Secure Network Communication Using Vulnerability Assessment Technique

Abstract

Vulnerability assessment has become an area of interest in distributed network communication which is capable of detecting the penetrations, break-ins and other form of computer abuse. The communication between a team and Management Information Base (MIB) within an organization which is out of the scope of firewall authentication can be made possible with the help of this system. In this paper, we propose an intrusion detection mechanism which is capable of detecting heterogeneous wireless sensor network (WSN) by characterizing intrusion detection with respect to the network parameters (Destination IP). The intention of this system is to reduce susceptibility using vulnerability assessment algorithm which covers the process of identifying and ranking the vulnerabilities in a system while ensuring required information is transferred securely without any failure in the middle of transaction. The three basic ideas involved are Furtive enigma, Destination IP address and Unlock key. It mainly focuses on system security by detecting the intruders and their system can be crashed by displaying a gray screen on it by comparing the IP address with the available IP address list.

Authors and Affiliations

Preethi. S, Vinodhini. T

Keywords

Related Articles

Concrete with Bottom Ash as a Replacement for Fine Aggregate Fails Mechanical Tests at Coal Washeries

Critical research is focused on the use of a variety of commercial waste products as alternatives to total, such as coal pyrophoric waste, heater slag, fibreglass waste products, elastic waste plastics, work slime pellet...

Data Analytics in Health Management System

Large information, a quickly creating theme, has begun to have a crucial influence in the production of medical care exploration and practices. It has enabled people to assemble, put together, examine, or ingest monstrou...

Design and Implementation of a Novel Modular Armed Advanced Robotic System (MAARS)

A Modular Armed Advanced Robotic System based on face recognition is intended for military applications identifies the unidentified individuals in border area or conflict zones or in any comparable location, and conducts...

A Model of Intelligent Recommender System with Explicit Feedback Mechanism for Performance Improvement

Recommender Systems are intelligent applications designed to assist the user in a decision-making process whereby user wants to choose one item amongst the potentially overwhelming set of alternative products or services...

Determining Long-Term Stability in Environmental Science

A person's or a community's related emissions is an indication of the number of energy needed to produce their commodities. However, data shows that it only lasts for a short period of time. There has been much criticism...

Download PDF file
  • EP ID EP749405
  • DOI -
  • Views 85
  • Downloads 0

How To Cite

Preethi. S, Vinodhini. T (2014). Secure Network Communication Using Vulnerability Assessment Technique. International Journal of Innovative Research in Computer Science and Technology, 2(2), -. https://europub.co.uk/articles/-A-749405