Proactive Web Server Protocol for Complaint Assessment

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 6, Issue 4

Abstract

Vulnerability Discovery with attack Injection security threats are increasing for the server software, when software is developed, the software tested for the functionality. Due to un-awareness of software vulnerabilities most of the software before pre-Release the software should be thoroughly tested for not only functionality reliability, but should be tested for the security flaws (or) ulnerabilities. The approaches such as fuzzers, Fault injection, vulnerabilities scanners,static vulnerabilities analyzers, Runtime prevention mechanisms and software Rejuvenation are identifying the un-patched software which is open for security threats address to solve the problem “security testing”. These techniques are useful for generating attacks but cannot be extendable for the new land of attacks. The system called proactive vulnerability attack injection tool is suitable for adding new attacks injection vectors, methods to define new protocol states (or) Specification using the interface of tool includes Network server protocol specification using GUI, Attacks generator, Attack injector, monitoring module at the victim injector, monitoring module at the victim machine and the attacks injection report generation. This tool can address most of the vulnerabilities (or) security flows

Authors and Affiliations

G. Vijay Kumar , Ravikumar S. Raykundaliya , Dr. P. Naga Prasad

Keywords

Related Articles

FPGA Implementation of Lifting DWT based LSB Steganography using Micro Blaze Processor

We present an information hiding technique that utilizes lifting schemes to effectively hide information in images. A successful information hiding should result in the extraction of the hidden data from the image with h...

Data Concealing in Encrypted Images Using Reversible Data Hiding (RDH) Technique

In the new era of technology,more attention is needed to be given to hide some personal data or secret information, etc. This can be exactly brought out through Reversible Data [1] Hiding,since it maintains the splendid...

Comparative Study of Sleep Mode Interleaving and Energy Efficiency Substream Allocation Algorithm

This paper deals with algorithms which provides solutions to energy saving. Energy saving is affected by the frequency allocation of bandwidth mechanisms. This problem is solved by two methods. First one is novel sleep-m...

Review of MANETS Using Distributed Public-key Cryptography

Ensuring security is something that is not easily done as many of the demands of network security conflict with the demands of mobile networks, majorly because of the nature of the mobile devices (e.g. low power consumpt...

Enhancing Adaptive Content Based Face Image Retrieval in Database

To address one of the important and challenging problems – large-scale content-based face image retrieval. Given a query face image, content-based face image retrieval tries to find similar face images from a large image...

Download PDF file
  • EP ID EP162317
  • DOI -
  • Views 113
  • Downloads 0

How To Cite

G. Vijay Kumar, Ravikumar S. Raykundaliya, Dr. P. Naga Prasad (2013). Proactive Web Server Protocol for Complaint Assessment. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 6(4), 236-241. https://europub.co.uk/articles/-A-162317