Vulnerability Discovery with Attack Injection  

Abstract

Software systems are prone to security vulnerabilities. Security is very important aspect of any software. In spite of security mechanisms available, there is increasing security threats revealed every year. This is a continuous problem with software systems as new threats are tried out by attackers. This paper solves this problem by developing a framework with an attack injection methodology which continuously discovers vulnerabilities in software systems and allows security administrators to resolve the issues. A prototype application is built to demonstrate the methodology. The application gets protocol details from networked server and makes attacks to discover vulnerabilities and the vulnerabilities thus discovered are persisted to a database. This helps in rectifying problems or fixing bugs in the software that causes security vulnerabilities.  

Authors and Affiliations

B. Sandhya , S. Vasundra

Keywords

Related Articles

Design of RC5 Algorithm using Pipelined Architecture 

Data transmission through a channel requires more security, so security gaining is more importance than simply transmission. In this document RC5 algorithm is used for encryption and decryption of data to have secu...

Mathematical Modeling of Hot Air Drying of Spinach Leaves in Universal Hot Air Oven  

The objective of this study was to develop a model for drying characteristic curve of Spinach in Universal Hot Air Oven .Drying experiment were conducted using a constant air velocity2.2m/s and three drying air t...

Ontology construction and query indexing technique to improve query indexing time, precision and number of good pages visited 

For The existing search engines have many issues. In this research we have considered the issue of query processing in hakia search engines. Current search is done on ranking based query processing means displaying r...

Overview Of Video Condensation In Streaming Video  

proficient browsing of long video series a main tool in video surveillance. Example: for earlier event video forensics, but can also be used for quick review of moving pictures and home videos. Since there are ma...

Signal Strength Estimation and Comparison with Measured Signal Strength for Mobile Cellular Communication 

In wireless communication systems, path loss models are used to find out the path loss between transmitter and receiver. In this paper, Okumura, Cost-231, Hata, ECC 33 and SUI propagation models are discussed. Path...

Download PDF file
  • EP ID EP146630
  • DOI -
  • Views 59
  • Downloads 0

How To Cite

B. Sandhya, S. Vasundra (2012). Vulnerability Discovery with Attack Injection  . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 1(7), 211-214. https://europub.co.uk./articles/-A-146630