A Result Paper-Network Vulnerability Scanning

Authors

  • Rohillal
  • Singh S Professor, Jind Institute of Engineering and Technology, Jind, India2,

Keywords:

Need of Network Security

Abstract

Objective of research is to preserves the secure condition it is essential to be aware of the behavior of the incoming data. It is a too vulnerable and complicated Question. Owing to the fact that intrusive data are in several and similar forms, distinguishing them from the normal ones is so outstanding. Network Security is becoming an important issue for all the organizations, and with the increase in knowledge of hackers and intruders they have made many successful attempts to bring down high-profile company university network sand web services.

References

Introduction to Network Security, Dr. Rahul Banerjee, BITS-Pilani, India www.discovery.bits pilani.ac.in/rahul/CompNet/index.htm

http://www.cert.org/tech tips/homeUniversitynetworks.html

A Brief History of Network Security and the N d for Adherence to the Software Process Model, by Paul Innella, www.tdisecur .com/resources/assets/NetSec.pdf

Network Security fundamentals, By Gert De Laet, Gert Schauwers, Cisco press.

Network Attack nd Defence, By Roger Needham and Butler Lamson. www.cl.cam.ac.uk/ rja14/Papers/SE-18.pdf

Ecient countermeasures for software vulnerabilities due to memory manage-ment errors,Prof. Dr. ir. W. JOOSEN, Prof. Dr. ir. F. PIESSENS.

Computer Vulnerabilities, Written by Eric Knight, C.I.S.S.P. Original Publication: March 6, 2000.www.ussrback.com/docs/papers/general/compvulndraf t.pdf

http://www.antcolonies.net/howantscommunicate.html

http://en.wikipedia.org/wiki/Ant colony optimization

http://www.javvin.com/etrac/network-vulnerabilities.html

http://searchmidmarketsecurity.techtarget.com/sDefinition /0,,sid198 gci1176511,00.html

A Vulnerability Assessment of the East Tennessee State University Adminis-trative Computer Network, Dr. Phillip E. Pfeiffer, IV, chair Dr. Gene Bailey Dr. Qing Yuan.

http://www.infosectoday.com/Articles/Exploit Software Vulnerabilities.htm

Downloads

Published

2018-03-30

How to Cite

Rohillal, S., & Singh, S. K. (2018). A Result Paper-Network Vulnerability Scanning. Universal Research Reports, 5(4), 102–103. Retrieved from https://urr.shodhsagar.com/index.php/j/article/view/727

Issue

Section

Original Research Article