期刊文献+

面向网络对抗的缓冲区溢出攻击描述语言研究

Study on buffer overflow attack description language of computer network counterwork
下载PDF
导出
摘要 以计算机网络对抗为背景,以缓冲区溢出攻击为例,通过抽象缓冲区溢出攻击的规律,分析植入代码的结构特征,设计一种用于网络对抗演练的缓冲区溢出攻击描述语言,并进行形式化分析证明。实际验证表明,该缓冲区溢出攻击描述语言能够动态地构造植入代码,实现缓冲区溢出攻击的自动化。 Under the background of computer network counterwork and taking buffer overflow as example, a buffer overflow attack description language was designed for it through analyzing embedded code's structure and features and abstracting the rule of buffer overflow attack. The actual verification shows that attack description language can correspondingly construct suitable embedded code and launch attack automatically.
出处 《计算机应用》 CSCD 北大核心 2009年第10期2816-2819,共4页 journal of Computer Applications
基金 国家973规划项目(2002CB312105)
关键词 网络对抗 缓冲区溢出 植入代码 攻击描述语言 network operation buffer overflow embedded code attack description language
  • 相关文献

参考文献12

  • 1SHELTON H. JP3213: joint doctrine for information operations [ EB/OL ]. [2009 -01 -01]. http: //www. dtic. mil/doctrine / jel/new _pubs/jp3_13. pdf.
  • 2李肖坚.一种计算机网络自组织的协同对抗模型.计算机研究与发展,2005,42:256-260.
  • 3SPAFFORD E H. The internet worm program: An analysis[ J]. ACM Computer Communication Review, 1989, 19(1) : 17 -57.
  • 4CERT. CERT Advisory CA-2001-19 "Code Red" worm exploiting buffer overflow in IIS indexing service DLL[ EB/OL]. [2009 -01 - 01]. http://www. cert. org/advisories/CA-2001-19. html.
  • 5CERT. CERT Advisory CA-2003-04 MS-SQL server worm[ EB/ OL]. [ 2009 - 01 - 01]. http://www. cert. org/advisories/CA- 2003-04. html.
  • 6CERT. CERT Advisory CA-2003-20 W 3 2 / Blaster worm [ EB / OL]. [ 2009 - 01 - 01 ]. http://www. cert. org/advisories/CA- 2003-20. html.
  • 7CEDRIC M, LUDOVIC M. Adele: An attack description language for knowledge - based intrusion detection[ EB/OL]. [ 2009 - 01 - 01]. http://www. rennes. supelec. fr/ren/perso/cmichel/MM01. ps.
  • 8DERAISON R. The nessus attack scripting language reference guide [ EB/OL]. [ 2009 - 01 - 01 ]. http://www.nessus. org/doc/nasl. html.
  • 9aXis.aXis.缓冲区溢出笔记之-STACK溢出[EB/OL].[2009-01-01].http://www.ph4nt0m.net.
  • 10ONE A. Smashing the stack for fun and profit[ EB/OL] . [ 2009 - 01 -01 ]. http://www. phrack. com/issues.html?issue = 49&id = 14# article.

二级参考文献9

  • 1Spafford E H.The Internet Worm rogram:An Analysis. Purdue Technical Report.CSD-TR-823 .
  • 2Michel C,Me Adele L.An Attack Description Language for Knowledge-based Intrusion Detection. http://www.rennes.supelec.fr/ren/perso/cmichel/MM01 .
  • 3Deraison R.The Nessus Attack Scripting Language Reference Guide. http://www.nessus.org/doc/nasl.html .
  • 4.aXis[]..
  • 5Alpha One.Smashing the Stack for Fun and Profit[].Phrack.
  • 6Taeho Oh.Advanced buffer overflow exploit. http://postech.edu/group/poslug . 2000
  • 7CERT.Code Red Ⅱ:Another worm exploiting buffer overflow in ⅡS indexing service DLL. http://www.cert.org/incidentnotes/in-2001-09.html . 2006
  • 8CERT.MS-SQL Server Worm[]..
  • 9CERT? Advisory CA-2003-20 W32/Blaster worm. http://www.cert.org/ advisories/ CA-2003-20.html . 2006

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部