Secure Network Communication Using Vulnerability Assessment Technique
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2014, Vol 2, Issue 2
Abstract
Vulnerability assessment has become an area of interest in distributed network communication which is capable of detecting the penetrations, break-ins and other form of computer abuse. The communication between a team and Management Information Base (MIB) within an organization which is out of the scope of firewall authentication can be made possible with the help of this system. In this paper, we propose an intrusion detection mechanism which is capable of detecting heterogeneous wireless sensor network (WSN) by characterizing intrusion detection with respect to the network parameters (Destination IP). The intention of this system is to reduce susceptibility using vulnerability assessment algorithm which covers the process of identifying and ranking the vulnerabilities in a system while ensuring required information is transferred securely without any failure in the middle of transaction. The three basic ideas involved are Furtive enigma, Destination IP address and Unlock key. It mainly focuses on system security by detecting the intruders and their system can be crashed by displaying a gray screen on it by comparing the IP address with the available IP address list.
Authors and Affiliations
Preethi. S, Vinodhini. T
Study of Challenges, Impact and Solutions in Sustainable Project Management for Green Construction
In recent years, India has seen an explosion in the environmentally conscious construction industry. Despite the widespread call for greener buildings to reduce their environmental impact, studies evaluating their effect...
Optimization of Random Forest Algorithm for Breast Cancer Detection
Today, cancer is a big issue and the most common disease all over the world. Cancer starts due to the abnormal growth of cells in your body. So, cancer takes place anywhere in the body. There are more than 100 types of c...
Predictive Maintenance of Machines on Large Scale Industrial Units Using Machine Learning
Anticipating machine breakdowns is one of Industry 4.0's primary goals. It's critical to be able to prevent failures since downtime costs money and results in a loss of productivity. That's why it's critical for machine...
Study the Use of Demolished Concrete Buildings on a Flexible Plateform
Concrete re-mixing might aid in the rehabilitation process. These Aggregates are viewed as future products, and the utilisation of returning items has evolved over the last decades to enjoy the advantages of nature while...
Mobile Cloud Computing Applications and Challenges
Mobile Cloud Computing (MCC) combines mobile computing and cloud computing. Cloud Computing includes application and services that run on distributed network using virtualized resources and excess by common internet prot...