The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Analyzing Virtualization Vulnerabilities and Design a Secure Cloud Environment to Prevent From XSS Attack
Abstract
Cloud virtualization has created an enormous impact on IT and networking worlds. A cloud environment is built on virtualization technology. Virtualization and its exclusive architecture have numerous features and advantages over non-conventional virtual machines. However, these new uniqueness create new vulnerabilities and attacks on a virtualization based cloud system. Cross Site Scripting (XSS) is among the top cloud vulnerabilities, according to recent studies. This exposure occurs when a user uses the input from a cloud environment application without properly looking into them. This allows an attacker to execute malicious scripts in cloud. The scripts execute harmful actions when a user visits the exploited cloud. Current approaches to mitigate this problem, especially on effective detection of XSS vulnerabilities in the application or prevention of real-time XSS attacks. To address this problem, the survey of different vulnerability attacks on cloud virtualization performed and also presents a concept for the removal of XSS vulnerabilities to secure the cloud environment.
Related Content
A. Ashwini, S. Balasubramaniam, Seifedine Kadry.
© 2025.
26 pages.
|
Bhupinder Singh, Christian Kaunert.
© 2025.
20 pages.
|
A. Ashwini, V. Kavitha, S. Balasubramaniam, B. Sundaravadivazhagan.
© 2025.
30 pages.
|
Abhinav Kumar, Anindya Bag, Aseem Anand, Siddhant Saha, Hitesh Mohapatra, Manjur Kolhar.
© 2025.
22 pages.
|
Bhupinder Singh, Christian Kaunert.
© 2025.
22 pages.
|
M. Abinaya.
© 2025.
30 pages.
|
Dipti Chauhan, Jay Kumar Jain.
© 2025.
28 pages.
|
|
|