Volume 4 | Issue 9 | Year 2013 | Article Id. IJMTT-V4I9P1 | DOI : https://doi.org/10.14445/22315373/IJMTT-V4I9P1
Now a day’s buffer overflows have take place the most common target for network based attacks. The main proliferation method used by worms, malicious codes and improper coding by developers. Many techniques have been developed to secure servers, but the conciliation of the vulnerable codes make buffer overflow attacks again. Buffer overflows occur it stop system functions and crash the memory. In the face of automatic function execution, cyclic attacks causes due to malicious codes, and it leads to repeated restarts of the victim application, and it makes service unavailable. In this research paper we have a hopeful new move towards to learn the characteristics of buffer overflow vulnerability, and we develop a suitable algorithm to avoid and prevent the buffer overflows.
[1]. Mathematical Symbol Table http://xaravve.trentu.ca/mascot/handbook/SEC_symbols.pdf
[2]. peter Silverman and Richard Johnson “A comparison buffer overflow prevention, implementation and weakness”
[3]. P. Vadivel Murugan, and K. Alagarsamy "Buffer Overflow Attack Vulnerability in Stack.", International Journal of Computer Applications 13.5 (2011): 1-2.
[4]. Seema Yadav, Khaleel Ahmad and Jayant Shekhar. “Classification and Prevention Techniques of Buffer Overflow Attacks” Proceedings of the 5th National Conference; INDIACom-2011 Computing For Nation Development, March 10 – 11, 2011
[5]. Tz-Rung Lee1, Kwo-Cheng Chiu1, and Da-Wei Chang A. Hua and S.-L. Chang “A Lightweight Buffer Overflow Protection Mechanism with Failure-Oblivious Capability”, (Eds.): ICA3PP 2009, LNCS 5574, pp. 661–672, 2009. Springer - Verlag Berlin Heidelberg 2009
[6]. Vadivel Murugan.P K.Alagarsamy “Averting Buffer Overflow Attack in Networking OS using – BOAT Controller”, International Journal of Computer Trends and Technology (IJCTT) – volume 4 Issue 7–July 2013
[7]. V.Selvi Dr.R.Umarani, “Comparative Analysis of Ant Colony and Particle Swarm Optimization Techniques” International Journal of Computer Applications (0975 – 8887) Volume 5– No.4, August 2010.
P.Vadivelmurugan , K.Alagarsamy, "Securing Server System from Buffer Overflow vulnerability using Vel-Alagar Algorithm," International Journal of Mathematics Trends and Technology (IJMTT), vol. 4, no. 9, pp. 153-157, 2013. Crossref, https://doi.org/10.14445/22315373/IJMTT-V4I9P1