Buffer
Overflow Defenses. ©2002, Jedidiah R. Crandall, Susan L. Gerhart, Jan G. Hogle.
http://sfsecurity.pr.erau.edu.
Operating system tools –
Intrusion detection
•Example: An intrusion
detection system could keep track of what patterns
of system calls programs usually exhibit, and then report or react to anomalies such as an “execv()” call when the
next system call is usually to close a
file
•Pros:
–Could be able to detect a variety of hijacking attacks,
not just stack smashing
–Could be able to detect many attacks on unknown
vulnerabilities
•Cons:
–Intrusion detection is a developing technology
–The offending process will probably be killed leaving it
open to a denial-of-service attack