Proactive Web Server Protocol for Complaint Assessment
نویسندگان
چکیده
Vulnerability Discovery with attack Injection security threats are increasing for the server software, when software is developed, the software tested for the functionality. Due to unawareness of software vulnerabilities most of the software before pre-Release the software should be thoroughly tested for not only functionality reliability, but should be tested for the security flaws (or) vulnerabilities. The approaches such as fuzzers, Fault injection, vulnerabilities scanners, static vulnerabilities analyzers, Runtime prevention mechanisms and software Rejuvenation are identifying the un-patched software which is open for security threats address to solve the problem “security testing”. These techniques are useful for generating attacks but cannot be extendable for the new land of attacks. The system called proactive vulnerability attack injection tool is suitable for adding new attacks injection vectors, methods to define new protocol states (or) Specification using the interface of tool includes Network server protocol specification using GUI, Attacks generator, Attack injector, monitoring module at the victim injector, monitoring module at the victim machine and the attacks injection report generation. This tool can address most of the vulnerabilities (or) security flows.
منابع مشابه
Investigation on Reliability Estimation of Loosely Coupled Software as a Service Execution Using Clustered and Non-Clustered Web Server
Evaluating the reliability of loosely coupled Software as a Service through the paradigm of a cluster-based and non-cluster-based web server is considered to be an important attribute for the service delivery and execution. We proposed a novel method for measuring the reliability of Software as a Service execution through load testing. The fault count of the model against the stresses of users ...
متن کاملA PROactive Request Distribution (PRORD) Using Web Log Mining in Cluster-Based Web Server
Widely adopted, distributor-based systems forward user requests to a balanced set of waiting servers in complete transparency to the users. The policy employed in forwarding requests from the front-end distributor to the backend servers plays an important role in the overall system performance. The locality-aware request distribution (LARD) scheme improves the system response time by having the...
متن کاملTerrain Investigations of AODV Routing Protocol over Temporal Constraints in Wireless Sensor Network
In this paper we evaluated one of the commonly used proactive protocol–Ad hoc on demand distance vector. This paper proposes an improved assessment about the AODV protocol over different terrain condition like attitude above & below sea level etc. Here in the paper the performance of AODV protocol is judged on the basis of different layer’s performance of network model like Application, MAC, Tr...
متن کاملPredictive models for proactive network management: application to a production Web server
Proactive management holds the promise of taking corrective actions in advance of service disruptions. Achieving this goal requires predictive models so that potential problems can be anticipated. Our approach builds on previous research in which HTTP operations per second are studied in a web server. As in this prior work, we model HTTP operations as two subprocesses, a (deterministic) trend s...
متن کاملOn Routing Web and Multimedia Traffic in Mobile Ad Hoc Networks
We evaluate the capabilities of MANETs in supporting multiple, simultaneous HTTP and multimedia streaming flows. The HTTP traffic is produced by several Web servers, each responding to a series of concurrent requests from multiple Web clients, and multimedia traffic is modelled as a variable bit-rate stream consisting of UDP packets. To see the impact of a routing protocol, we consider two on-d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1402.1943 شماره
صفحات -
تاریخ انتشار 2014