Cataloguing and Avoiding the Buffer Overflow Attacks in Network Operating Systems
Journal Title: International Journal of Computer & organization Trends(IJCOT) - Year 2013, Vol 3, Issue 8
Abstract
The application software has a different dimension, size and intricacies is rising rapidly in current technology era and simultaneously increase a programming bugs also. The programming bugs cause vulnerabilities to the security systems. The large number of exploit is based on the buffer overflow vulnerability. In this paper, we classify the number of buffer overflow attacks with generation. Buffer overflow attacks are very harmful to current scenario; programmer writes a coding, in a buffer that overflows the boundary and overwrites in adjacent memory. This causes the erratic result and crash or breaks the computer security. We suggest the tools to prevent the buffer overflow vulnerability.
A Survey on Gene Prediction Using Neural Network
Neural network is traditionally used to refer to a network or circuit of Gene in the research traditionally. Despite a high number of techniques specifically dedicated to networks problems as well as many successful appl...
A New Approach For Image Cryptography Techniques
With the progress in data exchange by electronic system, the need of information security has become a necessity. Due to growth of multimedia applications, security becomes an important issue of communication and storage...
Asymptotic Security Key Generation and Distribution Algorithm
Service-oriented Architectures (SOA) facilitate the dynamic and seamless integration of services offered by different service providers which in addition can be located in different trust domains. Especially for bu...
Identity Security Using Authentication and Authorization in Cloud Computing
The Growth of the Cloud Computing invention suggests attractive and innovative computing services through resource pooling and virtualization techniques. Cloud gives delivers different types of Computing Services to thei...
LFSR Based Watermark and Address Generator for Digital Image Watermarking SRAM
In digital image watermarking authentication methods and techniques, the original image will be watermarked with a text, image, audio or any signature. To overcome the uneven and enormous distribution of multi...