Anshu Tripathi

Learn More
Discovering and fixing software bugs is a difficult maintenance task, and a considerable amount of effort is devoted by software developers on this issue. In the world of software one cannot get rid of the bugs, fixes, patches etc. each of them have a severity and priority associated to it. There is not yet any formal relation between these components as(More)
One of the major problem in information system security assessment is lack of standard vulnerability categorization scheme or taxonomy. Various analyses indicated that majority of software vulnerabilities tend to focus in few areas and associated with small set of services. An effective vulnerability taxonomy that can relate vulnerability causes, effects(More)
With increasing dependency on IT infrastructure, the main objective of a system administrator is to maintain a stable and secure network, with ensure that the network is robust enough against malicious network users like attackers and intruders. Security risk management provides way to manage the growing threats to infrastructures or system. This paper(More)
Rising vulnerability statistics demands multidimensional trend analysis for efficient threat mitigation. Understanding trends aids in early detection of problems and also in planning defense mechanisms. In this regard, this paper presents finegrained trend analysis on classified vulnerability data provided by NVD, across six CVSS base metrics. Such analysis(More)
This Paper provides Proactive share key refreshing technique for maintaining the security of the system, even when some nodes are in control of attacker. It provides an automated recovery of the security of individual components, avoiding the use of expensive and inconvenient manual processes. The technique can be used with threshold cryptography, by(More)
Security is often viewed as an arms race between attackers, who try to exploit vulnerabilities and security administrators, who try to protect system against these attacks. In this regard, analysis of emerging security trends can be helpful in planning proper countermeasures to ensure security. Several studies and surveys exist that provide statistical(More)
Security is an important issue for networks, especially for those security-sensitive applications. In the entire environment of security, it is necessary to ensure privacy. This Paper provides share key refreshing technique for maintaining the security of the system, even when some nodes are in control of attacker. It provides an automated recovery of the(More)