Review Papers | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014
A Review on Web Security Mechanism Performance Evaluation Using Vulnerability and Attack Injection
M.S. Patole, Sagar D. Kothimbire
In this method a tool is designed to evaluate the performance of web security mechanisms. The system is based on the idea that injecting realistic vulnerabilities in a web application and attacking them automatically. This can be used to support the assessment of existing security mechanisms and tools in custom setup scenarios. To provide real to life results, the stated vulnerability and attack injection methodology relies on the study of a large number of vulnerabilities in real web applications. In this method a tool is designed for automation of entire process called Vulnerability and Attack injection Tool. This paper provides a short Reveiw on the technique to evaluate performance of web security mechanisms.
Keywords: Security, fault injection, internet applications, review and evaluation, vulnerability, sql probe
Edition: Volume 3 Issue 11, November 2014
Pages: 2585 - 2588
How to Cite this Article?
M.S. Patole, Sagar D. Kothimbire, "A Review on Web Security Mechanism Performance Evaluation Using Vulnerability and Attack Injection", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT141599, Volume 3 Issue 11, November 2014, 2585 - 2588
121 PDF Views | 98 PDF Downloads
Similar Articles with Keyword 'Security'
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 700 - 705Virtual Augmented Reality Application and Research in Police Station Management System with Security Aspects
Kale Jyoti S
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2786 - 2790Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh, Vaibhav Pandey
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020
Pages: 1544 - 1554Recent Developments on Probabilistic Graphical Model Applied in Data Analysis
Kan'Sam Nadjak, Guisheng Yin
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Similar Articles with Keyword 'fault injection'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1684 - 1687Certification of Components and Component Based Systems
Vijay, Devender Kumar
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2585 - 2588A Review on Web Security Mechanism Performance Evaluation Using Vulnerability and Attack Injection
M.S. Patole, Sagar D. Kothimbire
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016
Pages: 325 - 329Survey on a Novel Approach for Web Service - Security Testing to Improve Web Service Robustness
Vina M. Lomte, Jaydeep Mangle
Similar Articles with Keyword 'internet applications'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2585 - 2588A Review on Web Security Mechanism Performance Evaluation Using Vulnerability and Attack Injection
M.S. Patole, Sagar D. Kothimbire
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016
Pages: 94 - 98Survey on Preventing Cross Web Site Request Forgery Attacks with Activation Link
Kadambari Pradip Chaudhari, Manisha Tijare
Similar Articles with Keyword 'vulnerability'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 842 - 845Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks
Srihari Babu Kolla, B. B. K. Prasad
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 1536 - 1540Enterprise Software Management Systems by Using Security Metrics
Bhanudas S. Panchabhai, A. N. Patil
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
Pages: 1977 - 1984Chord4TSD: A Decentralized Trust Based Service Discovery Approach on Peer-to-Peer Networks
Yogini Bhamare
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016
Pages: 1448 - 1453Implementation and Comparison of Enhance SAODV Protocol against Blackhole Attacks in MANET using Network Simulator
Anil, Dr. Sudesh Kumar