International Journal of Computer
& Organization Trends

Research Article | Open Access | Download PDF

Volume 3 | Issue 4 | Year 2013 | Article Id. IJCOT-V3I8P112 | DOI : https://doi.org/10.14445/22492593/IJCOT-V3I8P112

Cataloguing and Avoiding the Buffer Overflow Attacks in Network Operating Systems


P.Vadivelmurugan , K.Alagarsamy

Citation :

P.Vadivelmurugan , K.Alagarsamy, "Cataloguing and Avoiding the Buffer Overflow Attacks in Network Operating Systems," International Journal of Computer & Organization Trends (IJCOT), vol. 3, no. 4, pp. 67-71, 2013. Crossref, https://doi.org/10.14445/22492593/ IJCOT-V3I8P112

Abstract

The application software has a different dimension, size and intricacies is rising rapidly in current technology era and simultaneously increase a programming bugs also. The programming bugs cause vulnerabilities to the security systems. The large number of exploit is based on the buffer overflow vulnerability. In this paper, we classify the number of buffer overflow attacks with generation. Buffer overflow attacks are very harmful to current scenario; programmer writes a coding, in a buffer that overflows the boundary and overwrites in adjacent memory. This causes the erratic result and crash or breaks the computer security. We suggest the tools to prevent the buffer overflow vulnerability.

Keywords

buffer overflow, stack smashing, heap overflow, corrupting memory, malicious code

References

[1] Crispin Cowan. “Posting to bug mailing ”List. http://geek-girl.com/bugtraq/1999_1/0481.html
[2]“Classification and Prevention Techniques of Buffer Overflow Attacks” SeemaYadav, Khaleel Ahmad and JayantS hekhar Proceedings of the 5th National Conference; INDIACom-2011 Computing for Nation Development, March 10 – 11, 2011 Bharati Vidyapeeth’s Institute of Computer Applications and Management, New Delhi

[3] https://sites.google.com/site/bufferattack/attacks/heap
[4] “On the Evolution of Buffer Overflows”, MatthiasVallentin,vallentin@icsi.berkeley.edu May 20, 2007

[5] “Classification and Prevention Techniques of Buffer Overflow Attacks”Proceedings of the 5th National Conference; INDIACom-2011 Computing For Nation Development, March 10 – 11, 2011 SeemaYadav, Khaleel Ahmad and JayantShekhar.
[6] “A comparison buffer overflow prevention, implementation and weakness” written by: peter Silverman and Richard Johnson
[7] "Buffer Overflow Attack Vulnerability in Stack." P. VadivelMurugan, and K. Alagarsamy, International Journal of Computer Applications 13.5 (2011): 1-2.
[8] “A Lightweight Buffer Overflow Protection Mechanism with Failure-Oblivious Capability”, Tz-Rung Lee1, Kwo-Cheng Chiu1, and Da-Wei Chang2 A. Hua and S.-L. Chang (Eds.): ICA3PP 2009, LNCS 5574, pp. 661–672, 2009. Springer - Verlag Berlin Heidelberg 2009.
[9] “Averting Buffer Overflow Attack in Networking OS using – BOAT Controller”, Vadivel Murugan. PK.Alagarsamy,International Journal of Computer Trends and Technology (IJCTT) – volume 4 Issue 7–July 2013.
[10] “Comparative Analysis of Ant Colony and Particle Swarm Optimization Techniques” V.Selvi Dr.R.Umarani, International Journal of Computer Applications (0975 – 8887)Volume 5– No.4, August 2010.
[11]“A comparative analysis of methods of defense against buffer overflow attacks”. I. simon.http://www.mcs.csuhayward.edu/˜simon/security/boflo.html, January 2001.
[12] “Take Two Aspirin, and Patch That System – Now”, J. McCarthy, Security Watch, August 31, 2001.
[13] “A Robust Kernel-Based Solution to Control-Hijacking Buffer Overflow Attacks”Li-Han Chen, Fu-Hau Hsu, Cheng-Hsien Huang, Chih-Wen Ou, Chia-Jun Lin And Szu-Chi Liu Journal Of Information Science And Engineering 27,869-890 (2011).