Cataloguing and Avoiding the Buffer Overflow Attacks in Network Operating Systems
|
International Journal of Computer & Organization Trends (IJCOT) | |
© 2013 by IJCOT Journal | ||
Volume-3 Issue-4 |
||
Year of Publication : 2013 | ||
Authors : P.Vadivelmurugan , K.Alagarsamy |
Citation
P.Vadivelmurugan , K.Alagarsamy . "Cataloguing and Avoiding the Buffer Overflow Attacks in Network Operating Systems" . International Journal of Computer & organization Trends (IJCOT), V3(8):67-71 Jul - Aug 2013, ISSN 2249-2593, www.ijcotjournal.org. Published by Seventh Sense Research Group.
Abstract
The application software has a different dimension, size and intricacies is rising rapidly in current technology era and simultaneously increase a programming bugs also. The programming bugs cause vulnerabilities to the security systems. The large number of exploit is based on the buffer overflow vulnerability. In this paper, we classify the number of buffer overflow attacks with generation. Buffer overflow attacks are very harmful to current scenario; programmer writes a coding, in a buffer that overflows the boundary and overwrites in adjacent memory. This causes the erratic result and crash or breaks the computer security. We suggest the tools to prevent the buffer overflow vulnerability.
References
[1] Crispin Cowan. “Posting to bug mailing”List. http://geek-girl.com/bugtraq/1999_1/0481.html
[2] “Classification and Prevention Techniques of Buffer Overflow Attacks”SeemaYadav, Khaleel Ahmad and JayantShekharProceedings of the 5th National Conference; INDIACom-2011 Computing for Nation Development, March 10 – 11, 2011 BharatiVidyapeeth’s Institute of Computer Applications and Management, New Delhi
[3] https://sites.google.com/site/bufferattack/attacks/heap
[4] “On the Evolution of Buffer Overflows”, MatthiasVallentin,This email address is being protected from spambots. You need JavaScript enabled to view it. May 20, 2007
[5] “Classification and Prevention Techniques of Buffer Overflow Attacks”Proceedings of the 5th National Conference; INDIACom-2011 Computing For Nation Development, March 10 – 11, 2011 SeemaYadav, Khaleel Ahmad and JayantShekhar.
[6] “A comparison buffer overflow prevention, implementation and weakness” written by: peter Silverman and Richard Johnson
[7] "Buffer Overflow Attack Vulnerability in Stack." P. VadivelMurugan, and K. Alagarsamy, International Journal of Computer Applications 13.5 (2011): 1-2.
[8] “A Lightweight Buffer Overflow Protection Mechanism with Failure-Oblivious Capability”, Tz-Rung Lee1, Kwo-Cheng Chiu1, and Da-Wei Chang2 A. Hua and S.-L. Chang (Eds.): ICA3PP 2009, LNCS 5574, pp. 661–672, 2009. Springer - Verlag Berlin Heidelberg 2009
[9] “Averting Buffer Overflow Attack in Networking OS using – BOAT Controller”, VadivelMurugan.PK.Alagarsamy,International Journal of Computer Trends and Technology (IJCTT) – volume 4 Issue 7–July 2013
[10] “Comparative Analysis of Ant Colonyand Particle Swarm Optimization Techniques”V.SelviDr.R.Umarani, International Journal of Computer Applications (0975 – 8887)Volume 5– No.4, August 2010 [11]“A comparative analysis of methods of defense against buffer overflow attacks”. I. simon.http://www.mcs.csuhayward.edu/˜simon/security/boflo.html, January 2001. [12] “Take Two Aspirin, and Patch ThatSystem – Now”, J. McCarthy, SecurityWatch, August 31, 2001. [13] “A Robust Kernel-Based Solution to Control-Hijacking Buffer OverflowAttacks”Li-Han Chen, Fu-Hau Hsu, Cheng-Hsien Huang, Chih-Wen Ou,Chia-Jun Lin And Szu-Chi Liu Journal Of Information Science And Engineering 27,869-890 (2011).
Keywords
buffer overflow, stack smashing, heap overflow, corrupting memory, malicious code