ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A SYSTEMATIC BROAD REVIEW ON SOFTWARE SECURITY TESTING IN DIFFERENT WAYS

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.9, No. 11)

Publication Date:

Authors : ;

Page : 77-97

Keywords : Software; Penetration Testing; attack; vulnerability assessment; network; wireless medium;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

In this modern era, mostly all wireless software applications are hacked and injected because of several harmful activities. Henceforth, different frameworks were developed to measure the security level in software systems. Especially, the penetration testing (PT) model is mostly worn by all applications to make the attack vulnerability assessment. To secure the system, initially the behaviour of attacks should be analysed and that is trained in specific agent or software module. Based on the trained activities the specific verification system can predict the present malicious activities. Furthermore, the verification agent or system should be automated to find the harmful activities in any time. Also, the PT is utilized in both hardware and software gadgets, it is processed based on the support of software functions. In other case, the Machine Learning (ML) and Reinforcement Learning (RL) model is functioned to process the attack behaviour in software systems. Moreover, in this review the usage of PT is elaborated in dissimilar ways for different applications. Subsequently, the performance of PT framework is differed based on its each software or applications.

Last modified: 2020-12-05 22:58:17