{"title":"Trusted Security Model for IDS Using Deep Learning","authors":"K. Makdi, Frederick T. Sheldon, A. A. Hussein","doi":"10.1109/ICSPIS51252.2020.9340136","DOIUrl":null,"url":null,"abstract":"Contemporarily, cloud computing is becoming the most preferred choice for IT firms because it offers flexibility and pay-per-use services. Nonetheless, privacy and security issues are significant challenges in the successful deployment of cloud computing attributed to its distributed and open architectures that are exposed to intrusions. The open and distributed structures of cloud computing are increasingly appealing to potential cybercriminals. Conventional intrusion detection systems are largely ineffective in the cloud computing environment because of their openness. This paper examines the deployment of novel intrusion detection systems involving a trust-based adaptive security model for intrusion detection through deep learning.","PeriodicalId":373750,"journal":{"name":"2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSPIS51252.2020.9340136","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Contemporarily, cloud computing is becoming the most preferred choice for IT firms because it offers flexibility and pay-per-use services. Nonetheless, privacy and security issues are significant challenges in the successful deployment of cloud computing attributed to its distributed and open architectures that are exposed to intrusions. The open and distributed structures of cloud computing are increasingly appealing to potential cybercriminals. Conventional intrusion detection systems are largely ineffective in the cloud computing environment because of their openness. This paper examines the deployment of novel intrusion detection systems involving a trust-based adaptive security model for intrusion detection through deep learning.