Accurate buffer overflow detection via abstract payload execution

作者: Thomas Toth , Christopher Kruegel

DOI: 10.1007/3-540-36084-0_15

关键词: Computer scienceShellcodeBuffer overflowNetwork packetIntrusion detection systemPayload (computing)Network securityExploitExecutableComputer security

摘要: … We propose an approach to do buffer overflow detection at the … an accurate way of detecting buffer overflow exploit code in … used by intruders to evade common detection techniques. …

参考文章(17)
Debra Anderson, Thane Frivold, Alfonso Valdes, Next-generation Intrusion Detection Expert System (NIDES)A Summary ,(1997)
Aaron Schwartzbard, Anup K. Ghosh, A study in using neural networks for anomaly and misuse detection usenix security symposium. pp. 12- 12 ,(1999)
Giovanni Vigna, Richard A. Kemmerer, NetSTAT: a network-based intrusion detection system Journal of Computer Security. ,vol. 7, pp. 37- 71 ,(1999) , 10.3233/JCS-1999-7103
Peter G. Neumann, Phillip A. Porras, Experience with EMERALD to Date ID'99 Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring - Volume 1. pp. 73- 80 ,(1999)
Stuart Staniford, James A. Hoagland, Joseph M. McAlerney, Practical automated detection of stealthy portscans Journal of Computer Security. ,vol. 10, pp. 105- 136 ,(2002) , 10.3233/JCS-2002-101-205
Perry Wagle, Jonathan Walpole, Calton Pu, Steve Beattie, Aaron Grier, Crispin Cowan, Heather Hintony, Qian Zhang, Peat Bakke, Dave Maier, StackGuard: automatic adaptive detection and prevention of buffer-overflow attacks usenix security symposium. pp. 5- 5 ,(1998)
Martin Roesch, Snort - Lightweight Intrusion Detection for Networks usenix large installation systems administration conference. pp. 229- 238 ,(1999)
Eugene H. Spafford, The internet worm program: an analysis ACM SIGCOMM Computer Communication Review. ,vol. 19, pp. 17- 57 ,(1989) , 10.1145/66093.66095
Christopher Krügel, Thomas Toth, Engin Kirda, Service specific anomaly detection for network intrusion detection acm symposium on applied computing. pp. 201- 208 ,(2002) , 10.1145/508791.508835
Dorothy E. Denning, An Intrusion-Detection Model ieee symposium on security and privacy. pp. 118- 118 ,(1986) , 10.1109/SP.1986.10010