Buffer Overflow Detection and Avoidance Technique

Authors

  • P. B. Niranjane  Department of Computer Science & Engineering, Babasahe Naik College of Engineering , Pusad, Maharastra, India

DOI:

https://doi.org/10.32628/IJSRSET23102126

Keywords:

Security, Attacks, Buffer-Overflow, Signature, Signature free, Malicious code, Intrusion

Abstract

Today's world totally work through important asset i.e. information and there should protective shield to protect such asset with good performance. Therefore Security issue is the important and elicited topic among IT professionals. The Buffer Overflow which is one of the most frequently occurring security vulnerabilities on network. Buffer Overflow occurs while writing data to a buffer and it overruns the buffer's threshold and overwrites it to neighboring memory. This paper focused on finding and detection of buffer overflow occurs during transmission of jpg and gif file format over network. The signature and signature free detection mechanism is implemented for detection of buffer overflow during transmission. First the signature based detection finds a particular signature after the signature free technology is implanted for testing the buffer overflow. The discussion is concluded with some thoughts on buffer overflow detection in general, and directions for the analysis and remediation of buffer over?ow detection for gif and jpg file format.

References

  1. Z. Liang and R. Sekar, ?Fast and Automated Generation of Attack Signatures: A Basis for Building Self-Protecting Servers, Proc. 12th ACM Conf. Computer and Comm. Security (CCS), 2005.
  2. B.A. Kuperman, C.E. Brodley, H. Ozdoganoglu, T.N. Vijaykumar, and A. Jalote, “Detecting and Prevention of Stack Buffer Overflow Attacks,” Comm. ACM, vol. 48, no. 11, 2005
  3. D. Evans and D. Larochelle, “Improving Security Using Extensible Lightweight Static Analysis,” IEEE Software, vol. 19, no. 1, 2002.
  4. Xinran Wang, Chi-Chun Pan, Peng Liu, and Sencun Zhu, “Signature free: A Signature-Free Buffer Overflow Attack Blocker”, Ieee Transactions On Dependable And Secure Computing, Vol. 7, No. 1, January-March 2010.
  5. J. Pincus and B. Baker, “Beyond Stack Smashing: Recent Advances in Exploiting Buffer Overruns,” IEEE Security and Privacy, vol. 2, no. 4, 2004.
  6. Eric Haugh and Matt Bishop, “Testing C Programs for Buffer Overflow Vulnerabilities”. University of Californai Devis. 2004
  7. O. Ruwase and M. Lam. A practical dynamic buffer overflow detector. In Proceedings of Network and Distributed System Security Symposium, pages 159–169, 2004.

Downloads

Published

2023-04-30

Issue

Section

Research Articles

How to Cite

[1]
P. B. Niranjane "Buffer Overflow Detection and Avoidance Technique" International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 10, Issue 2, pp.726-731, March-April-2023. Available at doi : https://doi.org/10.32628/IJSRSET23102126