Design a New Protocol for Vulnerability Detection in Cloud Computing Security Improvement

Social Science Research Network(2021)

引用 2|浏览1
暂无评分
摘要
Vulnerability attacks will result in breaches of security or desecration of the security policy of the system resulting in information leakage or financial loss. While countless tracking methods have been described, such as static analysis, dynamic analysis and machine learning methods, the vulnerabilities are still difficult to identify. We suggest a fresh weakness tracking protocol in cloud computing security enhancement in this study job, which is available and hybrid mixing linear, vibrant and hybrid computational into cloud computing. Our suggested main protocol assesses the objects statically and records potential sensitive items. And so, semi-automatically produces and tests for the machine learning elements. Finally, to control whether they are vulnerabilities or not, the implications are statically analysed again. Using Vul cloud to enforce our proposed protocol. To examine and consider changes between virtualization vulnerabilities and traditional software vulnerabilities in different organizations. Based on the results, a novel testing system for virtualization systems to identify these vulnerabilities was designed to outspread the figurative running techniques and to identify bugs in virtualization applications. Developing a fresh protocol for cloud security weakness identification.
更多
查看译文
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要