Secure Network Communication Using Vulnerability Assessment Technique

Abstract

Vulnerability assessment has become an area of interest in distributed network communication which is capable of detecting the penetrations, break-ins and other form of computer abuse. The communication between a team and Management Information Base (MIB) within an organization which is out of the scope of firewall authentication can be made possible with the help of this system. In this paper, we propose an intrusion detection mechanism which is capable of detecting heterogeneous wireless sensor network (WSN) by characterizing intrusion detection with respect to the network parameters (Destination IP). The intention of this system is to reduce susceptibility using vulnerability assessment algorithm which covers the process of identifying and ranking the vulnerabilities in a system while ensuring required information is transferred securely without any failure in the middle of transaction. The three basic ideas involved are Furtive enigma, Destination IP address and Unlock key. It mainly focuses on system security by detecting the intruders and their system can be crashed by displaying a gray screen on it by comparing the IP address with the available IP address list.

Authors and Affiliations

Preethi. S, Vinodhini. T

Keywords

Related Articles

The Functioning of a Voltage Transformer In Relation To Power Quality

Conductive expansions in the giving voltage might affect the root mean square voltage and the situation with the voltage twist on the mains, bringing about power quality debasement. The motivation behind this exploration...

A Machine Learning Model for Clinical Decision Support for Drug Recommendation

Modern machine learning techniques play a very crucial role in dealing with very complex unstructured data that is available in the medical domain. The wide range of applications in this area is capable of changing the...

Comparison between AODV and CDMA Protocol

CDMA is most widely used standard for multiuser system in wireless adhoc network. CDMA standards present set of protocols for power control, BER control and multiuser detection system in adhoc networks. Therefore behavio...

Mobile Cloud Computing Applications and Challenges

Mobile Cloud Computing (MCC) combines mobile computing and cloud computing. Cloud Computing includes application and services that run on distributed network using virtualized resources and excess by common internet prot...

Intent Search: Survey on Various Methods of Image Re-ranking

Image re-ranking is an effective way for improving the result of web-based image search. To refine the text-based image search result image search re-ranking is the best approach. In this Paper, we give the different met...

Download PDF file
  • EP ID EP749405
  • DOI -
  • Views 72
  • Downloads 0

How To Cite

Preethi. S, Vinodhini. T (2014). Secure Network Communication Using Vulnerability Assessment Technique. International Journal of Innovative Research in Computer Science and Technology, 2(2), -. https://europub.co.uk/articles/-A-749405