Advanced Machine Learning Approach to Handle Code Injection Attacks in Cloud Computing
Main Article Content
Abstract
Cloud computing is one significant paradigm in business oriented applications; it is an emerging technology to believe clients to store their in secured format to resource provisioning with other users. There are different types of enhanced security mechanisms on earlier users present in distributed environment. Aggregated Key Management and Cryptosystem (AKM&C) is one of the approaches to provide security in multi file sharing with single aggregate key in distributed environment. In web oriented distributed environment, code injection related attacks were appeared to access information stored in web data server developed in HTML and CSS for the implementation of different out sourced data in cloud. So that in this paper, we propose Machine Learning with Cross Script Code based approach (MLCSCA) to handle and detect code injection related attacks on cloud computing. In this approach, detection of XSS, code injection related attacks is performed based on URLs, web page and cloud resource data. Data set is prepared based on web data available in storage server with different parameters. Evaluate the efficiency of the proposed approach to compare with existing approaches like AKM&C and others. Evaluation results show effective performance with respect to accuracy and other parameter results in distributed environment
Downloads
Metrics
Article Details
Licensing
TURCOMAT publishes articles under the Creative Commons Attribution 4.0 International License (CC BY 4.0). This licensing allows for any use of the work, provided the original author(s) and source are credited, thereby facilitating the free exchange and use of research for the advancement of knowledge.
Detailed Licensing Terms
Attribution (BY): Users must give appropriate credit, provide a link to the license, and indicate if changes were made. Users may do so in any reasonable manner, but not in any way that suggests the licensor endorses them or their use.
No Additional Restrictions: Users may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.