Securing Server System from Buffer Overflow vulnerability using Vel-Alagar Algorithm
Journal Title: INTERNATIONAL JOURNAL OF MATHEMATICS TRENDS AND TECHNOLOGY - Year 2013, Vol 4, Issue 9
Abstract
Now a day’s buffer overflows have take place the most common target for network based attacks. The main proliferation method used by worms, malicious codes and improper coding by developers. Many techniques have been developed to secure servers, but the conciliation of the vulnerable codes make buffer overflow attacks again. Buffer overflows occur it stop system functions and crash the memory. In the face of automatic function execution, cyclic attacks causes due to malicious codes, and it leads to repeated restarts of the victim application, and it makes service unavailable. In this research paper we have a hopeful new move towards to learn the characteristics of buffer overflow vulnerability, and we develop a suitable algorithm to avoid and prevent the buffer overflows.
Authors and Affiliations
*P. VADIVELMURUGAN #K. ALAGARSAMY
Fourier transf orm and Plancherel Theorem f or Nilpotent Lie Group
As will known the connected and simply connected nilpotent Lie group N has an important role in quantum mechanics. In this paper we show how the Fourier transform on the n dimensional vector Lie group n R can be genera...
Total Outer Equitable Connected Domination of a Graph
Let G = (V, E) be a graph. A set D V (G) is equitable dominating set of G if v V – D a vertex u D such that uv E (G) and |d(u) – d(v)| 1. A set D V (G) is outer equitable dominating set if D is equitable dominati...
Reflection and Transmission of Elastic Waves at the Loosely Bonded Solid-Solid Interface
Reflection and transmission phenomenon of plane waves at a loosely bonded interface between linear isotropic elastic solid half space and fluid saturated incompressible porous solid half space is studied in the present s...
Separation Axioms in Intuitionistic Fuzzy Soft Topological space
In this paper, I have studied some properties of fuzzy soft topological space. We define fuzzy soft intuitionistic separation axioms and basic definition of intuitionistic fuzzy soft normal spaces and theorems. Lastly, i...
Securing Server System from Buffer Overflow vulnerability using Vel-Alagar Algorithm
Now a day’s buffer overflows have take place the most common target for network based attacks. The main proliferation method used by worms, malicious codes and improper coding by developers. Many techniques have be...