首页> 外文期刊>Virus Bulletin >CODE EMULATION IN NETWORK INTRUSION DETECTION PREVENTION SYSTEMS
【24h】

CODE EMULATION IN NETWORK INTRUSION DETECTION PREVENTION SYSTEMS

机译:网络入侵检测预防系统中的代码仿真

获取原文
获取原文并翻译 | 示例
       

摘要

The aim of this article was to scratch the surface of the real problem that IDS/IPS vendors try to battle. Personally, I think they are losing this battle for now. It seems that some attack detection should be done strictly at host level. HIDS should also introduce additional safeguards at the system level to stop particular attack classes. Such architecture should be strengthened with network-based IPSs. It will be interesting to see for how long we will have to deal with buffer overflow vulnerabilities. The introduction of different stack protection techniques in conjunction with safe versions of C/C++ functions should make buffer overflow attacks extinct within the next five to eight years. Then the presented emulator will have many more problems to battle.
机译:本文的目的是从根本上解决IDS / IPS供应商试图解决的实际问题。就个人而言,我认为他们目前正在输掉这场战斗。似乎应该严格在主机级别上进行一些攻击检测。 HIDS还应该在系统级别引入其他防护措施,以阻止特定的攻击类别。这种架构应通过基于网络的IPS加以加强。有趣的是,我们将需要处理缓冲区溢出漏洞多长时间。引入不同的堆栈保护技术以及安全版本的C / C ++函数,应该会使缓冲区溢出攻击在未来五到八年内消失。这样,所提供的仿真器将有更多问题需要解决。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号