Detection of Buffer Overflow Attacks with Memoization-based Rule Set

Different abnormalities are commonly encountered in computer network systems. These types of abnormalities can lead to critical data losses or unauthorized access in the systems. Buffer overflow anomaly is a prominent issue among these abnormalities, posing a serious threat to network security. The...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of Computer Science Research Jg. 5; H. 4; S. 13 - 26
Hauptverfasser: Özger, Oğuz, Öztekİn, Halit
Format: Journal Article
Sprache:Englisch
Veröffentlicht: 30.11.2023
ISSN:2630-5151, 2630-5151
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract Different abnormalities are commonly encountered in computer network systems. These types of abnormalities can lead to critical data losses or unauthorized access in the systems. Buffer overflow anomaly is a prominent issue among these abnormalities, posing a serious threat to network security. The primary objective of this study is to identify the potential risks of buffer overflow that can be caused by functions frequently used in the PHP programming language and to provide solutions to minimize these risks. Static code analyzers are used to detect security vulnerabilities, among which SonarQube stands out with its extensive library, flexible customization options, and reliability in the industry. In this context, a customized rule set aimed at automatically detecting buffer overflows has been developed on the SonarQube platform. The memoization optimization technique used while creating the customized rule set enhances the speed and efficiency of the code analysis process. As a result, the code analysis process is not repeatedly run for code snippets that have been analyzed before, significantly reducing processing time and resource utilization. In this study, a memoization-based rule set was utilized to detect critical security vulnerabilities that could lead to buffer overflow in source codes written in the PHP programming language. Thus, the analysis process is not repeatedly run for code snippets that have been analyzed before, leading to a significant reduction in processing time and resource utilization. In a case study conducted to assess the effectiveness of this method, a significant decrease in the source code analysis time was observed.
AbstractList Different abnormalities are commonly encountered in computer network systems. These types of abnormalities can lead to critical data losses or unauthorized access in the systems. Buffer overflow anomaly is a prominent issue among these abnormalities, posing a serious threat to network security. The primary objective of this study is to identify the potential risks of buffer overflow that can be caused by functions frequently used in the PHP programming language and to provide solutions to minimize these risks. Static code analyzers are used to detect security vulnerabilities, among which SonarQube stands out with its extensive library, flexible customization options, and reliability in the industry. In this context, a customized rule set aimed at automatically detecting buffer overflows has been developed on the SonarQube platform. The memoization optimization technique used while creating the customized rule set enhances the speed and efficiency of the code analysis process. As a result, the code analysis process is not repeatedly run for code snippets that have been analyzed before, significantly reducing processing time and resource utilization. In this study, a memoization-based rule set was utilized to detect critical security vulnerabilities that could lead to buffer overflow in source codes written in the PHP programming language. Thus, the analysis process is not repeatedly run for code snippets that have been analyzed before, leading to a significant reduction in processing time and resource utilization. In a case study conducted to assess the effectiveness of this method, a significant decrease in the source code analysis time was observed.
Author Öztekİn, Halit
Özger, Oğuz
Author_xml – sequence: 1
  givenname: Oğuz
  surname: Özger
  fullname: Özger, Oğuz
– sequence: 2
  givenname: Halit
  orcidid: 0000-0001-8598-4763
  surname: Öztekİn
  fullname: Öztekİn, Halit
BookMark eNpN0D1PwzAYBGALFYlSOrP6D6S14694LC0UpKJK0D1y7NcikMbIdlvBr4cAA9PdcLrhuUSjPvSA0DUlM0aE5PNXm-LsKFo-k4TzMzQuJSOFoIKO_vULNE2pbb4XirNKyTFarSCDzW3ocfD45uA9RLw9QvRdOOFFzsa-JXxq8wt-hH1oP82wLRqTwOGnQwf4GfIVOvemSzD9ywna3d3ulvfFZrt-WC42ha0oLzQpFYB21jgirTfEgJZMe2nKxvCGOCq9hsYZ7ZR0wAWvKi9KUIpzT0vFJmj-e2tjSCmCr99juzfxo6ak_mGoB4Z6YKgHBvYFpJNUUA
ContentType Journal Article
DBID AAYXX
CITATION
DOI 10.30564/jcsr.v5i4.6044
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList CrossRef
DeliveryMethod fulltext_linktorsrc
EISSN 2630-5151
EndPage 26
ExternalDocumentID 10_30564_jcsr_v5i4_6044
GroupedDBID AAYXX
ALMA_UNASSIGNED_HOLDINGS
CITATION
M~E
ID FETCH-LOGICAL-c814-9027ee9dcad06cfa0ae9639f6a2ba4b0d16f9ebda9d76de45488f52e7744f1273
ISSN 2630-5151
IngestDate Sat Nov 29 05:03:26 EST 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed false
IsScholarly true
Issue 4
Language English
License https://creativecommons.org/licenses/by-nc/4.0
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c814-9027ee9dcad06cfa0ae9639f6a2ba4b0d16f9ebda9d76de45488f52e7744f1273
ORCID 0000-0001-8598-4763
OpenAccessLink https://journals.bilpubgroup.com/index.php/jcsr/article/download/6044/5066
PageCount 14
ParticipantIDs crossref_primary_10_30564_jcsr_v5i4_6044
PublicationCentury 2000
PublicationDate 2023-11-30
PublicationDateYYYYMMDD 2023-11-30
PublicationDate_xml – month: 11
  year: 2023
  text: 2023-11-30
  day: 30
PublicationDecade 2020
PublicationTitle Journal of Computer Science Research
PublicationYear 2023
SSID ssib044743876
Score 2.239031
Snippet Different abnormalities are commonly encountered in computer network systems. These types of abnormalities can lead to critical data losses or unauthorized...
SourceID crossref
SourceType Index Database
StartPage 13
Title Detection of Buffer Overflow Attacks with Memoization-based Rule Set
Volume 5
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2630-5151
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssib044743876
  issn: 2630-5151
  databaseCode: M~E
  dateStart: 20190101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT9wwELZa2kMvFVVBLYXKBw6VVoE8nIePSwFxAapqD9wixx5XqG0W7WYB7YHfzkwcb7MLSPTAJYqcaLTOfPv5Gz9mGNtViTQaw4BAWYxVUVJXgYow5tFAi0ApKAFVW2wiPzsrLi7kj265YNqWE8jruri9lVcv6mpsQ2fT0dn_cPfCKDbgPTodr-h2vD7L8YfQgPY68GBG9U8G59gL-2d8Mxg2DR2qd9Ovp_B33B3DDGg0M4OfM9paCEvz9T3J6ktALBjB79vzbqNld5nNfzkcnJNSlcez-crjBn7Tk4OwZbwTigT6kw9x4pMeeo6KsyQMUBI5eMAjbR3Jpj0siR5huoOo3dDrzs6vkjoFOYJYXU8ne9fppdjLQpczcjl99sqwtthsiGFOa6IkAyUZKMnAa_YmzlNJTHh6d-Q5SAiUVIWrSej74TJCtTb2l39ET8z0VMlonb3vfMOHDgYf2CuoP7LDBQT42HIHAe4hwDsIcIIAfwABThDgCIENNjo-Gn0_CbpqGYEuIhHIMM4B8I-nTJhpq0IFyK3SZiqulKhCE2VWQmWUNHlmQGCkWtg0BpT_wkYoYjfZWj2u4RPjQppE61hYMJEAkyhJKXsiyK2yiSnyz-yb73V55XKilE985K3nv_qFvfuHsG221kxmsMPe6uvmcjr52jrpHsbZWaQ
linkProvider ISSN International Centre
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Detection+of+Buffer+Overflow+Attacks+with+Memoization-based+Rule+Set&rft.jtitle=Journal+of+Computer+Science+Research&rft.au=%C3%96zger%2C+O%C4%9Fuz&rft.au=%C3%96ztek%C4%B0n%2C+Halit&rft.date=2023-11-30&rft.issn=2630-5151&rft.eissn=2630-5151&rft.volume=5&rft.issue=4&rft.spage=13&rft.epage=26&rft_id=info:doi/10.30564%2Fjcsr.v5i4.6044&rft.externalDBID=n%2Fa&rft.externalDocID=10_30564_jcsr_v5i4_6044
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2630-5151&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2630-5151&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2630-5151&client=summon