International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 110 | Views: 237

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015 | Popularity: 6.2 / 10


     

A Pioneering of Real Time Penetration Testing With Worm Propagation Model

R.Teja, Dr. V. Cyril Raj


Abstract: The Internet utilization has been so prominent in the recent times and the concepts of network attacks are now the biggest threats to the network security researchers. The capability of attackers to rapidly gain control of vast numbers of Internet hosts poses an immense risk to the overall security of the Internet by self-propagating suspicious codes known as computer worms spread themselves without any human interaction and launch the most destructive attacks against computer networks. At the meantime, being fully automated makes their behavior redundant and calculable and computers connected to the Internet are very prone to targeted virus attacks and may end up crashing. So there is a need for an accurate penetration testing and worm propagation model for paramount desire of the internet. Hence, we propose a model for testing the vulnerability in the network and exploiting the machine as for useful applications.


Keywords: Vulnerability, Threat, Exploit, Attack, Exploit, Security, Payload


Edition: Volume 4 Issue 4, April 2015


Pages: 1640 - 1643



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
R.Teja, Dr. V. Cyril Raj, "A Pioneering of Real Time Penetration Testing With Worm Propagation Model", International Journal of Science and Research (IJSR), Volume 4 Issue 4, April 2015, pp. 1640-1643, https://www.ijsr.net/getabstract.php?paperid=SUB153436, DOI: https://www.doi.org/10.21275/SUB153436



Similar Articles

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022

Pages: 629 - 634

A Face Spoof Detection using Feature Extraction and SVM

Lovely Pal, Renuka Singh

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 581 - 585

Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security

R. Vidhya, R. Sathya

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1017 - 1020

Human Computer Interface for Physically Impaired

Aayush Bhansali, Shivani Vhatkar, Shamoil Arsiwala, Aditi Srivastava, M. K. Nivangune

Share this Article

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1126 - 1129

Privacy Preserving Utility Verification of Data Published

Madhushree M

Share this Article



Top