Secure Network Communication Using Vulnerability Assessment Technique
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2014, Vol 2, Issue 2
Abstract
Vulnerability assessment has become an area of interest in distributed network communication which is capable of detecting the penetrations, break-ins and other form of computer abuse. The communication between a team and Management Information Base (MIB) within an organization which is out of the scope of firewall authentication can be made possible with the help of this system. In this paper, we propose an intrusion detection mechanism which is capable of detecting heterogeneous wireless sensor network (WSN) by characterizing intrusion detection with respect to the network parameters (Destination IP). The intention of this system is to reduce susceptibility using vulnerability assessment algorithm which covers the process of identifying and ranking the vulnerabilities in a system while ensuring required information is transferred securely without any failure in the middle of transaction. The three basic ideas involved are Furtive enigma, Destination IP address and Unlock key. It mainly focuses on system security by detecting the intruders and their system can be crashed by displaying a gray screen on it by comparing the IP address with the available IP address list.
Authors and Affiliations
Preethi. S, Vinodhini. T
Study the Behaviour of Using Steel Scrap in Concrete
Today the construction industry is in need of finding cost effective materials for increasing the strength of concrete structures. This project work emphasis on the study of using steel scrap in the innovative constructi...
An Overview on the Study of Data Encryption and Decryption in Cloud Computing
While big data technologies in cloud computing are rapidly growing in popularity, privacy issues have increased dramatically. Encrypting data in real-time is one of the greatest important issues throughout data acquisiti...
Raspberry Pi 3 Model B+ Based Endure Redicting Using Web of Things (WoT)
The Web of Things (WoT) is a breakthrough technology that connects and controls the devices with the help of Web and make them smart and efficient. We build an WoT based Temperature and Humidity Sensing System using Rasp...
Congestion Modelling and Level of Service Assessment of Urban Roads in Mixed Traffic Conditions
In urban locations around the world, traffic congestion is a problem. Congestion has increased as a result of inadequate public transportation, stalled development of the road infrastructure, and increased use of private...
Review Paper on Data Mining Techniques and Applications
Data mining is the process of extracting hidden and useful patterns and information from data. Data mining is a new technology that helps businesses to predict future trends and behaviors, allowing them to make proactive...