Cataloguing and Avoiding the Buffer Overflow Attacks in Network Operating Systems
Journal Title: International Journal of Computer & organization Trends(IJCOT) - Year 2013, Vol 3, Issue 8
Abstract
The application software has a different dimension, size and intricacies is rising rapidly in current technology era and simultaneously increase a programming bugs also. The programming bugs cause vulnerabilities to the security systems. The large number of exploit is based on the buffer overflow vulnerability. In this paper, we classify the number of buffer overflow attacks with generation. Buffer overflow attacks are very harmful to current scenario; programmer writes a coding, in a buffer that overflows the boundary and overwrites in adjacent memory. This causes the erratic result and crash or breaks the computer security. We suggest the tools to prevent the buffer overflow vulnerability.
Power Efficient Weighted Modulo 2n+1 Adder
The comparison of three different architectures for modulo 2n+1 adders are introduced in this paper. The first two architecture can be implemented different power consumptions, while maintain the same delay. The partitio...
Robust Data Clustering Algorithms for Network Intrusion Detection
IDS (Intrusion Detection system) is an active and driving defense technology. Intrusion detection is to detect attacks against a computer system. This project mainly focuses on intrusion detection based on data min...
The Impact of ICT on Cost Efficiency in Higher Institutions in Nigeria
The research work focused on the impact of ICT on cost efficiency in higher institutions in Nigeria. Primary data was used as data. The researcher designed well structured questionnaires, which was distributed and return...
Pattern Recognition for Finding Similarity of Webpages
We proposed a functional technique for identifying similar Web pages that is based on measuring tree similarity. In this paper we introduce an experiment with two methods for evaluating the similarity of web pages. The r...
Implication of Cell Phone Usage on Study Patterns of Teens
Cell phone usage has become worldwide commodity for every person regardless of their ages. Over the years, teenagers within the age bracket of thirteen to nineteen are more vulnerable towards the use of the technology in...