A Vulnerability Assessment and Mitigation Platform Using Drogon

  • Unique Paper ID: 175965
  • PageNo: 6420-6422
  • Abstract:
  • This platform provides an automated, comprehensive solution for identifying, analysing, and mitigating security vulnerabilities across networks, systems, and applications. Designed for cybersecurity professionals and IT administrators, it integrates scanning, risk assessment, and remediation guidance into a unified workflow.The system employs advanced scanning techniques, including network probing(via tools like N-map), vulnerability detection (using databases like CVE/NVD), and configuration audits to uncover weaknesses. Machine learning enhances threat prioritisation by correlating scan results with exploit intelligence, reducing false positives.A centralised dashboard visualises risks with severity scoring, impacted assets, and recommended patches.

Copyright & License

Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{175965,
        author = {Vasanthan.R and Parthiban.b and Mohammed Mohaideen and Vignesh.R},
        title = {A Vulnerability Assessment and Mitigation Platform Using Drogon},
        journal = {International Journal of Innovative Research in Technology},
        year = {2025},
        volume = {11},
        number = {11},
        pages = {6420-6422},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=175965},
        abstract = {This platform provides an automated, comprehensive solution for identifying, analysing, and mitigating security vulnerabilities across networks, systems, and applications. Designed for cybersecurity professionals and IT administrators, it integrates scanning, risk assessment, and remediation guidance into a unified workflow.The system employs advanced scanning techniques, including network probing(via tools like N-map), vulnerability detection (using databases like CVE/NVD), and configuration audits to uncover weaknesses. Machine learning enhances threat prioritisation by correlating scan results with exploit intelligence, reducing false positives.A centralised dashboard visualises risks with severity scoring, impacted assets, and recommended patches.},
        keywords = {Social Networking, Digital Connectivity, Real Time Conversations, UserAuthentication, ,Unified Platform, Community Engagement, Unsupervised learning},
        month = {April},
        }

Cite This Article

Vasanthan.R, , & Parthiban.b, , & Mohaideen, M., & Vignesh.R, (2025). A Vulnerability Assessment and Mitigation Platform Using Drogon. International Journal of Innovative Research in Technology (IJIRT), 11(11), 6420–6422.

Related Articles