首页> 外文会议>International Conference on Wireless and Optical Communications Networks >Analysis of signature and signature free bufferoverflow detection for gif and jpg format
【24h】

Analysis of signature and signature free bufferoverflow detection for gif and jpg format

机译:GIF和JPG格式的签名和签名免费Bufferover流程检测分析

获取原文

摘要

Internet threat have different form of attacks, considering individual users to obtain control over data and network. The Buffer Overflow which is one of the most frequently occurring security vulnerabilities on network. Buffer Overflow occurs while writing data to a buffer and it overruns the buffer's threshold and overwrites it to neighboring memory. The techniques to avoid buffer overflow vulnerability vary per architecture, Operating system and memory region. The Signature based buffer overflow detection finds the particular Signature and if that found it blocks it to protect form malicious attack. The remaining request are consider for checking against the buffer size and grant to server if the buffer of request is less than or equal to defined threshold value of buffer. Signature free first filters and extracts instruction sequences from a request. Finally it compares the number of useful instructions to a threshold to determine if this instruction sequence contains code. Signature free thus it can block new and unknown buffer overflow attacks, Signature free is also immunized from most attack-side code obfuscation methods. Since Signature free is transparent to the servers that protected, it is efficient for economical Internet wide deployment with very low deployment and maintenance cost. We are proposing novel techniques for preventing buffer overflow during the transmission of images of different formats. In this paper we have discuss and evaluate certain tools and techniques which prevent buffer overflows. We have also discussed some modern tools and techniques with their pros and cons.
机译:互联网威胁有不同形式的攻击,考虑到个人用户获得对数据和网络控制。缓冲区溢出是网络上最频繁出现的安全漏洞之一。缓冲区溢出,而数据写入缓冲区时,它溢出缓冲区的门槛,它会覆盖到相邻的存储。为了避免缓冲器溢出漏洞的技术每体系结构,操作系统和存储器地区而异。基于签名缓冲区溢出检测发现特定的签名和如果发现它阻止它来保护形式的恶意攻击。剩余的请求被考虑针对缓冲区大小检查和授予服务器,如果请求的缓冲器是小于或等于缓冲器的定义的阈值。签名游离的第一过滤器和提取来自请求指令序列。最后,它的有用指令的数量与阈值比较,以确定是否该指令序列包含代码。签名免费因而它可以阻止新的和未知的缓冲区溢出攻击,签名自由也从大多数攻击端的代码混淆方法免疫。由于签名自由是透明的,是保护服务器,这是非常低的部署和维护成本效益的经济网络广泛部署。我们提议新颖技术的不同格式的图像的传输期间防止缓存器溢出。在本文中,我们讨论和评估某些工具和防止缓冲区溢出技术。我们还讨论了一些现代的工具和技术与他们的优点和缺点。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号