Detail publikace

Detection of Network Buffer Overflow Attacks: A Case Study

Originální název

Detection of Network Buffer Overflow Attacks: A Case Study

Anglický název

Detection of Network Buffer Overflow Attacks: A Case Study

Jazyk

en

Originální abstrakt

This paper presents an automated detection method based on classification of network traffic using predefined set of network metrics. We proposed the set of metrics with focus on behavior of buffer overflow attacks and their sufficient description without the need of deep packet inspection. In this paper we describe two laboratory experiments of automated detection of buffer overflow attacks on vulnerable network services and their description by proposed set of network metrics. We present the principles of several chosen network metrics and their application on experimental attacks according to their nature in comparison to valid communication.

Anglický abstrakt

This paper presents an automated detection method based on classification of network traffic using predefined set of network metrics. We proposed the set of metrics with focus on behavior of buffer overflow attacks and their sufficient description without the need of deep packet inspection. In this paper we describe two laboratory experiments of automated detection of buffer overflow attacks on vulnerable network services and their description by proposed set of network metrics. We present the principles of several chosen network metrics and their application on experimental attacks according to their nature in comparison to valid communication.

BibTex


@inproceedings{BUT103487,
  author="Maroš {Barabas} and Ivan {Homoliak} and Petr {Hanáček} and Matej {Kačic}",
  title="Detection of Network Buffer Overflow Attacks: A Case Study",
  annote="This paper presents an automated detection method based on classification of
network traffic using predefined set of network metrics. We proposed the set of
metrics with focus on behavior of buffer overflow attacks and their sufficient
description without the need of deep packet inspection. In this paper we describe
two laboratory experiments of automated detection of buffer overflow attacks on
vulnerable network services and their description by proposed set of network
metrics. We present the principles of several chosen network metrics and their
application on experimental attacks according to their nature in comparison to
valid communication.",
  address="Institute of Electrical and Electronics Engineers",
  booktitle="The 47th Annual International Carnahan Conference on Security Technology",
  chapter="103487",
  edition="NEUVEDEN",
  howpublished="print",
  institution="Institute of Electrical and Electronics Engineers",
  year="2013",
  month="april",
  pages="128--131",
  publisher="Institute of Electrical and Electronics Engineers",
  type="conference paper"
}