Vis enkel innførsel

dc.contributor.authorLu, Chenmao
dc.contributor.authorDai, Hong-Ning
dc.contributor.authorZhou, Junhao
dc.contributor.authorWang, Hao
dc.date.accessioned2021-11-01T14:26:28Z
dc.date.available2021-11-01T14:26:28Z
dc.date.created2021-09-03T07:49:55Z
dc.date.issued2021
dc.identifier.isbn978-3-030-69991-8
dc.identifier.urihttps://hdl.handle.net/11250/2826996
dc.description.abstractCloud computing offers elastic and ubiquitous computing services, thereby receiving extensive attention recently. However, cloud servers have also become the targets of malicious attacks or hackers due to the centralization of data storage and computing facilities. Most intrusion attacks to cloud servers are often originated from inner or external networks. Intrusion detection is a prerequisite to designing anti-intrusion countermeasures of cloud systems. In this paper, we explore deep learning algorithms to design intrusion detection methods. In particular, we present a deep learning-based method with the integration of conventional neural networks, self-attention mechanism, and Long short-term memory (LSTM), namely CNN-A-LSTM to detect intrusion. CNN-A-LSTM leverages the merits of CNN in processing local correlation data and extracting features, the time feature extracting capability of LSTM, and the self-attention mechanism to better exact features. We conduct extensive experiments on the KDDcup99 dataset to evaluate the performance of our CNN-A-LSTM model. Compared with other machine learning and deep learning models, our CNN-A-LSTM has superior performance.en_US
dc.language.isoengen_US
dc.publisherSpringeren_US
dc.relation.ispartofCloud Computing: 10th EAI International Conference, CloudComp 2020 Qufu, China, December 11–12, 2020 Proceedings
dc.titleExploring Self-attention Mechanism of Deep Learning in Cloud Intrusion Detectionen_US
dc.typeChapteren_US
dc.description.versionacceptedVersionen_US
dc.rights.holderThis is the authors' accepted manuscript to an article published by Springer. Locked until 13.2.2023 due to copyright restrictions.en_US
dc.source.pagenumber57-73en_US
dc.identifier.doi10.1007/978-3-030-69992-5_5
dc.identifier.cristin1931008
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel