首页> 外文会议>Proceedings of the International Conference on Security and Management(SAM'03) >Limits of signature-based detection of buffer overflow attacks
【24h】

Limits of signature-based detection of buffer overflow attacks

机译:基于签名的缓冲区溢出攻击检测的局限性

获取原文
获取原文并翻译 | 示例

摘要

Although C language supports pointer type variables, it does not recognize the boundaries of arrays. Due to this vulnerability buffer overflow attack has been one of the most widely used-ways of security breach. To cope with this problem, intrusion detection systems usually employ signature-matching technique which finds occurrences of known signatures of buffer overflow attack. In this study, we show there is a possibility of more threats and intelligent ways of buffer overflow attacks that can dodge the signature-based detection methods including the most recently proposed ones.
机译:尽管C语言支持指针类型变量,但它无法识别数组的边界。由于存在此漏洞,缓冲区溢出攻击已成为最广泛使用的安全破坏方式之一。为了解决这个问题,入侵检测系统通常采用签名匹配技术,该技术可以发现缓冲区溢出攻击的已知签名。在这项研究中,我们表明存在更多的威胁和缓冲区溢出攻击的智能方法,这些方法和方法可以避开基于签名的检测方法,包括最近提出的方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号