Signature Free Virus Blocking Method to Detect Software Code Security?
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.2, No. 3)Publication Date: 2013-03-15
Authors : N. Magarani K. Devipriya S. Madhan Kumar T. Viknesh Kumar K. Kumaresan;
Page : 95-105
Keywords : Distilling Instruction Sequence Distiller; Instruction Sequencer Analyser; Proxy Based Sigfree; Code Abstraction and SSL Proxy;
Abstract
We propose SigFree, an online signature-free out-of-the-box application-layer method for blocking code-injection buffer overflow attack messages targeting at various Internet services such as web service. Motivated by the observation that buffer overflow attacks typically contain executables whereas legitimate client requests never contain executables in most Internet services, SigFree blocks attacks by detecting the presence of code. Unlike the previous code detection algorithms, SigFree uses a new data-flow analysis technique called code abstraction that is generic, fast, and hard for exploit code to evade. SigFree is signature free, thus it can block new and unknown buffer overflow attacks; SigFree is also immunized from most attack-side code obfuscation methods. Since SigFree is a transparent deployment to the servers being protected, it is good for economical Internet wide deployment with very low deployment and maintenance cost. We implemented and tested SigFree; our experimental study shows that the dependency-degree-based SigFree could block all types of code-injection attack packets (above 750) tested in our experiments with very few false positives. Moreover, SigFree causes very small extra latency to normal client requests when some requests contain exploit code.
Other Latest Articles
- Grouping and Categorization of Documents in Relativity Measure?
- A Survey on Knowledge Based Classification of Different Routing Protocols in Delay Tolerant Networks?
- Energy Conscious Dynamic Provisioning of Virtual Machines using Adaptive Migration Thresholds in Cloud Data Center
- Mesh Technique for Nymble Architecture Sustaining - Secrecy and Security in Anonymizing Networks?
- Design of Search Engine using Vector Space Model for Personalized Search
Last modified: 2013-04-20 19:56:56