1. To study, design and implement ontology for cloud based web services attacks.
2. To design and implement ontology for HTTP vulnerability attacks by taking HTTP protocol and its structure.
3. To design semantic rules and implement ontology logic for detecting IMP Vulnerability attacks.
4. To detect malicious traffic. SQL injection, port hijack attacks by using protocols and vulnerability ontology.
5. To identify HTTP vulnerability attacks and private port attack.
6. To study different cloud cluster based attacks and implement datacrypt algorithm for individual cluster based dataset using cluster.
7. To apply optimization techniques tor the algorithm and resources to minimize time and space complexity