A Review on Web Security Mechanism Performance Evaluation Using Vulnerability and Attack Injection
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Review Papers | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014

A Review on Web Security Mechanism Performance Evaluation Using Vulnerability and Attack Injection

M.S. Patole, Sagar D. Kothimbire

In this method a tool is designed to evaluate the performance of web security mechanisms. The system is based on the idea that injecting realistic vulnerabilities in a web application and attacking them automatically. This can be used to support the assessment of existing security mechanisms and tools in custom setup scenarios. To provide real to life results, the stated vulnerability and attack injection methodology relies on the study of a large number of vulnerabilities in real web applications. In this method a tool is designed for automation of entire process called Vulnerability and Attack injection Tool. This paper provides a short Reveiw on the technique to evaluate performance of web security mechanisms.

Keywords: Security, fault injection, internet applications, review and evaluation, vulnerability, sql probe

Edition: Volume 3 Issue 11, November 2014

Pages: 2585 - 2588

Share this Article

How to Cite this Article?

M.S. Patole, Sagar D. Kothimbire, "A Review on Web Security Mechanism Performance Evaluation Using Vulnerability and Attack Injection", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT141599, Volume 3 Issue 11, November 2014, 2585 - 2588

121 PDF Views | 98 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Security'

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 700 - 705

Virtual Augmented Reality Application and Research in Police Station Management System with Security Aspects

Kale Jyoti S

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020

Pages: 1544 - 1554

Recent Developments on Probabilistic Graphical Model Applied in Data Analysis

Kan'Sam Nadjak, Guisheng Yin

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Similar Articles with Keyword 'fault injection'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1684 - 1687

Certification of Components and Component Based Systems

Vijay, Devender Kumar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2585 - 2588

A Review on Web Security Mechanism Performance Evaluation Using Vulnerability and Attack Injection

M.S. Patole, Sagar D. Kothimbire

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 325 - 329

Survey on a Novel Approach for Web Service - Security Testing to Improve Web Service Robustness

Vina M. Lomte, Jaydeep Mangle

Share this Article

Similar Articles with Keyword 'internet applications'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2585 - 2588

A Review on Web Security Mechanism Performance Evaluation Using Vulnerability and Attack Injection

M.S. Patole, Sagar D. Kothimbire

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 94 - 98

Survey on Preventing Cross Web Site Request Forgery Attacks with Activation Link

Kadambari Pradip Chaudhari, Manisha Tijare

Share this Article

Similar Articles with Keyword 'vulnerability'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 842 - 845

Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks

Srihari Babu Kolla, B. B. K. Prasad

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1536 - 1540

Enterprise Software Management Systems by Using Security Metrics

Bhanudas S. Panchabhai, A. N. Patil

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1977 - 1984

Chord4TSD: A Decentralized Trust Based Service Discovery Approach on Peer-to-Peer Networks

Yogini Bhamare

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1448 - 1453

Implementation and Comparison of Enhance SAODV Protocol against Blackhole Attacks in MANET using Network Simulator

Anil, Dr. Sudesh Kumar

Share this Article
Top