期刊文献+

基于切片技术的远程缓冲区溢出攻击检测模型

A Model of Defense Remote Buffer Overflow Attack Based On Slice Technology
下载PDF
导出
摘要 远程缓冲区溢出漏洞是网络安全领域危害最严重的安全漏洞,提高远程缓冲区溢出攻击防御能力成为安全研究的重要课题。本文提出了一种基于切片技术的远程缓冲区溢出攻击检测模型,给出了模型的架构思想和结构,以及各模块单元的实现技术和方法。最后,通过实验对模型的有效性进行了验证,并对各要素对模型性能的影响进行了客观的分析和评价。 The remote buffer overflow vulnerability is the most serious security vulnerability in network security domain. How to enhance the defense abilty to remote buffer overflow attack becomes an important research subject. In this paper, the authors put forward a model of defense remote buffer overflow attack based on slice technology. The constructing idea and the structure of the model are given, and the realization technology and method of each module cell are described. In the last of this paper, the authors validate the validity of the model via experimentation. In the same time, give an impersonal analysis and remark to the influence of model performance caused by each factor.
出处 《计算机科学》 CSCD 北大核心 2006年第12期70-74,共5页 Computer Science
基金 国家863高科技发展计划"分布式网络监控与预警系统"(2003AA142010) 江苏省高技术研究计划"计算机网络分布式主动防御 监控与预警技术研究"(BG2004030)。
关键词 缓冲区溢出 攻击 切片 指令缓冲 模型 Buffer overflow, Attacks, Slice,lnstrusion cache, Model
  • 相关文献

参考文献20

  • 1Cowan C, Wagle P, Pu C, et al. Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade. http://www. cse.ogi. edu/DISC/projects/immunix/dis2cex00.pdf, 2000-01
  • 2刘绍翰,许建真,张福炎.基于缓冲溢出漏洞的攻击及其预防研究综述[J].计算机应用与软件,2004,21(1):83-87. 被引量:8
  • 3邵丹,唐世钢,林枫.Windows平台下的缓冲区溢出漏洞分析[J].信息技术,2003,27(2):17-19. 被引量:5
  • 4Backend.Windows 2000缓冲区溢出入门[J].IsBaseMagzine,2000,.
  • 5StackGuard Development Team. StackGuard Mechanism: Stack Integrity Checking. http://www. cse. ogi. edu/ DISC/ projects/ immunix/ StackGuard/mechanism. html,1999
  • 6AOzdo~gano~ glu H, Vijaykumar T N, Brodley C E, et al.SmashGuard: A Hardware Solution to Prevent Security Attacks on the Function Return Address. School of Electrical and Computer Engineering 465 Northwestern Ave, Purdue University, November 2003
  • 7Cowan C, Pu C, Maler D, et al. StackGuard: Automatic Adaptire Detection and Prevention of Bullet-Overflow Attacks. http://www. immunix.org/documentation.html.
  • 8Richarte G. Four different tricks to bypass StackShield and StackGuard protection. Core Security Technologies,April 9, 2002-June 3, 2002
  • 9Bulba Kil3r. Bypassing StackGuard And StackShield,May, 2000.http://www.phrack. org/show. php? p=56&a=5 (April 9,2002).
  • 10Richarte G. Four different tricks to bypass StackShield and StackGuard protection. Core Security Technologies, April 9,2002

二级参考文献5

共引文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部