首页 | 本学科首页   官方微博 | 高级检索  
     

缓冲区溢出攻击及防御措施的研究
引用本文:罗凌,王成良.缓冲区溢出攻击及防御措施的研究[J].微计算机应用,2005,26(3):276-279.
作者姓名:罗凌  王成良
作者单位:重庆大学计算机学院,重庆,410030;重庆大学,软件学院,重庆,400044
摘    要:本文详细分析了缓冲区溢出原理、主要攻击过程、攻击机制及防范措施,在此基础上提出了一种PARAD防御算法,能自动、高效的检测缓冲区溢出攻击,提高网络的安全性。

关 键 词:缓冲区溢出攻击  防御措施  攻击过程  防范措施  安全性  算法

Study on Buffer Overflow Attack and New Protection Method
LUO ling,Wang Chengliang.Study on Buffer Overflow Attack and New Protection Method[J].Microcomputer Applications,2005,26(3):276-279.
Authors:LUO ling  Wang Chengliang
Abstract:With the rapid development of Internet, network security is becoming more and more important. Among the increasingly mature technologies used by hackers, buffer overflow is one widely used by hackers to attack computer. If it can be eliminated efficiently, most security problem can be solved. This paper analyzes the principle of buffer overflow, primary intrusion process, intrusion mechanism and protection method in detail, and then produces a PAR-AD algorithm. This algorithm will help to find out buffer overflow intrusion automatically and strengthen the security of network.
Keywords:Buffer overflow  Network intrusion  Network security  
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号