首页> 外国专利> DEVICE AND METHOD FOR GENERATING RULE TO COPE WITH UNAUTHORIZED ACCESS, METHOD AND DEVICE FOR COPING WITH UNAUTHORIZED ACCESS, PROGRAM FOR GENERATING RULE TO COPE WITH UNAUTHORIZED ACCESS, RECORDING MEDIUM FOR RECORDING THIS PROGRAM, PROGRAM FOR COPING WITH UNAUTHORIZED ACCESS, AND RECORDING MEDIUM FOR RECORDING THIS PROGRAM

DEVICE AND METHOD FOR GENERATING RULE TO COPE WITH UNAUTHORIZED ACCESS, METHOD AND DEVICE FOR COPING WITH UNAUTHORIZED ACCESS, PROGRAM FOR GENERATING RULE TO COPE WITH UNAUTHORIZED ACCESS, RECORDING MEDIUM FOR RECORDING THIS PROGRAM, PROGRAM FOR COPING WITH UNAUTHORIZED ACCESS, AND RECORDING MEDIUM FOR RECORDING THIS PROGRAM

机译:用于生成规则以应对未经授权的访问的设备和方法,用于应对未经授权的访问以应对未经授权的访问的方法和设备,用于生成规则以用于未经授权的访问以应对的程序,用于记录该程序的媒体,用于记录该内容的,用于记录并用于解决该问题的程序该程序

摘要

PROBLEM TO BE SOLVED: To provide a new technique to eliminate vulnerability to attacking DoS by stack smashing.;SOLUTION: An input bucket is stored as a log. When a stack-smashing attack is detected, the position of a return address under the attack is determined and a position indicated by the position is regarded as a position where the trace of the attack starts. Next, the byte sequence that matches the trace of the attack for the longest period of time is detected and regarded as the trace of the attack. Also, the header information of the bucket indicated by the byte sequence corresponding to the longest period of time is obtained from the input bucket log. Rules to cope with unauthorized access are created which include as elements of the rules the byte sequence regarded as the trace of the attack and the header information of the byte sequence. The rules are distributed. After receiving the rules, the destination of the rules shuts off buckets sent from the outside that match the stack-smashing attack included in the rules.;COPYRIGHT: (C)2005,JPO&NCIPI
机译:要解决的问题:提供一种新技术来消除通过堆栈粉碎来攻击DoS的脆弱性。解决方案:输入存储段作为日志存储。当检测到堆栈粉碎攻击时,确定攻击下的返回地址的位置,并且将该位置指示的位置视为攻击开始的位置。接下来,检测与攻击的踪迹匹配时间最长的字节序列,并将其视为攻击的踪迹。另外,从输入桶日志中获得由与最长的时间段相对应的字节序列表示的桶的头信息。创建应对未授权访问的规则,这些规则包括被视为攻击踪迹的字节序列和该字节序列的标头信息作为该规则的元素。规则是分布式的。收到规则后,规则的目的地将关闭从外部发送的,与规则中包括的堆栈粉碎攻击相匹配的存储桶。版权所有:(C)2005,JPO&NCIPI

著录项

  • 公开/公告号JP2004334607A

    专利类型

  • 公开/公告日2004-11-25

    原文格式PDF

  • 申请/专利权人 NIPPON TELEGR & TELEPH CORP NTT;

    申请/专利号JP20030130950

  • 发明设计人 IWAMURA MAKOTO;KASHIWA MASARU;

    申请日2003-05-09

  • 分类号G06F15/00;G06F9/42;

  • 国家 JP

  • 入库时间 2022-08-21 22:32:07

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号