DocumentCode :
638222
Title :
Analysis of signature and signature free bufferoverflow detection for gif and jpg format
Author :
Pawar, Pankaj B. ; Nagle, Matt ; Kawadkar, Pankaj K. ; Ambare, Padmashree Kunthe
Author_Institution :
Dept. of Comput. Sci. & Eng., Patel Inst. of Eng. & Sci., Bhopal, India
fYear :
2013
fDate :
26-28 July 2013
Firstpage :
1
Lastpage :
5
Abstract :
Internet threat have different form of attacks, considering individual users to obtain control over data and network. The Buffer Overflow which is one of the most frequently occurring security vulnerabilities on network. Buffer Overflow occurs while writing data to a buffer and it overruns the buffer´s threshold and overwrites it to neighboring memory. The techniques to avoid buffer overflow vulnerability vary per architecture, Operating system and memory region. The Signature based buffer overflow detection finds the particular Signature and if that found it blocks it to protect form malicious attack. The remaining request are consider for checking against the buffer size and grant to server if the buffer of request is less than or equal to defined threshold value of buffer. Signature free first filters and extracts instruction sequences from a request. Finally it compares the number of useful instructions to a threshold to determine if this instruction sequence contains code. Signature free thus it can block new and unknown buffer overflow attacks, Signature free is also immunized from most attack-side code obfuscation methods. Since Signature free is transparent to the servers that protected, it is efficient for economical Internet wide deployment with very low deployment and maintenance cost. We are proposing novel techniques for preventing buffer overflow during the transmission of images of different formats. In this paper we have discuss and evaluate certain tools and techniques which prevent buffer overflows. We have also discussed some modern tools and techniques with their pros and cons.
Keywords :
Internet; computer network security; operating systems (computers); Internet threat; attack-side code obfuscation; buffer threshold; gif format; instruction sequences; jpg format; maintenance cost; malicious attack; memory region; neighboring memory; operating system; security vulnerability; signature free buffer-overflow detection; Buffer overflows; Computers; IP networks; Protocols; Security; Servers; Software; Buffer-Overflow; Intrusion; Malicious code; Signature; Signature free; vulnerabilities;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Wireless and Optical Communications Networks (WOCN), 2013 Tenth International Conference on
Conference_Location :
Bhopal
ISSN :
2151-7681
Print_ISBN :
978-1-4673-5997-9
Type :
conf
DOI :
10.1109/WOCN.2013.6616181
Filename :
6616181
Link To Document :
بازگشت