151. Intrusion Management to avoid Web-Form Spamming in Cloud based architectures
- Author
-
Mohammad Ahmad Mohammad Nasimuddin, Rund Fareed Mahafdah, Ahmed Masih Uddin Siddiqi, Danish Ahamad, Nayyar Ahmed Khan, and Omaia Mohammad Alomari
- Subjects
Computer science ,business.industry ,Distributed computing ,Cloud computing ,02 engineering and technology ,Permission ,Application layer ,Spamming ,Intrusion ,Order (business) ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business - Abstract
the concept of cloud computing is actually implemented in order to provide a mechanism which makes data truly available and mobile in nature. The availability of the information which resides in the cloud computing environment is designed in such a manner such that the data is accessible and available to all the devices on demand. The best practice of implementation of cloud-based application is to integrate at lower levels, network intrusion detection system. These systems are actually artificially intelligent in nature to decide which application has to be given permission and which has to be blocked. In this paper we are proposing a very user-friendly and fast with high productivity, network intrusion detection system. This system works at the application layer, and it is artificially intelligent that is applicable on the Cloud architecture for the prevention of the spamming of the web forms.
- Published
- 2019