Secure Network Communication Using Vulnerability Assessment Technique
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2014, Vol 2, Issue 2
Abstract
Vulnerability assessment has become an area of interest in distributed network communication which is capable of detecting the penetrations, break-ins and other form of computer abuse. The communication between a team and Management Information Base (MIB) within an organization which is out of the scope of firewall authentication can be made possible with the help of this system. In this paper, we propose an intrusion detection mechanism which is capable of detecting heterogeneous wireless sensor network (WSN) by characterizing intrusion detection with respect to the network parameters (Destination IP). The intention of this system is to reduce susceptibility using vulnerability assessment algorithm which covers the process of identifying and ranking the vulnerabilities in a system while ensuring required information is transferred securely without any failure in the middle of transaction. The three basic ideas involved are Furtive enigma, Destination IP address and Unlock key. It mainly focuses on system security by detecting the intruders and their system can be crashed by displaying a gray screen on it by comparing the IP address with the available IP address list.
Authors and Affiliations
Preethi. S, Vinodhini. T
Two Step Verification and Data Security through the Network
Our project is basically a web based application that engages in security and the transmission of data through the network. As we know that security is now become a necessity in each and everyone’s life as there might be...
Data Security Models In Cloud Computing: A Review
Cloud computing is a vastly growing information technology and its space continues to evolve at an astounding pace. It provides efficient model for organizations to take services over internet. Its professional services...
Study on Alternative Materials-Expanded Polystyrene and Glass Powder for Construction
Expanded Polystyrene (EPS) that was used in the research work was in the form of ‘EPS Beads’ which were spherical in shape and size varied in between 6 mm to 8 mm in diameter. Beads were made up of pre-extended Polystyre...
A Review Paper on Hadoop Architecture
Hadoop is an open-source software-programming platform for storing and processing huge amounts of data. Its framework is built on Java programming, with some native C code and shell scripts thrown in for good measure. HD...
Deep Learning Approach To Face Conditioning Using Invertible Conditional Generative Adversarial Networks (ICGAN)
We propose another system for evaluating generative models by means of an ill-disposed process, in which we at the same time train two models: a generative model G that catches the information conveyance, and a discrimin...