Research Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015
A Pioneering of Real Time Penetration Testing With Worm Propagation Model
R.Teja, Dr. V. Cyril Raj
The Internet utilization has been so prominent in the recent times and the concepts of network attacks are now the biggest threats to the network security researchers. The capability of attackers to rapidly gain control of vast numbers of Internet hosts poses an immense risk to the overall security of the Internet by self-propagating suspicious codes known as computer worms spread themselves without any human interaction and launch the most destructive attacks against computer networks. At the meantime, being fully automated makes their behavior redundant and calculable and computers connected to the Internet are very prone to targeted virus attacks and may end up crashing. So there is a need for an accurate penetration testing and worm propagation model for paramount desire of the internet. Hence, we propose a model for testing the vulnerability in the network and exploiting the machine as for useful applications.
Keywords: Vulnerability, Threat, Exploit, Attack, Exploit, Security, Payload
Edition: Volume 4 Issue 4, April 2015
Pages: 1640 - 1643
How to Cite this Article?
R.Teja, Dr. V. Cyril Raj, "A Pioneering of Real Time Penetration Testing With Worm Propagation Model", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB153436, Volume 4 Issue 4, April 2015, 1640 - 1643
121 PDF Views | 98 PDF Downloads
Similar Articles with Keyword 'Vulnerability'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 842 - 845Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks
Srihari Babu Kolla, B. B. K. Prasad
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 1536 - 1540Enterprise Software Management Systems by Using Security Metrics
Bhanudas S. Panchabhai, A. N. Patil
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
Pages: 1977 - 1984Chord4TSD: A Decentralized Trust Based Service Discovery Approach on Peer-to-Peer Networks
Yogini Bhamare
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016
Pages: 1448 - 1453Implementation and Comparison of Enhance SAODV Protocol against Blackhole Attacks in MANET using Network Simulator
Anil, Dr. Sudesh Kumar
Similar Articles with Keyword 'Threat'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020
Pages: 759 - 761Empirical Study of Fake Reviews Detection of Online Reviews from E-Commerce Website
Phani K. Cheruku, Atul Kumar
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2832 - 2836Minimization of DDoS Attack using Firecol an Intrusion Prevention System
Bhagyashri Kotame, Shrinivas Sonkar
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2025 - 2029Investigation of Security in Cloud Computing
Annu Devi
Similar Articles with Keyword 'Exploit'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1907 - 1913Human Gait Recognition Using Multisvm Classifier
Saranya Sasidharan, Smitha K S, Minu Thomas
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2383 - 2384Location Based Query Processing For Providing Privacy to Exploit Service Similarity: A Survey
Prerana Deokar, Praveen Barapatre
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2025 - 2029Investigation of Security in Cloud Computing
Annu Devi
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016
Pages: 1398 - 1403Integrating Multiple Smart Directional Antennas for Full Potential Exploitation of Broadcasting System
R. Kalaiprasath, R. Elankavi, R. Udayakumar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 2058 - 2061Privacy Preserved Public Auditing for Distributed Data
Anes P. A., Neethu Francis
Similar Articles with Keyword 'Attack'
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2786 - 2790Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh, Vaibhav Pandey
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1057 - 1058Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS
Pranita Prakash Kulkarni
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2067 - 2068An Analysis of Mobile Applications Security; Issue and Aspects from the Users Perspective
Ashish A Kulkarni, Dr. Shivaji R. Madan
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1253 - 1257Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing
Vandhana V
Similar Articles with Keyword 'Exploit'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1907 - 1913Human Gait Recognition Using Multisvm Classifier
Saranya Sasidharan, Smitha K S, Minu Thomas
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2383 - 2384Location Based Query Processing For Providing Privacy to Exploit Service Similarity: A Survey
Prerana Deokar, Praveen Barapatre
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2025 - 2029Investigation of Security in Cloud Computing
Annu Devi
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016
Pages: 1398 - 1403Integrating Multiple Smart Directional Antennas for Full Potential Exploitation of Broadcasting System
R. Kalaiprasath, R. Elankavi, R. Udayakumar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 2058 - 2061Privacy Preserved Public Auditing for Distributed Data
Anes P. A., Neethu Francis
Similar Articles with Keyword 'Security'
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 700 - 705Virtual Augmented Reality Application and Research in Police Station Management System with Security Aspects
Kale Jyoti S
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2786 - 2790Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh, Vaibhav Pandey
Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020
Pages: 1544 - 1554Recent Developments on Probabilistic Graphical Model Applied in Data Analysis
Kan'Sam Nadjak, Guisheng Yin
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Similar Articles with Keyword 'Payload'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2085 - 2089Implementation and Analysis of DoS Attack Detection Algorithms
Rupesh Jaiswal, Dr. Shashikant Lokhande, Aditya Gulavani
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2541 - 2544Reversible Data Embedding using F5 Algorithm
Sanjivani Koli, N. B. Pokale
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1467 - 1471XOR Encryption Based Video Steganography
Ramandeep Kaur, Pooja
Review Papers, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1367 - 1370A Review on Various Approaches of Video Steganography
Sapanpreet Kaur, Mandeep Kaur
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 762 - 767Reversible Data Hiding in Encrypted Images
Chaple Gopal, G Balram