Automated vulnerability assessment and intrusion for server vulnerabilities

0Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Many invasions against severs of campus-networks occurred in recent years. Such attacks obtained unauthorized privileges or promoted authority levels by exploiting vulnerabilities in servers' operating system or software applications. We studied this kind of attacks and proposed an automated mining and assessing method by using FTP server vulnerabilities as an example. Our proposed method provides a general approach to discover safety vulnerabilities in server applications. It covers solutions in details from creating and sending abnormal data, to monitoring and fault isolation. The method can be easily port to other internet-facing server applications. © 2011 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Huang, W., Wen, W., & Yu, D. (2011). Automated vulnerability assessment and intrusion for server vulnerabilities. In Advances in Intelligent and Soft Computing (Vol. 124, pp. 237–242). https://doi.org/10.1007/978-3-642-25658-5_29

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free