Download now Free registration required
A study on the current network enabled vulnerability checking software was made. It was found that most of the available solutions had a some defect or the other in implementation of the applications as there was a large delay in the assessment cycle. This was due to the inherent fact that the complete application had to scanned bit by bit and checked for byte length and code compared with the byte address of the sender and a check is made at the firewall for the word by word comparability. In this paper, the authors discuss an active analysis of the system, for any weakness or technical flaws in the operating system or the applications which as running on them. The security solution followed the CORBA architecture.
- Format: PDF
- Size: 290.58 KB