Vulnerability Discovery with Attack Injection
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 7
Abstract
Software systems are prone to security vulnerabilities. Security is very important aspect of any software. In spite of security mechanisms available, there is increasing security threats revealed every year. This is a continuous problem with software systems as new threats are tried out by attackers. This paper solves this problem by developing a framework with an attack injection methodology which continuously discovers vulnerabilities in software systems and allows security administrators to resolve the issues. A prototype application is built to demonstrate the methodology. The application gets protocol details from networked server and makes attacks to discover vulnerabilities and the vulnerabilities thus discovered are persisted to a database. This helps in rectifying problems or fixing bugs in the software that causes security vulnerabilities.
Authors and Affiliations
B. Sandhya , S. Vasundra
A Survey on Routing Protocol for Wireless Sensor Network
This paper gives the survey on routing protocol for wireless sensor networks. In recent years, many approaches and techniques have been proposed for consuming the energy efficiency of the Wireless Sensor Network....
An innovative Accession intended for FEC Decryption predicated on the BP Contrivance in LTE as well as WiMAX Conformity
Abstract—Numerous wireless contact systems such as IS-54, superior data tariff for the GSM succession (EDGE), universal interoperability for microwave access (WiMAX) and long term progression (LTE) have adopted low-densi...
Blind Image De-convolution In Surveillance Systems By Genetic Programming
surveillance systems has an important part as a Image acquisition and filtering, segmentation, object detection and tracking the object in that image. In blind image de-convolution .most of the methods requires tha...
Improving energy usage efficiency in web enabled smart buildings
— Today, smart building systems are extending beyond a usual phone or computer network, including any imaginable electronics devices forming interconnected networks of physical objects. Various buildings don't have...
RC Band Pass Filters Analysis for Under damped Operating Conditions
Filters of some sort are essential to the operation of most electronic circuits. It is therefore in the interest of anyone involved in electronic circuit design to have the ability to develop filter circuits capable o...