1. How to submit my research paper? What’s the process of publication of my paper?
The journal receives submitted manuscripts via email only. Please submit your research paper in .doc or .pdf format to the submission email: ijsps@ejournal.net.
2. Can I submit an abstract?
The journal publishes full research papers. So only full paper submission should be considered for possible publication...[Read More]

Vulnerability Research and Mapping of Campus Network

Justinus Andjarwirawan, Agustinus Noertjahyana, and Devi C. Angi
Informatics Department, Petra Christian University, Surabaya, Indonesia
Abstract—Vulnerability of computer systems in campus-wide network has been an issue for years, since networks were open to allow anonymous access. It will take many studies of computer security to protect. A vulnerability research and mapping of a network is a step to address the issue, as well as minimizing security breach in the future. Evaluation of a network security can be done by many tools available and also guidelines based on CEH (Certified Ethical Hacker) module and Acunetix for web specific security. These test tools were deployed several times on every target, scanning open ports and sending test scripts to find vulnerabilities. With CEH and Acunetix guidelines, the evaluation shows many common security weaknesses such as Cross-Site Scripting, SQL injection and DDoS vulnerabilities and therefor this evaluation leads to security recommendations based on the weaknesses and security holes found.
 
Index Terms—vulnerability, penetration testing, vulnerability scanning, certified ethical hacker, acunetix

Cite: Justinus Andjarwirawan, Agustinus Noertjahyana, and Devi C. Angi, "Vulnerability Research and Mapping of Campus Network," International Journal of Signal Processing Systems, Vol. 4, No. 3, pp. 204-208, June 2016. doi: 10.18178/ijsps.4.3.204-208
Copyright © 2012-2024. International Journal of Signal Processing Systems, All Rights Reserved