A Pioneering of Real Time Penetration Testing With Worm Propagation Model
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 4)Publication Date: 2015-04-05
Authors : R.Teja; V. Cyril Raj;
Page : 1640-1643
Keywords : Vulnerability; Threat; Exploit; Attack; Exploit; Security; Payload;
Abstract
The Internet utilization has been so prominent in the recent times and the concepts of network attacks are now the biggest threats to the network security researchers. The capability of attackers to rapidly gain control of vast numbers of Internet hosts poses an immense risk to the overall security of the Internet by self-propagating suspicious codes known as computer worms spread themselves without any human interaction and launch the most destructive attacks against computer networks. At the meantime, being fully automated makes their behavior redundant and calculable and computers connected to the Internet are very prone to targeted virus attacks and may end up crashing. So there is a need for an accurate penetration testing and worm propagation model for paramount desire of the internet. Hence, we propose a model for testing the vulnerability in the network and exploiting the machine as for useful applications.
Other Latest Articles
- Developing Firefox add-on for DOM vulnerability Assessment
- A Study on 360-Degree Feedback In Educational University With Reference To Bhubaneswar, Odisha, India
- Serological Survey for Peste Des Petits Ruminants Virus (PPRv) in Camel from Different Regions in The West of Libya
- The Influence of Store Layout and Interior Displays against a Purchase Decision (In KFC Fast Food Bandung, Indonesia)
- Electronic Waste - A Literature Review
Last modified: 2021-06-30 21:44:39