Vulnerability Discovery with Attack Injection
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 7
Abstract
Software systems are prone to security vulnerabilities. Security is very important aspect of any software. In spite of security mechanisms available, there is increasing security threats revealed every year. This is a continuous problem with software systems as new threats are tried out by attackers. This paper solves this problem by developing a framework with an attack injection methodology which continuously discovers vulnerabilities in software systems and allows security administrators to resolve the issues. A prototype application is built to demonstrate the methodology. The application gets protocol details from networked server and makes attacks to discover vulnerabilities and the vulnerabilities thus discovered are persisted to a database. This helps in rectifying problems or fixing bugs in the software that causes security vulnerabilities.
Authors and Affiliations
B. Sandhya , S. Vasundra
Design of RC5 Algorithm using Pipelined Architecture
Data transmission through a channel requires more security, so security gaining is more importance than simply transmission. In this document RC5 algorithm is used for encryption and decryption of data to have secu...
Mathematical Modeling of Hot Air Drying of Spinach Leaves in Universal Hot Air Oven
The objective of this study was to develop a model for drying characteristic curve of Spinach in Universal Hot Air Oven .Drying experiment were conducted using a constant air velocity2.2m/s and three drying air t...
Ontology construction and query indexing technique to improve query indexing time, precision and number of good pages visited
For The existing search engines have many issues. In this research we have considered the issue of query processing in hakia search engines. Current search is done on ranking based query processing means displaying r...
Overview Of Video Condensation In Streaming Video
proficient browsing of long video series a main tool in video surveillance. Example: for earlier event video forensics, but can also be used for quick review of moving pictures and home videos. Since there are ma...
Signal Strength Estimation and Comparison with Measured Signal Strength for Mobile Cellular Communication
In wireless communication systems, path loss models are used to find out the path loss between transmitter and receiver. In this paper, Okumura, Cost-231, Hata, ECC 33 and SUI propagation models are discussed. Path...