Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{194870,
author = {Matru Dhanvath and K. Manideep and K.Saikrishna and M. Shiva and K.Ranadhir},
title = {DEFENDERPEAS - Privilege Escalation Assessment and Safeguard Tool},
journal = {International Journal of Innovative Research in Technology},
year = {2026},
volume = {12},
number = {10},
pages = {5590-5597},
issn = {2349-6002},
url = {https://ijirt.org/article?manuscript=194870},
abstract = {This paper presents Defender PEAS, a platform that helps find and prevent attacks that try to gain access on a computer system. Defender PEAS is designed for companies and models how attacks can happen across different system boundaries. Traditional tools just list what is wrong with a system. Defender peas do more. It uses a structure with many layers to turn system data into useful security information. The framework has parts that work together. Some parts gather information about the system without changing it. Another part takes this information. Makes it structured and trustworthy. A graph engine then shows how different parts of the system are connected. Defender PEAS then uses rules and checks to find paths of attack. It looks at transitions like user to administrator, administrator to system. From a container to the host. This helps in understanding attacks. The architecture of Defender PEAS makes sure that each part has a job. One part gathers information. Another part makes sense of this information. A third part analyses connection. Tests show that Defender PEAS is better at finding and understanding attacks than tools. It provides outputs that can be used in security dashboards. This helps in assessing and fixing vulnerabilities, in company environments. Defender PEAS helps companies protect themselves proactively.},
keywords = {Attack path analysis, graph-based security modeling, privilege escalation detection, System security analysis, Trust relationship modeling.},
month = {March},
}
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry