Proactive Web Server Protocol for Complaint Assessment
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 6, Issue 4
Abstract
Vulnerability Discovery with attack Injection security threats are increasing for the server software, when software is developed, the software tested for the functionality. Due to un-awareness of software vulnerabilities most of the software before pre-Release the software should be thoroughly tested for not only functionality reliability, but should be tested for the security flaws (or) ulnerabilities. The approaches such as fuzzers, Fault injection, vulnerabilities scanners,static vulnerabilities analyzers, Runtime prevention mechanisms and software Rejuvenation are identifying the un-patched software which is open for security threats address to solve the problem “security testing”. These techniques are useful for generating attacks but cannot be extendable for the new land of attacks. The system called proactive vulnerability attack injection tool is suitable for adding new attacks injection vectors, methods to define new protocol states (or) Specification using the interface of tool includes Network server protocol specification using GUI, Attacks generator, Attack injector, monitoring module at the victim injector, monitoring module at the victim machine and the attacks injection report generation. This tool can address most of the vulnerabilities (or) security flows
Authors and Affiliations
G. Vijay Kumar , Ravikumar S. Raykundaliya , Dr. P. Naga Prasad
Embedding a Non-Standard Encryption/Decryption Method with Mathematical Draw Function to Meet Challenges in Mobility
Our innovation and personal information are passes through air in wireless network and their secrecy can be preserved by using any one of the encryption method. Nowadays mobile plays a vital role in passing messages and...
Improving Routing Performance by Using Neighbor Coverage Knowledge and Energy Aware Metric in Mobile Adhoc Networks
A mobile adhoc network is an independent collection of mobile nodes without having the fixed infrastructure. In the mobile adhoc networks, because of the high mobility of the nodes there is frequent link breakage that ca...
Performance Enhancement in Power aware Ad hoc Routing using Highly Probable Link
In today’s fast-moving world connectivity is the biggest trend to look out for and connecting devices with varying specifications is not a simple task. This becomes more of a problem in an environment where all devices,...
Mas Based Framework for Recruitment of Fresher’s By CMM Level Company
Every company has to hire freshers for its business process the hiring process involves time and cost of company this costing increase when in a particular drive company does not get appropriate candidates for hiring. Th...
Enhancing Adaptive Content Based Face Image Retrieval in Database
To address one of the important and challenging problems – large-scale content-based face image retrieval. Given a query face image, content-based face image retrieval tries to find similar face images from a large image...