Proactive Web Server Protocol for Complaint Assessment
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 6, Issue 4
Abstract
Vulnerability Discovery with attack Injection security threats are increasing for the server software, when software is developed, the software tested for the functionality. Due to un-awareness of software vulnerabilities most of the software before pre-Release the software should be thoroughly tested for not only functionality reliability, but should be tested for the security flaws (or) ulnerabilities. The approaches such as fuzzers, Fault injection, vulnerabilities scanners,static vulnerabilities analyzers, Runtime prevention mechanisms and software Rejuvenation are identifying the un-patched software which is open for security threats address to solve the problem “security testing”. These techniques are useful for generating attacks but cannot be extendable for the new land of attacks. The system called proactive vulnerability attack injection tool is suitable for adding new attacks injection vectors, methods to define new protocol states (or) Specification using the interface of tool includes Network server protocol specification using GUI, Attacks generator, Attack injector, monitoring module at the victim injector, monitoring module at the victim machine and the attacks injection report generation. This tool can address most of the vulnerabilities (or) security flows
Authors and Affiliations
G. Vijay Kumar , Ravikumar S. Raykundaliya , Dr. P. Naga Prasad
Performance Evaluation of VOIP over Multi Radio Multi channel Network
Wireless mesh network is an advanced form of wireless network. A wireless mesh network provides a better solution to problems that often arise in cellular and WLAN. Wireless mesh networks (WMNs) are receiving increasing...
Query Based Expert Search Based on Relevance Class and Web Page Quality Ranking
Expert search is mostly used in the areas of academic groups, organizations. The general expert search problem which is observed is searching experts on the web where lot of web pages and experts names are considered. It...
MIMO Schemes With Spatial Modulation in Wireless Communication
The combination of spatial modulation (SM) and space-time block coding (STBC) provides more advantages than other modulation techniques. In the MA-SM system, the transmitted symbols are mapped into a high dimensional con...
Reducing Binding update in NEMO Supported PMIPV6
Proxy Mobile IPV6 (PMIPV6) is a network-based mobility management protocol,designed to keep track of individual mobile node’s mobility. Numerous research works are in progress to enhance functionality of PMIPV6 to suppor...
Cluster Chain Based Relay Nodes Assignment
Wireless sensor Networks are very famous these days due to their coverage and enormous benefits. Clustering the sensor nodes efficiently and dynamically with least energy consumption is the current issue in front of rese...