning
Cloud-native serverless architectures — AWS Lambda, Azure Functions, Google Cloud Run — have fundamentally changed application deployment. Functions execute ephemerally in milliseconds with no persistent state, making traditional stateful IDS mechanisms ineffective. This paper proposes a framework that addresses this gap through temporal deep learning combined with Zero-Trust enforcement...
Prior work in ML-based IDS has demonstrated strong performance on benchmark datasets (CICIDS2017, NSL-KDD) using CNN, LSTM, and hybrid architectures [3–7]. Federated IDS approaches achieve 97% on CICIDS2017 [8] but introduce communication overhead incompatible with stateless functions. No existing work specifically targets serverless deployment constraints...
We pre-processed CICIDS2017 by cleaning label whitespace, consolidating 14 attack types into 5 classes (BENIGN, DoS, DDoS, PortScan, Other), applying random undersampling to correct class imbalance, replacing ±∞/NaN with zero, and applying Z-score normalization per feature. The 3-layer LSTM (128→64→32 units, dropout 0.3, Adam lr=0.001) was trained for up to 120 epochs with early stopping (patience=10)...
Published in IEEE — Abstract is public. Full paper requires subscription & permission.
Gannon University, USA | University of the Potomac, USA
Abstract (Public)
The stateful and transient nature of serverless computing environments presents significant challenges to traditional network security, particularly in implementing Zero-Trust Architecture (ZTA) principles. This work proposes a Serverless Intelligent Firewall framework combining deep learning-based intrusion detection with Zero-Trust enforcement for adaptive, real-time threat detection in cloud-native systems. The LSTM architecture achieved 98% accuracy, precision, recall, and F1-score on the CICIDS2017 dataset, outperforming DT, SVM, and CNN baselines.
To access the full paper, please follow and subscribe to the author's channels:
Send an access request to the author. Include your name, institution, and reason for access.
✉ Send Permission Request EmailEnter the password you received from the author after permission is granted.
ℹ Password is provided by the author via email after reviewing your request.
Thank you for following the access protocol. You may now download the full paper.
Comprehensive performance evaluation across models, attack classes, and training dynamics
| Model | Accuracy | Precision | Recall | F1-Score |
|---|---|---|---|---|
| Decision Tree | 90.20% | 87.60% | 81.30% | 84.30% |
| SVM | 88.40% | 84.10% | 77.80% | 80.80% |
| CNN | 93.00% | 95.10% | 85.40% | 89.90% |
| LSTM (Proposed) | 98.00% | 98.00% | 98.00% | 98.00% |

Reaches ~98% after 60 epochs. Train and test curves tightly aligned — strong generalization, no overfitting.

Loss drops from >1.6 to <0.4 in 20 epochs, stabilizes at ~0.05. Smooth convergence, well-regularized.

DDoS: 9,989/10,000 • PortScan: 9,982/10,000 • BENIGN: 9,446 • DoS: 9,909 • Other: 3,556/3,606

DDoS and PortScan near-perfect. Other (rare attacks) maintains high recall 0.99 showing robustness.
| Class | Precision | Recall | F1-Score | Correct / Total |
|---|---|---|---|---|
| BENIGN | 0.99 | 0.94 | 0.96 | 9,446 / ~10,000 |
| DDoS | 0.99 | 1.00 | 0.99 | 9,989 / 10,000 |
| DoS | 0.98 | 0.99 | 0.98 | 9,909 / ~10,000 |
| PortScan | 0.99 | 1.00 | 0.99 | 9,982 / 10,000 |
| Other | 0.94 | 0.99 | 0.96 | 3,556 / 3,606 |
| Macro Average | 0.978 | 0.984 | 0.976 | — |
| Reference | Dataset | Model | Accuracy |
|---|---|---|---|
| Proposed Work | CIC-IDS2017 | LSTM | 98.00% |
| Altunay et al. (2023) | UNSW-NB15 | Hybrid CNN+LSTM | 93.21% |
| Bamber et al. (2025) | CIC-IDS2017 | Hybrid CNN-LSTM | 95.00% |
| Neto et al. FedSA (2022) | CIC-IDS2017 | Federated IDS | 97.00% |
Flip through the first three pages of the comprehensive research report
Project Title:
Master's in Information and Technology
College of Engineering & Business
Advisor: Ronny C. Bazan-Antequera, Ph.D.
Dept. of Computer and Information Science · Gannon University
Date of Submission: May, 2026
A decade ago, deploying a web application meant provisioning servers, configuring firewalls, and maintaining infrastructure around the clock. Today, the same application might run as a collection of short-lived functions that spin up in milliseconds, handle a request, and disappear. Platforms like AWS Lambda, Azure Functions, and Google Cloud Run have made this possible — and millions of organisations have adopted the model for its cost efficiency, elastic scalability, and near-zero operational overhead.
But this architectural revolution has quietly created a cybersecurity problem. Serverless functions are stateless by design — each invocation carries no memory of previous requests. Traditional firewalls and IDS, built around persistent sessions and stable network boundaries, simply cannot keep up with functions that live for milliseconds.
Zero-Trust rejects the perimeter security model entirely: "never trust, always verify." NIST SP 800-207 formalises this as three core principles — continuous verification of every access request, minimum necessary privilege, and designing systems that assume breaches will occur. When paired with machine learning, ZTA becomes a dynamic, adaptive enforcement layer rather than a set of static rules...
Full 40-page technical report — open to all, no subscription required
Gannon University • University of the Potomac
Explore the research at a glance — open to all, downloadable
A single-page interactive conference poster (48"×36") summarizing the entire study — CG 2026 academic template, ideal for conferences and presentations.
All research materials, code, and data — open and accessible
Full source code, notebooks, model files, and training scripts.
github.com/ANIS151993/Serverless-Intelligent-Firewall-Research-140-page comprehensive technical report — open access, no password needed.
report.htmlConference-style research poster, interactive and printable.
poster.htmlComplete video walkthrough of the methodology and results.
youtu.be/K04bOFbv204Raw performance metrics exported as CSV for reproducibility.
results_Final.csvView the published paper on IEEE Xplore — abstract and metadata publicly available.
ieeexplore.ieee.orgAuthor profile, citation metrics, and full publication list on Google Scholar.
scholar.google.comProfessional profile, experience, and research updates from the lead author.
linkedin.com/in/md-anisur-rahman-chowdhury-15862420aFull research profile, publications, and collaboration network.
researchgate.netLead author's personal portfolio — projects, research, and contact information.
marcbd.comQuestions, collaboration, or paper access requests.
engr.aanis@gmail.com