• No results found

buffer overflow attack

Code-injection Buffer Overflow Attack Blocker

Code-injection Buffer Overflow Attack Blocker

... injection buffer overflow attack blocker propose a real time, application layer blocker for preventing buffer overflow attacks and all types of code injection ...and buffer ...

5

Usage of Variable Structure Congestion Control Protocol (VCP) in Buffer Overflow Attack Blocker

Usage of Variable Structure Congestion Control Protocol (VCP) in Buffer Overflow Attack Blocker

... avoid Buffer Overflow thereby preventing Buffer Overflow ...“Buffer Overflow” in network ...prevent buffer overflow attack during signal ...

7

Buffer Overflow Attack Blocking Using MCAIDS- Machine Code Analysis Intrusion Detection System

Buffer Overflow Attack Blocking Using MCAIDS- Machine Code Analysis Intrusion Detection System

... code-injection buffer overflow attack messages targeting at various Internet services such as web ...of attack, targetting individuals users to gain control over network and ...data. ...

7

Buffer Overflow Attack Blocking Using MCAIDS- Machine Code Analysis Intrusion Detection System

Buffer Overflow Attack Blocking Using MCAIDS- Machine Code Analysis Intrusion Detection System

... code-injection buffer overflow attack messages targeting at various Internet services such as web ...of attack, targetting individuals users to gain control over network and ...data. ...

7

BUFFER-OVERFLOW ATTACK BLOCKER FOR GIF AND JPG FILES

BUFFER-OVERFLOW ATTACK BLOCKER FOR GIF AND JPG FILES

... Signature-Free Buffer Overflow Attack Blocker ...injection attack packets (above 750) tested in our experiments with very few false ...

10

Survey of Protections from Buffer Overflow Attacks

Survey of Protections from Buffer Overflow Attacks

... advanced buffer-overflow attack, a variation of Hannibal Exploit [20], an example of multistage buffer-overflow attack that can bypass most software buffer-overflow ...

22

A FUZZY BASED BUFFER SPLIT ALGORITHM FOR BUFFER ATTACK DETECTION IN INTERNET OF 
THINGS

A FUZZY BASED BUFFER SPLIT ALGORITHM FOR BUFFER ATTACK DETECTION IN INTERNET OF THINGS

... Communication and Security in Health Monitoring Systems – A Review Feasibility Characterization of Cryptographic Primitives for Constrained Wearable IoT Devices A Gateway based Fog Compu[r] ...

23

A FUZZY BASED BUFFER SPLIT ALGORITHM FOR BUFFER ATTACK DETECTION IN INTERNET OF 
THINGS

A FUZZY BASED BUFFER SPLIT ALGORITHM FOR BUFFER ATTACK DETECTION IN INTERNET OF THINGS

... In favor of the three-pass protocol, a commutative encryption also allows a message to be encrypted twice and decrypted twice using two different keys, and the final decryption will defi[r] ...

11

A FUZZY BASED BUFFER SPLIT ALGORITHM FOR BUFFER ATTACK DETECTION IN INTERNET OF 
THINGS

A FUZZY BASED BUFFER SPLIT ALGORITHM FOR BUFFER ATTACK DETECTION IN INTERNET OF THINGS

... 10. PROPOSED-CONGESTION CONTROL The design of DiffServ based on time delay strength of congestion control stay extremely badly. New algorithms have been introduced in this paper by using queue buffer length as ...

9

A FUZZY BASED BUFFER SPLIT ALGORITHM FOR BUFFER ATTACK DETECTION IN INTERNET OF 
THINGS

A FUZZY BASED BUFFER SPLIT ALGORITHM FOR BUFFER ATTACK DETECTION IN INTERNET OF THINGS

... The emphasis owes to avoid traffic congestion through a process of re-routing the data in alternate paths to ensure the timely delivery to the destination. It avails the theory of ECODA which involves the use of the next ...

11

A FUZZY BASED BUFFER SPLIT ALGORITHM FOR BUFFER ATTACK DETECTION IN INTERNET OF 
THINGS

A FUZZY BASED BUFFER SPLIT ALGORITHM FOR BUFFER ATTACK DETECTION IN INTERNET OF THINGS

... of attack have been identified at the specified level that enable the attacker to prevent legitimate packet reassembly and reassemble once again at the target node and at low cost ...(event-based ...

10

A FUZZY BASED BUFFER SPLIT ALGORITHM FOR BUFFER ATTACK DETECTION IN INTERNET OF 
THINGS

A FUZZY BASED BUFFER SPLIT ALGORITHM FOR BUFFER ATTACK DETECTION IN INTERNET OF THINGS

... However current knowledge grid models focused on knowledge clustering and discovery among big data there is a lack of empirical study and a comprehensive model to consider community memb[r] ...

13

A FUZZY BASED BUFFER SPLIT ALGORITHM FOR BUFFER ATTACK DETECTION IN INTERNET OF 
THINGS

A FUZZY BASED BUFFER SPLIT ALGORITHM FOR BUFFER ATTACK DETECTION IN INTERNET OF THINGS

... design attack tree models for the purpose of securing web applications from SQL injection attacks, it is important to have an idea of what SQL injection ...

15

A FUZZY BASED BUFFER SPLIT ALGORITHM FOR BUFFER ATTACK DETECTION IN INTERNET OF 
THINGS

A FUZZY BASED BUFFER SPLIT ALGORITHM FOR BUFFER ATTACK DETECTION IN INTERNET OF THINGS

... Then, in this paper, we provide an energy efficient data gathering with a deadline for wireless sensor networks using the UAV and a series of virtual grid points, named virtual grid energy efficient deadline based data ...

22

A FUZZY BASED BUFFER SPLIT ALGORITHM FOR BUFFER ATTACK DETECTION IN INTERNET OF 
THINGS

A FUZZY BASED BUFFER SPLIT ALGORITHM FOR BUFFER ATTACK DETECTION IN INTERNET OF THINGS

... by use wavelet transform algorithm in first two steps of our algorithm then use GLCM and colour momentHSV in step three to the end, the features extracting for each step will be input to[r] ...

12

A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention

A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention

... of attack code into the stack ...the attack code into other memory structures such as environment variables, or by exploiting buffer overflows on the heap or in the BSS/data ...

14

A FUZZY BASED BUFFER SPLIT ALGORITHM FOR BUFFER ATTACK DETECTION IN INTERNET OF 
THINGS

A FUZZY BASED BUFFER SPLIT ALGORITHM FOR BUFFER ATTACK DETECTION IN INTERNET OF THINGS

... 𝐹𝑙𝑎𝑔𝑖 = 1 Where i indicate the line, j indicate the column, n is the columns number of the image, Frb is the binary format of the foreground image, I is the low frequency sub-image of th[r] ...

13

A FUZZY BASED BUFFER SPLIT ALGORITHM FOR BUFFER ATTACK DETECTION IN INTERNET OF 
THINGS

A FUZZY BASED BUFFER SPLIT ALGORITHM FOR BUFFER ATTACK DETECTION IN INTERNET OF THINGS

... The results of this study are expected to provide new insights for top-level management and all parties involved to know the importance of a document and IT resources that become an impo[r] ...

16

A FUZZY BASED BUFFER SPLIT ALGORITHM FOR BUFFER ATTACK DETECTION IN INTERNET OF 
THINGS

A FUZZY BASED BUFFER SPLIT ALGORITHM FOR BUFFER ATTACK DETECTION IN INTERNET OF THINGS

... This study investigates the performance of various jobs scheduling algorithms under cloud computing environment, namely: Round Robin RR, Maximum-Minimum MaxMin, MinimumMinimum MinMin, Fi[r] ...

20

A FUZZY BASED BUFFER SPLIT ALGORITHM FOR BUFFER ATTACK DETECTION IN INTERNET OF 
THINGS

A FUZZY BASED BUFFER SPLIT ALGORITHM FOR BUFFER ATTACK DETECTION IN INTERNET OF THINGS

... After training the Backpropagation neural network, it should recognize the unknown symbol by applying the feed-forward phase algorithm using the data of the test symbol.. Therefore, the [r] ...

12

Show all 2755 documents...

Related subjects