Research Article Volume 4 Issue 12

Adaptive Trust-based Security Model for Intrusion Detection Using Deep Learning Technique in the Cloudb>

Khalid Al Makdi1,2* and Frederick T Sheldon1

1Computer Science Department, University of Idaho, Moscow, USA
2Computer Science Department, Najran University, Najran, Saudi Arabia

*Corresponding Author: Khalid Al Makdi, Computer Science Department, University of Idaho, Moscow, USA.

Received: April 15, 2022; Published: November 29, 2022


With the increasing numbers of Internet-connected devices, security and privacy issues are the biggest barriers to widespread cloud systems. Securing cloud systems has become a major concern for everyone, including consumers, businesses, and the government. While attacks on any system may never be completely stopped, real-time detection of threats is essential for efficient system defence. Limited research has been done on effective intrusion detection systems for IoT (Internet of Things) environments. In this paper, the authors provide a unique intrusion detection system that detects security anomalies in cloud networks using machine learning algorithms. This trust-based security paradigm acts as a service, allowing for interoperability between the many network communications protocols used in cloud systems. The authors present the system's framework and the intrusion detection procedure in detail. The proposed intrusion detection system is tested on real network traces for proof-of-concept and simulation for scalability using Deep Learning techniques and XGboost algorithm. The results shows 96% accuracy and proves that the suggested intrusion detection system is capable of effectively detecting real-world intrusions.

Keywords: Internet of Things (IoT); Cloud Computing; Software


  1. Abbes T., et al. “Efficient decision tree for protocol analysis in intrusion detection”. International Journal of Security and Networks4 (2010): 220-235.
  2. Aburomman AA and Reaz MBI. “A Survey of intrusion detection systems based on ensemble and hybrid classifiers”. Computers and Security 65 (2017): 135-152.
  3. Aldweesh A., et al. “Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues”. Knowledge-Based Systems (2019): 105124.
  4. Aljamal I., et al. “Hybrid Intrusion Detection System Using Machine Learning Techniques in Cloud Computing Environments”. In: 2019 IEEE 17th International Conference on Software Engineering Research, Management and Applications (SERA). May 2019, IEEE (2019): 84-89.
  5. Bhosale KS., et al. “Modified Naive Bayes Intrusion Detection System (MNBIDS)”. In: 2018 International Conference on Computational Techniques, Electronics and Mechanical Systems (CTEMS). December 2018, IEEE (2018): 291-296.
  6. Chkirbene Z., et al. “Hybrid Machine Learning for Network Anomaly Intrusion Detection”. In: 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT). February 2020, IEEE (2020): 163-170.
  7. Chockwanich N and Visoottiviseth V. “Intrusion Detection by Deep Learning with TensorFlow”. In: 2019 21st International Conference on Advanced Communication Technology (ICACT). February 2019, IEEE (2019): 654-659.
  8. Dey S., et al. “A machine learning based intrusion detection scheme for data fusion in mobile clouds involving heterogeneous client networks”. Information Fusion 49 (2019): 205-215.
  9. Dhaliwal S., et al. “Effective Intrusion Detection System Using XGBoost”. Information 7 (2018): 149.
  10. Elmasry W., et al. “Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic”. Computer Networks 168 (2020): 107042.
  11. Elrawy MF., et al. “Intrusion detection systems for IoT-based smart environments: a survey”. Journal of Cloud Computing1 (2018): 21.
  12. Farnaaz N and Jabbar. “Random Forest Modeling for Network Intrusion Detection System”. Procedia Computer Science 89 (2016): 213-217.
  13. Ferrag MA., et al. “Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study”. Journal of Information Security and Applications 50 (2020): 102419.
  14. Ge M., et al. “Deep Learning-Based Intrusion Detection for IoT Networks”. In: 2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC). December 2019, IEEE (2019): 256-25609.
  15. Ghanshala KK., et al. “BNID: A Behavior-based Network Intrusion Detection at Network-Layer in Cloud Environment”. In: 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC). December 2018, IEEE (2018): 100-105.
  16. Gulla KK., et al. “Machine learning based intrusion detection techniques”. In: Handbook of computer networks and cyber security. Springer (2020): 873-888.
  17. Gurung S., et al. “Deep Learning Approach on Network Intrusion Detection System using NSL-KDD Dataset”. International Journal of Computer Network and Information Security3 (2019): 8-14.
  18. Idhammad M., et al. “Distributed Intrusion Detection System for Cloud Environments based on Data Mining techniques”. Procedia Computer Science 127 (2018): 35-41.
  19. Ieracitano C., et al. “Statistical Analysis Driven Optimized Deep Learning System for Intrusion Detection”. In: (2018): 759-769.
  20. Iqbal S., et al. “On cloud security attacks: A taxonomy and intrusion detection and prevention as a service”. Journal of Network and Computer Applications 74 (2016): 98-120.
  21. Jansen W and Grance T. “Guidelines on security and privacy in public cloud computing” (2011).
  22. Karatas G., et al. “Deep Learning in Intrusion Detection Systems”. In: 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT). December 2018, IEEE (2018): 113-116.
  23. Kumar R and Goyal R. “On cloud security requirements, threats, vulnerabilities and countermeasures: A survey”. Computer Science Review 33 (2019): 1-48.
  24. Kumari V and Varma RK. “A semi-supervised intrusion detection system using active learning SVM and fuzzy c-means clustering”. In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC). February 2017, IEEE (2017): 481-485.
  25. Lin H., et al. “Adaptive security-related data collection with context awareness”. Journal of Network and Computer Applications 126 (2019): 88-103.
  26. Millar K., et al. “Deep learning for classifying malicious network traffic”. In: Pacific-Asia Conference on Knowledge Discovery and Data Mining. 2018, Springer (2018): 156-161.
  27. Mohammadi M and Al-Fuqaha A. “Enabling Cognitive Smart Cities Using Big Data and Machine Learning: Approaches and Challenges”. IEEE Communications Magazine2 (2018): 94-101.
  28. Moon D., et al. “Host-based intrusion detection system for secure human-centric computing”. The Journal of Supercomputing 7 (2016): 2520-2536.
  29. Otoum S., et al. “On the Feasibility of Deep Learning in Sensor Network Intrusion Detection”. IEEE Networking Letters 2 (2019): 68-71.
  30. Peker M., et al. “A novel hybrid method for determining the depth of anesthesia level: Combining ReliefF feature selection and random forest algorithm (ReliefF+RF)”. In: 2015 International Symposium on Innovations in Intelligent SysTems and Applications (INISTA). September 2015, IEEE (2015): 1-8.
  31. Ponkarthika M and Saraswathy VR. “Network intrusion detection using deep neural networks”. Asian Journal of Science and Technology2 (2018): 665-673.
  32. Rajagopal S., et al. “A Stacking Ensemble for Network Intrusion Detection Using Heterogeneous Datasets”. Security and Communication Networks (2020a): 1-9.
  33. Rajagopal S., et al. “A predictive model for network intrusion detection using stacking approach”. International Journal of Electrical and Computer Engineering (IJECE) 3 (2020b): 2734.
  34. Riyaz B and Ganapathy S. “A deep learning approach for effective intrusion detection in wireless networks using CNN”. Soft Computing22 (2020): 17265-17278.
  35. Sahmim S and Gharsellaoui H. “Privacy and Security in Internet-based Computing: Cloud Computing, Internet of Things, Cloud of Things: a review”. Procedia Computer Science 112 (2017): 1516-1522.
  36. Selvakumar B and Muneeswaran K. “Firefly algorithm based feature selection for network intrusion detection”. Computers and Security 81 (2019): 148-155.
  37. Shams E., et al. “Trust aware support vector machine intrusion detection and prevention system in vehicular ad hoc networks”. Computers and Security 78 (2018): 245-254.
  38. Shanhong Liu. “Size of the cloud computing and hosting market market worldwide from 2010 to 2020 (in billion U.S. dollars)*”. (2018).
  39. Shone N., et al. “A Deep Learning Approach to Network Intrusion Detection”. IEEE Transactions on Emerging Topics in Computational Intelligence 1 (2018): 41-50.
  40. Sultana N., et al. “Survey on SDN based network intrusion detection system using machine learning approaches”. Peer-to-Peer Networking and Applications 2 (2019): 493-501.
  41. Susilo B and Sari RF. “Intrusion Detection in IoT Networks Using Deep Learning Algorithm”. Information 5 (2020): 279.
  42. Szilagyi I and Wira P. “An intelligent system for smart buildings using machine learning and semantic technologies: A hybrid data-knowledge approach”. In: 2018 IEEE Industrial Cyber-Physical Systems (ICPS). May 2018, IEEE (2018): 20-25.
  43. Taghavinejad SM., et al. “Intrusion Detection in IoT-Based Smart Grid Using Hybrid Decision Tree”. In: 2020 6th International Conference on Web Research (ICWR). April 2020, IEEE (2020): 152-156.
  44. Taher KA., et al. “Network Intrusion Detection using Supervised Machine Learning Technique with Feature Selection”. In: 2019 International Conference on Robotics,Electrical and Signal Processing Techniques (ICREST). January 2019, IEEE (2019): 643-646.
  45. Wang Y., et al. “Privacy-Preserving Cloud-Based Road Condition Monitoring With Source Authentication in VANETs”. IEEE Transactions on Information Forensics and Security7 (2019): 1779-1790.
  46. Wang Z. “Deep Learning-Based Intrusion Detection With Adversaries”. IEEE Access, 6 (2018): 38367-38384.
  47. Journal of Physical Mathematics1 (2016).


Citation: Khalid Al Makdi and Frederick T Sheldon. “Adaptive Trust-based Security Model for Intrusion Detection Using Deep Learning Technique in the Cloud".Acta Scientific Computer Sciences 4.12 (2022): 83-95.


Copyright: © 2022 Khalid Al Makdi and Frederick T Sheldon. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.


Acceptance rate35%
Acceptance to publication20-30 days

Indexed In

News and Events

  • Certification for Review
    Acta Scientific certifies the Editors/reviewers for their review done towards the assigned articles of the respective journals.
  • Submission Timeline for Upcoming Issue
    The last date for submission of articles for regular Issues is July 10, 2024.
  • Publication Certificate
    Authors will be issued a "Publication Certificate" as a mark of appreciation for publishing their work.
  • Best Article of the Issue
    The Editors will elect one Best Article after each issue release. The authors of this article will be provided with a certificate of "Best Article of the Issue"
  • Welcoming Article Submission
    Acta Scientific delightfully welcomes active researchers for submission of articles towards the upcoming issue of respective journals.

Contact US