network vulnerabilities
Recently Published Documents


TOTAL DOCUMENTS

64
(FIVE YEARS 16)

H-INDEX

7
(FIVE YEARS 1)

Author(s):  
Yanxi Huang ◽  
Fangzhou Zhu ◽  
Liang Liu ◽  
Wezhi Meng ◽  
Simin Hu ◽  
...  

AbstractThe security of wireless routers receives much attention given by the increasing security threats. In the era of Internet of Things, many devices pose security vulnerabilities, and there is a significant need to analyze the current security status of devices. In this paper, we develop WNV-Detector, a universal and scalable framework for detecting wireless network vulnerabilities. Based on semantic analysis and named entities recognition, we design rules for automatic device identification of wireless access points and routers. The rules are automatically generated based on the information extracted from the admin webpages, and can be updated with a semi-automated method. To detect the security status of devices, WNV-Detector aims to extract the critical identity information and retrieve known vulnerabilities. In the evaluation, we collect information through web crawlers and build a comprehensive vulnerability database. We also build a prototype system based on WNV-Detector and evaluate it with routers from various vendors on the market. Our results indicate that the effectiveness of our WNV-Detector, i.e., the success rate of vulnerability detection could achieve 95.5%.


2021 ◽  
Vol 336 ◽  
pp. 08010
Author(s):  
Jingxia Chen ◽  
Xiuling Chen ◽  
Bo Yu

The vulnerability scanner designed in this paper completed the collection of information and scanning of vulnerability, including six parts: input assets, asset collection, vulnerability profile, plug-in upload, single case detection and report display. The framework of vue realized the front end that included six pages, and the framework of gin realized the back end. The interface completed the separation of the front and back end. The database using MySQL designed seven tables. This scanner can avoid tedious and repetitive work, it can realize automatic scanning and testing of network vulnerabilities.


Author(s):  
Swati Chakraborti ◽  
Atrayee Majumdar Ray ◽  
Swagata Roy Chatterjee ◽  
Mohuya Chakraborty

2020 ◽  
Vol 6 (2) ◽  
Author(s):  
Endah Kumala Dewi

In the information technology era, the banking industry must compete in an external environment characterized by high levels of uncertainty, complexity and change. Accidents in high-risk manufacturing organizations are generally related to safety studies. The researcher attempted to study "accidents" due to network vulnerabilities in IT-based organizations using the safety concept. This qualitative study is important because it provides analysis of IT support for organizational development. This study used multi-case study and grounded research approaches. The process of developing an information safety climate is considered an alternative solution other than technology. The study revealed that normal accident theory can be used to explain accidents in IT-based organizations. The process of developing an information security climate in banking organizations is categorized as the emergency type. The manifestation of information safety climate is attentiveness, accountability, ethical sensitivity, integrity and sustainability. Phases that need to be undergone in cultivating the safety climate are: adaptation, learning, awareness to risk, and resilience. Thus, it can be concluded that the climate of an IT-based organization is different from the climate of a non technology-based organization.


2020 ◽  
Author(s):  
Yong Weixiong ◽  
Robin Lee ◽  
Alvin Kon Soon Seng ◽  
Fatima tuz Zahra

<p>The paper aims to raise awareness in the domain of security and privacy concerns in network communication that takes place among machines. Knowing that there are lots of possibilities that an attacker or hacker may get a slight chance of causing exploits from network vulnerabilities leads to threats at personal and organizational level. In this paper, research has been carried out using survey methodology to gather user viewpoints on general awareness and importance of network security and privacy. The results will be used to support the overall significance of how a network should behave and work on behalf of the users. The main goal as developers and engineers is to prioritize and improve user satisfaction and data protection standard. Therefore, this paper will also discuss the methodologies and possible ways to offer the best strategies for protection against security and privacy attacks. </p>


Author(s):  
Yong Weixiong ◽  
Robin Lee ◽  
Alvin Kon Soon Seng ◽  
Fatima tuz Zahra

<p>The paper aims to raise awareness in the domain of security and privacy concerns in network communication that takes place among machines. Knowing that there are lots of possibilities that an attacker or hacker may get a slight chance of causing exploits from network vulnerabilities leads to threats at personal and organizational level. In this paper, research has been carried out using survey methodology to gather user viewpoints on general awareness and importance of network security and privacy. The results will be used to support the overall significance of how a network should behave and work on behalf of the users. The main goal as developers and engineers is to prioritize and improve user satisfaction and data protection standard. Therefore, this paper will also discuss the methodologies and possible ways to offer the best strategies for protection against security and privacy attacks. </p>


The intelligent network (IN), plays an important role in the telecommunication process, as a part of the human life. Although, the numbers of network vulnerabilities discovered each year are growing rapidly, and it becomes impossible for system administrators to keep the software running on their network machines free of security bugs. Thus, it is important to clear the vulnerability of certain network or system, this paper investigates the vulnerability analysis of intelligent network (IN), by giving a clear study of the vulnerability analysis of the intelligent network , by applying two scenarios, one is done using different types of operating systems trying to hack them and the other scenario by studying the routing vulnerability problems. This study can be valuable to another research and development work


With the increasing adoption of application running over wireless networking system, there is also an increasing security concern in it. Review of existing security protocols in wireless networks shows that they are highly specific to adversaries and hence they cannot be applicable with the dynamic state of network vulnerabilities. Apart from this, it was also explored that public key encryption requires a drastic change in its design methodology in order to make it more resource friendly for increased network lifetime. Therefore, this manuscript presents a novel framework that develops an enhanced model of public key encryption using algebraic structure that can generate an elite secret key. The study also introduces a design of an efficient trapdoor function which renders maximum resiliency towards different forms of lethal attacks as well as adhere to maximum security standards in wireless network. The study outcome shows that proposed system out performs frequently used existing security standards in many aspects.


Sign in / Sign up

Export Citation Format

Share Document