Cataloguing and Avoiding the Buffer Overflow Attacks in Network Operating Systems

Abstract

The application software has a different dimension, size and intricacies is rising rapidly in current technology era and simultaneously increase a programming bugs also. The programming bugs cause vulnerabilities to the security systems. The large number of exploit is based on the buffer overflow vulnerability. In this paper, we classify the number of buffer overflow attacks with generation. Buffer overflow attacks are very harmful to current scenario; programmer writes a coding, in a buffer that overflows the boundary and overwrites in adjacent memory. This causes the erratic result and crash or breaks the computer security. We suggest the tools to prevent the buffer overflow vulnerability.

Authors and Affiliations

Keywords

Related Articles

A Brief Survey on Encryption Schemes in Cloud Environments

For the last two years cloud computing is a important in the IT industry. In cloud computing data owners and service providers are not in the same trusted domain so the Service providers should not be a trusted one and t...

Identity Security Using Authentication and Authorization in Cloud Computing

The Growth of the Cloud Computing invention suggests attractive and innovative computing services through resource pooling and virtualization techniques. Cloud gives delivers different types of Computing Services to thei...

An agent based Distributed thermal balancing–Task migration

The system reliability, performance, cost, and leakage power in deep sub micrometer era have a significant impact by thermal hotspots and temperature gradients. As the system complexity increases, it is very difficult to...

 An Integrated Approach to Measurement Software Defect using Software Matrices

 Software measurement is a quantified attribute of a characteristic of a software product or the software process. It is a discipline within software engineering. Measurement programs in software organizations are a...

Detection Of Brain Tumor Using Kernel Induced Possiblistic C-Means Clustering

Brain tumor is a major health problem throughout the world. Magnetic resonance imaging (MRI) scan can be used to produce image of any part of the body and it provides an efficient and fast way for diagnosis of the brain...

Download PDF file
  • EP ID EP99160
  • DOI -
  • Views 119
  • Downloads 0

How To Cite

(2013). Cataloguing and Avoiding the Buffer Overflow Attacks in Network Operating Systems. International Journal of Computer & organization Trends(IJCOT), 3(8), 358-363. https://europub.co.uk/articles/-A-99160