Research Article | Open Access | Download PDF
Volume 3 | Issue 4 | Year 2013 | Article Id. IJCOT-V3I8P112 | DOI : https://doi.org/10.14445/22492593/IJCOT-V3I8P112
Cataloguing and Avoiding the Buffer Overflow Attacks in Network Operating Systems
P.Vadivelmurugan , K.Alagarsamy
Citation :
P.Vadivelmurugan , K.Alagarsamy, "Cataloguing and Avoiding the Buffer Overflow Attacks in Network Operating Systems," International Journal of Computer & Organization Trends (IJCOT), vol. 3, no. 4, pp. 67-71, 2013. Crossref, https://doi.org/10.14445/22492593/ IJCOT-V3I8P112
Abstract
The application software has a different dimension, size and intricacies is rising rapidly in current technology era and simultaneously increase a programming bugs also. The programming bugs cause vulnerabilities to the security systems. The large number of exploit is based on the buffer overflow vulnerability. In this paper, we classify the number of buffer overflow attacks with generation. Buffer overflow attacks are very harmful to current scenario; programmer writes a coding, in a buffer that overflows the boundary and overwrites in adjacent memory. This causes the erratic result and crash or breaks the computer security. We suggest the tools to prevent the buffer overflow vulnerability.
Keywords
buffer overflow, stack smashing, heap overflow, corrupting memory, malicious code
References
[1] Crispin Cowan. “Posting to bug mailing ”List.
http://geek-girl.com/bugtraq/1999_1/0481.html
[2]“Classification and Prevention Techniques of Buffer Overflow
Attacks” SeemaYadav, Khaleel Ahmad and JayantS hekhar Proceedings of the 5th
National Conference; INDIACom-2011 Computing for Nation Development, March 10 –
11, 2011 Bharati Vidyapeeth’s Institute of Computer Applications and Management,
New Delhi
[3] https://sites.google.com/site/bufferattack/attacks/heap
[4] “On the Evolution of Buffer Overflows”, MatthiasVallentin,vallentin@icsi.berkeley.edu May
20, 2007
[5] “Classification and Prevention Techniques of Buffer Overflow
Attacks”Proceedings of the 5th National Conference; INDIACom-2011 Computing For
Nation Development, March 10 – 11, 2011 SeemaYadav, Khaleel Ahmad and
JayantShekhar.
[6] “A comparison buffer overflow prevention, implementation and weakness”
written by: peter Silverman and Richard Johnson
[7] "Buffer Overflow Attack Vulnerability in Stack." P.
VadivelMurugan, and K. Alagarsamy, International Journal of Computer
Applications 13.5 (2011): 1-2.
[8] “A Lightweight Buffer Overflow Protection Mechanism with Failure-Oblivious
Capability”, Tz-Rung Lee1, Kwo-Cheng Chiu1, and Da-Wei Chang2 A. Hua and S.-L.
Chang (Eds.): ICA3PP 2009, LNCS 5574, pp. 661–672, 2009. Springer - Verlag
Berlin Heidelberg 2009.
[9] “Averting Buffer Overflow Attack in Networking OS using – BOAT Controller”,
Vadivel Murugan. PK.Alagarsamy,International Journal of Computer Trends and
Technology (IJCTT) – volume 4 Issue 7–July 2013.
[10] “Comparative Analysis of Ant Colony and Particle Swarm Optimization
Techniques” V.Selvi Dr.R.Umarani, International Journal of Computer Applications
(0975 – 8887)Volume 5– No.4, August 2010.
[11]“A comparative analysis of methods
of defense against buffer overflow attacks”. I.
simon.http://www.mcs.csuhayward.edu/˜simon/security/boflo.html, January 2001.
[12] “Take Two Aspirin, and Patch That System – Now”, J. McCarthy,
Security Watch, August 31, 2001.
[13] “A Robust Kernel-Based Solution to
Control-Hijacking Buffer Overflow Attacks”Li-Han Chen, Fu-Hau Hsu, Cheng-Hsien
Huang, Chih-Wen Ou, Chia-Jun Lin And Szu-Chi Liu Journal Of Information Science
And Engineering 27,869-890 (2011).