Advanced Machine Learning Approach to Handle Code Injection Attacks in Cloud Computing
Main Article Content
Abstract
Cloud computing is one significant paradigm in business oriented applications; it is an emerging technology to believe clients to store their in secured format to resource provisioning with other users. There are different types of enhanced security mechanisms on earlier users present in distributed environment. Aggregated Key Management and Cryptosystem (AKM&C) is one of the approaches to provide security in multi file sharing with single aggregate key in distributed environment. In web oriented distributed environment, code injection related attacks were appeared to access information stored in web data server developed in HTML and CSS for the implementation of different out sourced data in cloud. So that in this paper, we propose Machine Learning with Cross Script Code based approach (MLCSCA) to handle and detect code injection related attacks on cloud computing. In this approach, detection of XSS, code injection related attacks is performed based on URLs, web page and cloud resource data. Data set is prepared based on web data available in storage server with different parameters. Evaluate the efficiency of the proposed approach to compare with existing approaches like AKM&C and others. Evaluation results show effective performance with respect to accuracy and other parameter results in distributed environment
Downloads
Metrics
Article Details
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.