Cyberattack Detection in Mobile Cloud Computing: A Deep Learning Approach

12/16/2017
by   Khoi Khac Nguyen, et al.
0

With the rapid growth of mobile applications and cloud computing, mobile cloud computing has attracted great interest from both academia and industry. However, mobile cloud applications are facing security issues such as data integrity, users' confidentiality, and service availability. A preventive approach to such problems is to detect and isolate cyber threats before they can cause serious impacts to the mobile cloud computing system. In this paper, we propose a novel framework that leverages a deep learning approach to detect cyberattacks in mobile cloud environment. Through experimental results, we show that our proposed framework not only recognizes diverse cyberattacks, but also achieves a high accuracy (up to 97.11 we present the comparisons with current machine learning-based approaches to demonstrate the effectiveness of our proposed solution.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/16/2017

A Stochastic Programming Approach for Risk Management in Mobile Cloud Computing

The development of mobile cloud computing has brought many benefits to m...
research
12/15/2020

Enhancing Data Security in the User Layer of Mobile Cloud Computing Environment: A Novel Approach

This paper reviews existing Intrusion Detection Systems (IDS) that targe...
research
05/19/2018

Robust Optimization over Multiple Domains

Recently, machine learning becomes important for the cloud computing ser...
research
05/12/2018

Incremental Learning Framework Using Cloud Computing

High volume of data, perceived as either challenge or opportunity. Deep ...
research
01/04/2023

An Ensemble Mobile-Cloud Computing Method for Affordable and Accurate Glucometer Readout

Despite essential efforts towards advanced wireless medical devices for ...
research
04/15/2020

A Mobile Cloud-Based eHealth Scheme

Mobile cloud computing is an emerging field that is gaining popularity a...
research
08/26/2022

Remote Data Auditing and How it May Affect the Chain of Custody in a Cloud Environment

As big data collection continues to grow, more and more organizations ar...

Please sign up or login with your details

Forgot password? Click here to reset