The computer system may face several problem because of threats and forms of attack. This project presents a methodology for the automatic discovery of zombie based vulnerabilities in software components. Zombie based attack is injected to the system through the network, these attack takes the availabilityof server and the responses returned to the clients. The observation of an unexpected behavior suggests the presence of vulnerability that was triggered by some particular attack (or group of attack). Once the vulnerability is detected, the process of building a secured system is done by overcoming the vulnerability. The methodology was implemented in XDoS and TCP/IP. It was designed to look for vulnerabilities in network server applications, although it can also be utilized with local daemons.
展开▼