Study on Buffer Overflow Attack and Detection Method

朱明,尹大成,陈亿霖
DOI: https://doi.org/10.3969/j.issn.1000-3428.2002.07.061
2002-01-01
Abstract:This paper first introduces the principle of buffer overflow, and basic attacking method utilizing buffer overflow bugs, and intrusion process and intrusion traces. Sequence association data mining method about how to detect this kind of intrusion using log trace effectively is put forward. Data mining on log trace left by intrusion utilizing buffer overflow will help to find out network intrusion automatically. ;;
What problem does this paper attempt to address?