International Journal of Innovative Research in Computer and Communication Engineering
ISSN Approved Journal | Impact factor: 8.771 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines
| Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.771 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI) |
| TITLE | FalconX: An Enterprise Security Audit System |
|---|---|
| ABSTRACT | In today’s rapidly evolving digital landscape, enterprises operate in complex hybrid environments that significantly increase their exposure to cybersecurity threats such as misconfigurations, unauthorized access, and evolving vulnerabilities [2][5][11]. This paper presents FalconX, an automated Enterprise Security Audit System (ESAS) designed to streamline vulnerability assessment, compliance validation, and continuous monitoring within a unified platform. Traditional security auditing approaches are largely manual, time-consuming, and lack real-time visibility, making them inefficient for modern infrastructures [3]. This paper presents FalconX, an automated Enterprise Security Audit System (ESAS) designed to streamline vulnerability assessment, compliance validation, and continuous monitoring within a unified platform. The system integrates industry-standard tools such as Nmap and OpenVAS with a Flask-based architecture to perform audits and generate centralized reports. FalconX introduces a hybrid approach combining automated vulnerability scanning, rule-based compliance verification aligned with standards such as ISO 27001 and NIST [4][12], and Role-Based Access Control (RBAC) to ensure secure and controlled audit execution. Experimental evaluation demonstrates a reduction in audit time and improved operational efficiency compared to traditional methods [6]. The system provides scalable and customizable security auditing capabilities, making it suitable for modern enterprise environments. |
| AUTHOR | DHARMABHASKAR PANCHGALLE, JAY NAVALE, PIYUSH LATNE, ROHIT CHAVHAN, PROF. D. G. JADHAV Department of Information Technology, Sinhgad College of Engineering, Maharashtra, India Guided, Department of Information Technology, Sinhgad College of Engineering, Maharashtra, India |
| VOLUME | 183 |
| DOI | DOI: 10.15680/IJIRCCE.2026.1404032 |
| pdf/32_FalconX An Enterprise Security Audit System.pdf | |
| KEYWORDS | |
| References | [1] D. Panchgalle, J. Navale, P. Latne, and R. Chavhan, “Enterprise security audit system,” International Journal of Innovative Research in Computer and Communication Engineering, vol. 13, Issue 11, November 2025. [2] T. Mather, S. Kumaraswamy, and S. Latif, Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance. Sebastopol, CA, USA: O’Reilly Media, 2009. [3] K. Julisch, “Security compliance: The next frontier in security research,” in Proc. New Security Paradigms Workshop (NSPW), 2009, pp. 71–74. [4] International Organization for Standardization, ISO/IEC 27001:2013 – Information Security Management Systems Requirements, ISO, 2013. [5] Symantec Corporation, State of Enterprise Security Report 2010, Symantec, 2010. [6] E. A. Altulaihan, A. Alismail, and M. Frikha, “A survey on web application penetration testing,” Electronics, vol. 12, no. 1229, pp. 1–25, 2023. [7] Z. Hu, R. Beuran, and Y. Tan, “Automated penetration testing using deep reinforcement learning,” in Proc. IEEE EuroS&P Workshops, 2020, pp. 1–10. [8] W. B. Shahid et al., “Deep learning-based framework for web attacks detection, mitigation, and attacker profiling,” Journal of Network and Computer Applications, vol. 198, p. 103270, 2022. [9] S. K. Lala, A. Kumar, and T. Subbulakshmi, “Secure web development using OWASP guidelines,” in Proc. ICICCS, 2021, pp. 1–6. [10] A. Shostack, Threat Modeling: Designing for Security. Indianapolis, IN, USA: Wiley, 2014. [11] J. Vehent, Securing DevOps: Security in the Cloud. Shelter Island, NY, USA: Manning Publications, 2018. [12] R. Scarfone and P. Mell, “Guide to intrusion detection and prevention systems (IDPS),” NIST Special Publication 800-94, 2007. [13] OWASP Foundation, “OWASP Top 10: The Ten Most Critical Web Application Security Risks,” 2021. [14] G. McGraw, “Software security,” IEEE Security & Privacy, vol. 2, no. 2, pp. 80–83, 2004. [15] Tenable, “Nessus Vulnerability Scanner,” [Online]. Available: https://www.tenable.com [16] Qualys Inc., “Qualys Cloud Platform,” [Online]. Available: https://www.qualys.com |