A Signature-Free Buffer Overflow Attack Detection Using DST

Provided by: International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
Topic: Security
Format: PDF
Now-a-days internet threat takes a blended attack form, targeting individual users to gain control over networks and data. Buffer Overflow which is one of the most occurring security vulnerabilities in Internet services such as such as web service, cloud service etc. This motivated by the observation those buffer overflow attacks typically contain executable code whereas legitimate user requests never contain executables in most internet services. Unlike the previous detection algorithms, a new SigFree uses a Distributed Spanning Tree (DST) technique, fast, and hard for exploit code to evade.

Find By Topic