Usage of Variable Structure Congestion Control Protocol (VCP) in Buffer Overflow Attack Blocker
نویسندگان
چکیده
منابع مشابه
Prevention of Buffer overflow Attack Blocker Using IDS
Now a day internet threat takes a blended attack form, targeting individual users to gain control over networks and data. Buffer Overflow which is one of the most occurring security vulnerabilities in a Computer’s world. Buffer Overflow occurs while writing data to a buffer and it overruns the buffer's boundary and overwrites it to a adjacent memory. The techniques to exploit buffer overflow vu...
متن کاملScalable Network-Based Buffer Overflow Attack Detection
Buffer overflow attack is the main attack method that most if not all existing malicious worms use to propagate themselves from machine to machine. Although a great deal of research has been invested in defense mechanisms against buffer overflow attack, most of them require modifications to the network applications and/or the platforms that host them. This paper presents a network-based buffer ...
متن کاملPrevention of Buffer Overflow Attack on Mobile Ad Hoc Networks
A policy enforcing in MANETs challenging because lack of they infrastructure so introduce a Satem. Satem is a service aware trusted execution monitor. It kernel level trusted execution monitor, it verifies the node trustworthiness of enforcing the required set policies. To achieve a services aware by limiting scope of monitoring to protected services. To initialize the trust on the monitor the ...
متن کاملDynamic Buffer Overflow Detection
The capabilities of seven dynamic buffer overflow detection tools (Chaperon, Valgrind, CCured, CRED, Insure++, ProPolice and TinyCC) are evaluated in this paper. These tools employ different approaches to runtime buffer overflow detection and range from commercial products to opensource gcc-enhancements. A comprehensive testsuite was developed consisting of specifically-designed test cases and ...
متن کاملBuffer overflow and format string overflow vulnerabilities
Buffer overflow vulnerabilities are among the most widespread of security problems. Numerous incidents of buffer overflow attacks have been reported and many solutions have been proposed, but a solution that is both complete and highly practical is yet to be found. Another kind of vulnerability called format string overflow has recently been found, and though not as popular as buffer overflow, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2012
ISSN: 0975-8887
DOI: 10.5120/4843-7108