IJSDR
IJSDR
INTERNATIONAL JOURNAL OF SCIENTIFIC DEVELOPMENT AND RESEARCH
International Peer Reviewed & Refereed Journals, Open Access Journal
ISSN Approved Journal No: 2455-2631 | Impact factor: 8.15 | ESTD Year: 2016
open access , Peer-reviewed, and Refereed Journals, Impact factor 8.15

Issue: April 2024

Volume 9 | Issue 4

Impact factor: 8.15

Click Here For more Info

Imp Links for Author
Imp Links for Reviewer
Research Area
Subscribe IJSDR
Visitor Counter

Copyright Infringement Claims
Indexing Partner
Published Paper Details
Paper Title: Stack Based Buffer Overflow Assessment and Counter measures
Authors Name: Shafiqullah Khaliqyaar , Shaifali Sharma
Unique Id: IJSDR2205078
Published In: Volume 7 Issue 5, May-2022
Abstract: This research investigates Buffer overflows attacks and its countermeasures. These attacks are very old and useful by which malicious attackers bypass the security mechanisms. Therefore, by this attack they can cause escalation of privilege to root level, take remote access to the victim machine and denial of service. Lack of existence of a centralized system to test the network hosts is the motivator to have further research and find a solution for the issue. The problem of buffer overflow is very crucial to prevent or at least mitigate them as soon as possible because the important private data of an organization is exposed to malicious uses of attackers. The theoretical, simulation and build methodologies are utilized to assess this vulnerability. Accordingly, by having a concept of computer memory and their related architecture (Theoretical), then mapped and analyzed these concepts on to virtualized environment prepared by GNS3 and VirtualBox (Simulation). Regarding the vulnerabilities and analyzing the weak points of system that expose them to Buffer Overflows, a python Graphical User Interface is application developed that can mitigate risk of the above mentioned attack (Build). The findings of this research shows provides a tool that enables the system administrator to have find whether his Mikrotik gateway is vulnerable to buffer overflows or not. Then providing a patch to vulnerable router by special mechanism against attack. Finally, this paper concludes that hosts in our network must be tested against buffer overflow to prevent unauthorized access to critical data and patch them manually or via similar applications that developed as result of this research paper.
Keywords: Stack Overflow, Data execution prevention, Address space layout randomization, remote shellcode injection, privilege escalation, Win box Exploit, Smashing
Cite Article: "Stack Based Buffer Overflow Assessment and Counter measures ", International Journal of Science & Engineering Development Research (www.ijsdr.org), ISSN:2455-2631, Vol.7, Issue 5, page no.407 - 413, May-2022, Available :http://www.ijsdr.org/papers/IJSDR2205078.pdf
Downloads: 000337071
Publication Details: Published Paper ID: IJSDR2205078
Registration ID:200399
Published In: Volume 7 Issue 5, May-2022
DOI (Digital Object Identifier):
Page No: 407 - 413
Publisher: IJSDR | www.ijsdr.org
ISSN Number: 2455-2631

Click Here to Download This Article

Article Preview

Click here for Article Preview







Major Indexing from www.ijsdr.org
Google Scholar ResearcherID Thomson Reuters Mendeley : reference manager Academia.edu
arXiv.org : cornell university library Research Gate CiteSeerX DOAJ : Directory of Open Access Journals
DRJI Index Copernicus International Scribd DocStoc

Track Paper
Important Links
Conference Proposal
ISSN
DOI (A digital object identifier)


Providing A digital object identifier by DOI
How to GET DOI and Hard Copy Related
Open Access License Policy
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
Creative Commons License
This material is Open Knowledge
This material is Open Data
This material is Open Content
Social Media
IJSDR

Indexing Partner