Loading

Automatic Security Analyzing Router OS
Abheesta Vemuru1, E. John Bruce2, A. Veeramuthu3

1Abheesta Vemuru, Department of Computer Science, Sathyabama Institute of Science and Technology, Chennai (Tamil Nadu), India.
2E. John Bruce, Department of Computer Science, Sathyabama Institute of Science and Technology, Chennai (Tamil Nadu), India.
3A.Veeramuthu, Department of Information Technology, Sathyabama Institute of Science and Technology, Chennai (Tamil Nadu), India.

Manuscript received on 01 May 2019 | Revised Manuscript received on 15 May 2019 | Manuscript published on 30 May 2019 | PP: 992-996 | Volume-8 Issue-7, May 2019 | Retrieval Number: G5352058719/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Most, if not all, Routers in this world are Network-embedded Devices that run vendor firmware that controls all of its’ integral functions. This router is usually the first line of defense between a user in that particular network and the devices on the Internet. The case is the same in Offices as well as Homes. While the world has always succeeded in rapidly evolving and advancing technology in all fields, the networking field develops at a relatively slower pace. Routers are vital for the security of any Network considering how they are in a privileged position with respect to the remaining devices on that network. Even so, Routers are more often than not, not updated by the users thus leaving various security vulnerabilities. To fix this, concepts and models have been made to analyze device in a large scale by scanning or by manually testing each device. All these tests and analyses are done externally to the router but not as an internal process by the router itself. It would save a lot of resources if the router was automated to test its own security at regular intervals. Thus, this work will involve the building of a Router from scratch using an Operating System with minimal packages, and shell scripts that build a Dynamic Analysis software.
Keyword: Dynamic Analysis Software, Network-Embedded Devices, Operating System, Router, Security, Shell Scripts, Vulnerabilities.
Scope of the Article: Security, Privacy and Trust in IoT & IoE