Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{175965,
author = {Vasanthan.R and Parthiban.b and Mohammed Mohaideen and Vignesh.R},
title = {A Vulnerability Assessment and Mitigation Platform Using Drogon},
journal = {International Journal of Innovative Research in Technology},
year = {2025},
volume = {11},
number = {11},
pages = {6420-6422},
issn = {2349-6002},
url = {https://ijirt.org/article?manuscript=175965},
abstract = {This platform provides an automated, comprehensive solution for identifying, analysing, and mitigating security vulnerabilities across networks, systems, and applications. Designed for cybersecurity professionals and IT administrators, it integrates scanning, risk assessment, and remediation guidance into a unified workflow.The system employs advanced scanning techniques, including network probing(via tools like N-map), vulnerability detection (using databases like CVE/NVD), and configuration audits to uncover weaknesses. Machine learning enhances threat prioritisation by correlating scan results with exploit intelligence, reducing false positives.A centralised dashboard visualises risks with severity scoring, impacted assets, and recommended patches.},
keywords = {Social Networking, Digital Connectivity, Real Time Conversations, UserAuthentication, ,Unified Platform, Community Engagement, Unsupervised learning},
month = {April},
}
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry