Secure Network Communication Using Vulnerability Assessment Technique

Abstract

Vulnerability assessment has become an area of interest in distributed network communication which is capable of detecting the penetrations, break-ins and other form of computer abuse. The communication between a team and Management Information Base (MIB) within an organization which is out of the scope of firewall authentication can be made possible with the help of this system. In this paper, we propose an intrusion detection mechanism which is capable of detecting heterogeneous wireless sensor network (WSN) by characterizing intrusion detection with respect to the network parameters (Destination IP). The intention of this system is to reduce susceptibility using vulnerability assessment algorithm which covers the process of identifying and ranking the vulnerabilities in a system while ensuring required information is transferred securely without any failure in the middle of transaction. The three basic ideas involved are Furtive enigma, Destination IP address and Unlock key. It mainly focuses on system security by detecting the intruders and their system can be crashed by displaying a gray screen on it by comparing the IP address with the available IP address list.

Authors and Affiliations

Preethi. S, Vinodhini. T

Keywords

Related Articles

Better Defect Analysis and Defect Prevention for Software Process Quality Improvement

Most large software products have good quality control process. Defect Prevention can be applied to one or more phases of the software development life cycle to improve software process quality. Defect Prevention involve...

Emotion Detection: Comparison of Various Techniques

Expressions and body language can tell us a lot about what people are thinking. They are a form of non-verbal communication which tells us about how the person is feeling. It describes the mood of the person like whether...

Modeling Pulmonary Tuberculosis using Adaptive Neuro Fuzzy Inference System

The problem of health monitoring has been taken as it is one of the challenging problems in rural areas where people many times do not get proper treatment and are not financially sound to visit doctors in city. Tubercul...

Performance Comparison of Efficient Identity Based Signature Schemes

In a conventional public key crypto system, the participants must verify the certificate prior to use the public key. The main drawback of the certificate in conventional public key system are large storage, large comput...

Supply Networks: An Overview

This study intends to offer a planned overview of source systems for academics and management interested in the subject. It does not try to provide a complete overview of the vast and rapidly expanding review , but it do...

Download PDF file
  • EP ID EP749405
  • DOI -
  • Views 57
  • Downloads 0

How To Cite

Preethi. S, Vinodhini. T (2014). Secure Network Communication Using Vulnerability Assessment Technique. International Journal of Innovative Research in Computer Science and Technology, 2(2), -. https://europub.co.uk/articles/-A-749405