International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 6 | Number 2 | Year 2013 | Article Id. IJCTT-V6N4P140 | DOI : https://doi.org/10.14445/22312803/IJCTT-V6N4P140

Proactive Web Server Protocol for Complaint Assessment


G. Vijay Kumar , Ravikumar S. Raykundaliya , Dr. P. Naga Prasad

Citation :

G. Vijay Kumar , Ravikumar S. Raykundaliya , Dr. P. Naga Prasad, "Proactive Web Server Protocol for Complaint Assessment," International Journal of Computer Trends and Technology (IJCTT), vol. 6, no. 2, pp. 236-241, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V6N4P140

Abstract

Vulnerability Discovery with attack Injection security threats are increasing for the server software, when software is developed, the software tested for the functionality. Due to un-awareness of software vulnerabilities most of the software before pre-Release the software should be thoroughly tested for not only functionality reliability, but should be tested for the security flaws (or) vulnerabilities. The approaches such as fuzzers, Fault injection, vulnerabilities scanners, static vulnerabilities analyzers, Runtime prevention mechanisms and software Rejuvenation are identifying the un-patched software which is open for security threats address to solve the problem “security testing”. These techniques are useful for generating attacks but cannot be extendable for the new land of attacks. The system called proactive vulnerability attack injection tool is suitable for adding new attacks injection vectors, methods to define new protocol states (or) Specification using the interface of tool includes Network server protocol specification using GUI, Attacks generator, Attack injector, monitoring module at the victim injector, monitoring module at the victim machine and the attacks injection report generation. This tool can address most of the vulnerabilities (or) security flows.

Keywords

vulnerability (or) security flows, vulnerability discovery Attack Injection, attack generator, proactive Protocol.

References

[1] McGraw, G. (2006). Software Security: Building Security In, Adison Wesley Professional.
[2] The Canadian Institute of Chartered Accountants Information Technology Advisory Committee, (2003) “Using an Ethical hacking Technique to Assess Information Security Risk”, Toronto,Canada.http://www.cica.ca/research-andguidance/documents/it-advisory committee/item12038.pdf, accessed on Nov. 23, 2011.
[3] Mohanty, D. “Demystifying Penetration TestingHackingSpirits,”http://www.infosecwriters.com/text_res ources/pdf/pen_test2.pdf, accessed on Nov. 23, 2011.
[4] “Application Penetration Testing,” https://www.trustwave.com/apppentest.php, accessed on Nov. 23, 2011. 
[5] [Online].  Available.  http://en.Wikipedia.org/
[6] [Online].  Available. http://www.google.co.in./