Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 8.14 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)
Abstract - Speaking of internet networks, of course, we are now familiar hearing that name, everyone in the world uses the internet for various purposes such as education, company, trade and even a small child even now has a lot use it. Of the many benefits of the internet, there is a huge threat lurk users like Phishing, Sniffing, Hacking, Cracking, Denial of Service Attack, Malicious and other crimes, both for testing or for irresponsible purposes responsibility, such as data theft, misuse of access rights, etc. With the threats - threats of course we as users will feel insecure because they can be a threat at any time it can attack our systems, data, and networks. Therefore in need is the good network security to prevent and handle threats like that. nature of the development of information technology that is now increasingly rapid, the need for network security will continue to increase of course in terms of security in maintaining information, data and network infrastructure, along with the increasing development of knowledge about hacking and cracking problems, even many of its security methods are growing, software and tools that are constantly being developed. Such as IDS (Intrusion Detection System), IDS is a security method that is used to detect events that occur on computer networks. Of course, detection alone is not enough so we need a method that is capable to prevent attacks that threaten unpins informatics study program networks. Consequently, under this scheme, we propose a new approach for intrusion detection based on SQL-Injections, Cross Server Side Scripts, and DDoS using Machine Learning Models (Random Forest and General Regressed Neural Network). Subsequently, we are able to mitigate and perform penetration testing and formulate the attacks on hosts (servers) over the Internet Service Provider (Server Configure on Cloud Infrastructure also) with the accuracy of 69.10% on Mail servers, Database servers, File System, FTP servers etc.
Keywords:
Database servers, File System, FTP servers
Cite Article:
"Response To Cloud Security On Collective Function", International Journal of Science & Engineering Development Research (www.ijrti.org), ISSN:2455-2631, Vol.7, Issue 7, page no.1189 - 1202, July-2022, Available :http://www.ijrti.org/papers/IJRTI2207185.pdf
Downloads:
000204868
ISSN:
2456-3315 | IMPACT FACTOR: 8.14 Calculated By Google Scholar| ESTD YEAR: 2016
An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 8.14 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator