Cataloguing and Avoiding the Buffer Overflow Attacks in Network Operating Systems

Abstract

The application software has a different dimension, size and intricacies is rising rapidly in current technology era and simultaneously increase a programming bugs also. The programming bugs cause vulnerabilities to the security systems. The large number of exploit is based on the buffer overflow vulnerability. In this paper, we classify the number of buffer overflow attacks with generation. Buffer overflow attacks are very harmful to current scenario; programmer writes a coding, in a buffer that overflows the boundary and overwrites in adjacent memory. This causes the erratic result and crash or breaks the computer security. We suggest the tools to prevent the buffer overflow vulnerability.

Authors and Affiliations

Keywords

Related Articles

A Survey on Gene Prediction Using Neural Network

Neural network is traditionally used to refer to a network or circuit of Gene in the research traditionally. Despite a high number of techniques specifically dedicated to networks problems as well as many successful appl...

A New Approach For Image Cryptography Techniques

With the progress in data exchange by electronic system, the need of information security has become a necessity. Due to growth of multimedia applications, security becomes an important issue of communication and storage...

 Asymptotic Security Key Generation and Distribution Algorithm

 Service-oriented Architectures (SOA) facilitate the dynamic and seamless integration of services offered by different service providers which in addition can be located in different trust domains. Especially for bu...

Identity Security Using Authentication and Authorization in Cloud Computing

The Growth of the Cloud Computing invention suggests attractive and innovative computing services through resource pooling and virtualization techniques. Cloud gives delivers different types of Computing Services to thei...

 LFSR Based Watermark and Address Generator for Digital Image Watermarking SRAM

 In digital image watermarking authentication methods and techniques, the original image will be watermarked with a text, image, audio or any signature. To overcome the uneven and enormous distribution of multi...

Download PDF file
  • EP ID EP99160
  • DOI -
  • Views 148
  • Downloads 0

How To Cite

(2013). Cataloguing and Avoiding the Buffer Overflow Attacks in Network Operating Systems. International Journal of Computer & organization Trends(IJCOT), 3(8), 358-363. https://europub.co.uk./articles/-A-99160