2013 47th International Carnahan Conference on Security Technology (ICCST) 2013
DOI: 10.1109/ccst.2013.6922067
|View full text |Cite
|
Sign up to set email alerts
|

Detection of network buffer overflow attacks: A case study

Abstract: This paper presents an automated detection method based on classification of network traffic using predefined set of network metrics. We proposed the set of metrics with focus on behavior of buffer overflow attacks and their sufficient description without the need of deep packet inspection. In this paper we describe two laboratory experiments of automated detection of buffer overflow attacks on vulnerable network services and their description by proposed set of network metrics. We present the principles of se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
1
1

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…ASNM features [10] are network connection features that describe various properties of TCP connections and were designed with the intention to distinguish between legitimate traffic and remote buffer overflow attacks. We studied behavioral characteristics of remote buffer overflow attacks in our previous work [24], and our findings inspired the design of ASNM features. We can interpret ASNM features like an extended protocol NetFlow [18] but describing more than statistical properties of network connections.…”
Section: Asnm Features and Context Analysismentioning
confidence: 99%
“…ASNM features [10] are network connection features that describe various properties of TCP connections and were designed with the intention to distinguish between legitimate traffic and remote buffer overflow attacks. We studied behavioral characteristics of remote buffer overflow attacks in our previous work [24], and our findings inspired the design of ASNM features. We can interpret ASNM features like an extended protocol NetFlow [18] but describing more than statistical properties of network connections.…”
Section: Asnm Features and Context Analysismentioning
confidence: 99%
“…ASNM features [4] are network connection features that describe various properties of TCP connections and were designed with the intention to distinguish between legitimate traffic and remote buffer overflow attacks. 6 We studied behavioral characteristics of remote buffer overflow attacks in our previous work [17], and our findings inspired the design of ASNM features. We can interpret ASNM features like an extended protocol NetFlow [11] but describing more than statistical properties of network connections.…”
Section: Asnm Features and Context Analysismentioning
confidence: 99%