Proactive Web Server Protocol for Complaint Assessment

نویسندگان

  • G. Vijay Kumar
  • Ravikumar S. Raykundaliya
  • P. Naga Prasad
چکیده

Vulnerability Discovery with attack Injection security threats are increasing for the server software, when software is developed, the software tested for the functionality. Due to unawareness of software vulnerabilities most of the software before pre-Release the software should be thoroughly tested for not only functionality reliability, but should be tested for the security flaws (or) vulnerabilities. The approaches such as fuzzers, Fault injection, vulnerabilities scanners, static vulnerabilities analyzers, Runtime prevention mechanisms and software Rejuvenation are identifying the un-patched software which is open for security threats address to solve the problem “security testing”. These techniques are useful for generating attacks but cannot be extendable for the new land of attacks. The system called proactive vulnerability attack injection tool is suitable for adding new attacks injection vectors, methods to define new protocol states (or) Specification using the interface of tool includes Network server protocol specification using GUI, Attacks generator, Attack injector, monitoring module at the victim injector, monitoring module at the victim machine and the attacks injection report generation. This tool can address most of the vulnerabilities (or) security flows.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Investigation on Reliability Estimation of Loosely Coupled Software as a Service Execution Using Clustered and Non-Clustered Web Server

Evaluating the reliability of loosely coupled Software as a Service through the paradigm of a cluster-based and non-cluster-based web server is considered to be an important attribute for the service delivery and execution. We proposed a novel method for measuring the reliability of Software as a Service execution through load testing. The fault count of the model against the stresses of users ...

متن کامل

A PROactive Request Distribution (PRORD) Using Web Log Mining in Cluster-Based Web Server

Widely adopted, distributor-based systems forward user requests to a balanced set of waiting servers in complete transparency to the users. The policy employed in forwarding requests from the front-end distributor to the backend servers plays an important role in the overall system performance. The locality-aware request distribution (LARD) scheme improves the system response time by having the...

متن کامل

Terrain Investigations of AODV Routing Protocol over Temporal Constraints in Wireless Sensor Network

In this paper we evaluated one of the commonly used proactive protocol–Ad hoc on demand distance vector. This paper proposes an improved assessment about the AODV protocol over different terrain condition like attitude above & below sea level etc. Here in the paper the performance of AODV protocol is judged on the basis of different layer’s performance of network model like Application, MAC, Tr...

متن کامل

Predictive models for proactive network management: application to a production Web server

Proactive management holds the promise of taking corrective actions in advance of service disruptions. Achieving this goal requires predictive models so that potential problems can be anticipated. Our approach builds on previous research in which HTTP operations per second are studied in a web server. As in this prior work, we model HTTP operations as two subprocesses, a (deterministic) trend s...

متن کامل

On Routing Web and Multimedia Traffic in Mobile Ad Hoc Networks

We evaluate the capabilities of MANETs in supporting multiple, simultaneous HTTP and multimedia streaming flows. The HTTP traffic is produced by several Web servers, each responding to a series of concurrent requests from multiple Web clients, and multimedia traffic is modelled as a variable bit-rate stream consisting of UDP packets. To see the impact of a routing protocol, we consider two on-d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1402.1943  شماره 

صفحات  -

تاریخ انتشار 2014