Averting Buffer Overflow Attack in Networking OS using – BOAT Controller

International Journal of Computer Trends and Technology (IJCTT)          
© - July Issue 2013 by IJCTT Journal
Volume-4 Issue-7                           
Year of Publication : 2013
Authors :Vadivel Murugan.P, M.Alagarsamy


Vadivel Murugan.P, M.Alagarsamy "Averting Buffer Overflow Attack in Networking OS using – BOAT Controller "International Journal of Computer Trends and Technology (IJCTT),V4(7):2366-2370 July Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract:- Today’s Networking Operating System Server software is under continuous scrutiny and attack, whether for fun or for profit. Networking OS Software vulnerabilities that allow the injection and execution of malicious code in persistent Internet connected systems pose serious threats to system security. In a common type of attack, an inimical party induces a software buffer overflow in a prone to the computing devices in order to corrupt a procedure to return addresses and transfer controls to the malicious code. This buffer overflow attacks are often engaged to recruit unaware hosts into Distributed Denial of Service (DDoS) attack networks, which ultimately promote overwhelming buffer overflow attack against victim networks or machines. In spite of current security software countermeasures that they seek to prevent buffer overflow exploits, many systems are in remain vulnerable. The BOAT controller tool is detect and prevent the buffer overflow in networking OS and strongly control the task utilization.


[1] Aleph One, “Smashing the stack for fun and profit,” Phrack Magazine, Vol. 7, 1996, http://www.phrack.org/issues.html? issue=49&id=14.,
[2] C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton. Stack- Guard: Automatic adaptive detection and prevention of buffer-overflow attacks. In Proceedings of the 7th USENIX Security Conference, pages 63-78, San Antonio, Texas, January 1998.
[3] Crispin Cowan, Posting to Bugtraq Mailing List, http://geek-girl.com/bugtraq/1999_1/0481.html
[4] CERT, http://www.us-cert.gov/.
[5] CERT. CERT/CC statistics. http://www.cert.org/stats/cert stats.html, Feb. 2005.
[6] C. Cowan. Software security for open-source systems. IEEE Security & Privacy, 1(1):38–45, 2003.
[7] D. Larochelle and D. Evans. Statically detecting likely buffer overflow vulnerabilities. In Proceedings of the 2001 USENIX Security Symposium, Washington DC, USA, August 2001.
[8] E. Rescorla. Is finding security holes a good idea? IEEE Security & Privacy, 3(1):14–19, 2005.
[9] H. Etoh. GCC extension for protecting applications from stack-smashing attacks. http://www.trl.ibm.com/projects/security/ssp/, June 2000.
[10] http://www.cert.org/advisories.

Keywords : — Buffer overflows attack, BOAT controller tool, Memory allocation, Stack based buffer overflow, Heap based buffer overflow