SlideShare a Scribd company logo
Page 3
The history of cyber security, buffer over- flow is one
of the most serious vulnerabilities in computer
systems.
Buffer overflow vulnerability is a root cause for most
of the cyber-attack.
A buffer overflow occurs during program execution
when a fixed-size buffer has had too much data copied
into it.
Page 4
This causes the data to overwrite into adjacent
memory locations.
It depending on what is stored there, the behavior of
the program itself might be affected.
Although taking a broader viewpoint, buffer overflow
attacks do not always carry binary code in the attacking
requests.
Page 6
SigFree is mainly related to three bodies of work:
Prevention/detection techniques of buffer overflows :
Existing prevention/detection techniques of buffer over-
flows can be roughly broken down into six classes.
Worm detection and signature generation : Based on
the nature of worm infection symptoms, three classes.
Macro symptoms
Local traffic symptoms
Worm code running symptoms
Page 8
Although tons of research has been done to
tackle buffer overflow attacks, existing defenses
are still quite limited in meeting four highly
desired requirements:
(R1) simplicity in maintenance;
(R2) transparency to existing (legacy) server OS,
application software, and hardware;
(R3) resiliency to obfuscation;
(R4) economical Internet-wide deployment.
Page 9
Accordingly, SigFree (Fig. 1) works as follows:
SigFree is an application layer blocker that typically
stays between a service and the corresponding firewall.
Page 11
 To avoid detection by users, some viruses employ
different kinds of deception.
MS-DOS platform, make sure that the "last modified"
date of a host file stays the same
Some viruses can infect files without increasing their
sizes or damaging the files.
Some viruses try to avoid detection by killing the tasks
associated with antivirus software before it can detect
them.
Page 13
The proxy-based SigFree could not handle encrypted or
encoded data directly.
A particular example is SSLenabled web server.
Enhancing security between web clients and web
servers.
SSL also causes the difficulty for out-of-box malicious
code detectors.
SSL is implemented as a server module
Page 14
To support SSL functionality, an SSL proxy such as
Stunnel (Fig. 4) may be deployed to securely tunnel the
traffic between clients and web servers.
Page 16
 SigFree has taken a main step forward in meeting the
four requirements
Block new and unknown buffer overflow attacks.
Uses generic code-data separation criteria
feature separates SigFree from an independent work
An out-of-the-box solution that requires no server side
changes.
An economical deployment with very low maintenance
cost
Page 18
worth mentioning
tool is also widely applicable to many programs
proxybased SigFree - used to protect all internet
services
used to protect some Internet services
Generate many false positives
provide file system real-time protection
Page 20
We have proposed SigFree.
An online signature-free out-of-the-box blocker that
can filter code-injection buffer overflow attack messages
One of the most serious cyber security threats.
Does not require any signatures.
It can block new unknown attacks.
Immunized from most attack-side code obfuscation
method.
Page 22
Citeseer: Scientific Literature Digital Library,
http://citeseer.ist.psu.edu, 2007.
The Metasploit Project, http://www.metasploit.com,
2007.
Jempiscodes—A Polymorphic Shellcode Generator,
http:// www.shellcode.com.ar/en/proyectos.html, 2007.

More Related Content

PDF
Mapping the ASD Essential 8 to the Mitre ATTACK™ framework
PPTX
Ericom Shield datasheet
PDF
Mitre ATTACK and the North Korean Regime-Backed Programmer
PDF
MITRE ATT&CK and 2017 FSB Indictment
PDF
cyber security career guide.pdf
PPT
Lecture 1
PDF
Sophos intercept-x
PPTX
Sallysspecialservices networksecurityproposal2-100305141834-phpapp02
Mapping the ASD Essential 8 to the Mitre ATTACK™ framework
Ericom Shield datasheet
Mitre ATTACK and the North Korean Regime-Backed Programmer
MITRE ATT&CK and 2017 FSB Indictment
cyber security career guide.pdf
Lecture 1
Sophos intercept-x
Sallysspecialservices networksecurityproposal2-100305141834-phpapp02

What's hot (20)

PDF
Security awareness rgesit
PDF
PDF
Meetup DotNetCode Owasp
PDF
Understanding the Experian independent third party assessment (EI3PA ) requir...
PPT
Network security
PPTX
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
PPT
Web Server Technologies Part III: Security & Future Musings
PDF
Data Protection
PDF
Our Software
PDF
Email Security Overview
DOC
Mohammed imranuddin cv.DOC
PPTX
What's new in​ CEHv11?
PPTX
Ransomware: Can you protect against attacks?
PPTX
Network security
PDF
Cyber tooth briefing
PDF
Next Dimension and Veeam | Solutions for PIPEDA Compliance
DOCX
Brief on my skill sets
PPT
Ch03 Network and Computer Attacks
PPTX
3 Keys to Web Application Security
PDF
Handy penetration testing tools
Security awareness rgesit
Meetup DotNetCode Owasp
Understanding the Experian independent third party assessment (EI3PA ) requir...
Network security
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Web Server Technologies Part III: Security & Future Musings
Data Protection
Our Software
Email Security Overview
Mohammed imranuddin cv.DOC
What's new in​ CEHv11?
Ransomware: Can you protect against attacks?
Network security
Cyber tooth briefing
Next Dimension and Veeam | Solutions for PIPEDA Compliance
Brief on my skill sets
Ch03 Network and Computer Attacks
3 Keys to Web Application Security
Handy penetration testing tools
Ad

Viewers also liked (20)

PDF
1.Buffer Overflows
PDF
nullcon 2011 - Buffer UnderRun Exploits
PPTX
Google glass by Jaseela
PDF
Design and Implementation of Improved Authentication System for Android Smart...
PDF
Signature Free Virus Blocking Method to Detect Software Code Security (Intern...
PPTX
Desgn&imp authentctn.ppt by Jaseela
PDF
software-vulnerability-detectionPresentation
PDF
Introduction to Stack Buffer Over‌flow for beginners
PPTX
Buffer overflow explained
PDF
StackOverflow
PDF
Presentation buffer overflow attacks and theircountermeasures
PPT
UbiComp 2009 Town Hall
PPTX
A review of localization systems for robotic endoscopic
PPT
6 buffer overflows
PPT
Buffer Overflows
PPT
Buffer Overflow
PPTX
Anatomy of a Buffer Overflow Attack
PDF
Buffer overflow attacks
PDF
RESUME-Venkataraman final
PPT
intrusion detection system (IDS)
1.Buffer Overflows
nullcon 2011 - Buffer UnderRun Exploits
Google glass by Jaseela
Design and Implementation of Improved Authentication System for Android Smart...
Signature Free Virus Blocking Method to Detect Software Code Security (Intern...
Desgn&imp authentctn.ppt by Jaseela
software-vulnerability-detectionPresentation
Introduction to Stack Buffer Over‌flow for beginners
Buffer overflow explained
StackOverflow
Presentation buffer overflow attacks and theircountermeasures
UbiComp 2009 Town Hall
A review of localization systems for robotic endoscopic
6 buffer overflows
Buffer Overflows
Buffer Overflow
Anatomy of a Buffer Overflow Attack
Buffer overflow attacks
RESUME-Venkataraman final
intrusion detection system (IDS)
Ad

Similar to Sigfree ppt (International Journal of Computer Science and Mobile Computing) (20)

PDF
10. sig free a signature free buffer overflow attack blocker
PDF
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
PDF
Sans signature buffer overflow blocker
PDF
11.sans signature buffer overflow blocker
DOC
DOCX
1Buttercup On Network-based Detection of Polymorphic B.docx
PPT
Firewalls (Distributed computing)
PPTX
Ids 009 network attacks
PPTX
Buffer overflow attacks
PDF
PPTX
binary analysis for botnet reverse engineering.pptx
PDF
An automated approach to fix buffer overflows
PDF
We live in the earh seventy or eight years
PDF
shivam sahu (firewall).pdfb jndvhjfvhjjf
PDF
ML13198A410.pdf
PDF
ML13198A410.pdf
PDF
ML13198A410.pdf
PPTX
Buffer overflow attack
PDF
WIRELESS COMPUTING AND IT ECOSYSTEMS
PPT
Defining Cyber Crime
10. sig free a signature free buffer overflow attack blocker
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
Sans signature buffer overflow blocker
11.sans signature buffer overflow blocker
1Buttercup On Network-based Detection of Polymorphic B.docx
Firewalls (Distributed computing)
Ids 009 network attacks
Buffer overflow attacks
binary analysis for botnet reverse engineering.pptx
An automated approach to fix buffer overflows
We live in the earh seventy or eight years
shivam sahu (firewall).pdfb jndvhjfvhjjf
ML13198A410.pdf
ML13198A410.pdf
ML13198A410.pdf
Buffer overflow attack
WIRELESS COMPUTING AND IT ECOSYSTEMS
Defining Cyber Crime

Recently uploaded (20)

PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Institutional Correction lecture only . . .
PDF
RMMM.pdf make it easy to upload and study
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
master seminar digital applications in india
PPTX
Lesson notes of climatology university.
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
Pharma ospi slides which help in ospi learning
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Cell Types and Its function , kingdom of life
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Cell Structure & Organelles in detailed.
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Final Presentation General Medicine 03-08-2024.pptx
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
01-Introduction-to-Information-Management.pdf
Institutional Correction lecture only . . .
RMMM.pdf make it easy to upload and study
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
master seminar digital applications in india
Lesson notes of climatology university.
Complications of Minimal Access Surgery at WLH
Microbial diseases, their pathogenesis and prophylaxis
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Pharma ospi slides which help in ospi learning
2.FourierTransform-ShortQuestionswithAnswers.pdf
Cell Types and Its function , kingdom of life
102 student loan defaulters named and shamed – Is someone you know on the list?
human mycosis Human fungal infections are called human mycosis..pptx
Cell Structure & Organelles in detailed.
Abdominal Access Techniques with Prof. Dr. R K Mishra
Final Presentation General Medicine 03-08-2024.pptx

Sigfree ppt (International Journal of Computer Science and Mobile Computing)

  • 1. Page 3 The history of cyber security, buffer over- flow is one of the most serious vulnerabilities in computer systems. Buffer overflow vulnerability is a root cause for most of the cyber-attack. A buffer overflow occurs during program execution when a fixed-size buffer has had too much data copied into it.
  • 2. Page 4 This causes the data to overwrite into adjacent memory locations. It depending on what is stored there, the behavior of the program itself might be affected. Although taking a broader viewpoint, buffer overflow attacks do not always carry binary code in the attacking requests.
  • 3. Page 6 SigFree is mainly related to three bodies of work: Prevention/detection techniques of buffer overflows : Existing prevention/detection techniques of buffer over- flows can be roughly broken down into six classes. Worm detection and signature generation : Based on the nature of worm infection symptoms, three classes. Macro symptoms Local traffic symptoms Worm code running symptoms
  • 4. Page 8 Although tons of research has been done to tackle buffer overflow attacks, existing defenses are still quite limited in meeting four highly desired requirements: (R1) simplicity in maintenance; (R2) transparency to existing (legacy) server OS, application software, and hardware; (R3) resiliency to obfuscation; (R4) economical Internet-wide deployment.
  • 5. Page 9 Accordingly, SigFree (Fig. 1) works as follows: SigFree is an application layer blocker that typically stays between a service and the corresponding firewall.
  • 6. Page 11  To avoid detection by users, some viruses employ different kinds of deception. MS-DOS platform, make sure that the "last modified" date of a host file stays the same Some viruses can infect files without increasing their sizes or damaging the files. Some viruses try to avoid detection by killing the tasks associated with antivirus software before it can detect them.
  • 7. Page 13 The proxy-based SigFree could not handle encrypted or encoded data directly. A particular example is SSLenabled web server. Enhancing security between web clients and web servers. SSL also causes the difficulty for out-of-box malicious code detectors. SSL is implemented as a server module
  • 8. Page 14 To support SSL functionality, an SSL proxy such as Stunnel (Fig. 4) may be deployed to securely tunnel the traffic between clients and web servers.
  • 9. Page 16  SigFree has taken a main step forward in meeting the four requirements Block new and unknown buffer overflow attacks. Uses generic code-data separation criteria feature separates SigFree from an independent work An out-of-the-box solution that requires no server side changes. An economical deployment with very low maintenance cost
  • 10. Page 18 worth mentioning tool is also widely applicable to many programs proxybased SigFree - used to protect all internet services used to protect some Internet services Generate many false positives provide file system real-time protection
  • 11. Page 20 We have proposed SigFree. An online signature-free out-of-the-box blocker that can filter code-injection buffer overflow attack messages One of the most serious cyber security threats. Does not require any signatures. It can block new unknown attacks. Immunized from most attack-side code obfuscation method.
  • 12. Page 22 Citeseer: Scientific Literature Digital Library, http://citeseer.ist.psu.edu, 2007. The Metasploit Project, http://www.metasploit.com, 2007. Jempiscodes—A Polymorphic Shellcode Generator, http:// www.shellcode.com.ar/en/proyectos.html, 2007.