3 Citations (Scopus)
38 Downloads (Pure)

Abstract

The Code Injection Attack (CIA) exploits a security vulnerability or computer bug that is caused by processing invalid data, CIA is a serious attack problem that attackers try to introduce any new methodologies to bypass the defense system. In this paper, we introduce a novel detection algorithm for detection of code injection attack. Our empirical performance shows that the proposed algorithm give better results compared to existing results.
Original languageEnglish
Title of host publicationInternational Conference on Applications and Techniques in Cyber Security and Intelligence
Subtitle of host publicationApplications and Techniques in Cyber Security and Intelligence
EditorsJemal Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam
Place of PublicationCham, Switzerland
PublisherSpringer-Verlag London Ltd.
Pages281-292
Number of pages12
Volume580
ISBN (Electronic)9783319670713
ISBN (Print)9783319670706
DOIs
Publication statusPublished - 01 Jan 2018
Event2017 International Conference on Applications and Techniques in Cyber Intelligence (ATCI) - Zhejiang Business Technology Institute, Ningbo, China
Duration: 16 Jun 201718 Jun 2017
https://web.archive.org/web/20170228045429/http://aibd.us/ (Conference site)
https://link.springer.com/book/10.1007/978-3-319-67071-3#bibliographic-information (Conference proceedings)

Publication series

NameAdvances in Intelligent Systems and Computing
Volume580
ISSN (Print)2194-5357
ISSN (Electronic)2194-5365

Conference

Conference2017 International Conference on Applications and Techniques in Cyber Intelligence (ATCI)
Country/TerritoryChina
CityNingbo
Period16/06/1718/06/17
OtherThe 2017 International Conference on Applications and Techniques in Cyber Security and Intelligence focuses on all aspects on techniques and applications in cyber and electronics security and intelligence research. The purpose of ATCI 2017 is to provide a forum for presentation and discussion of innovative ideas, cutting edge research results, and novel techniques, methods and applications on all aspects of cyber and electronics security and intelligence.
As in previous years, the conference intends to attract the cyber security and cyber intelligence (e.g. big data) research community from around the world. Each submission will be reviewed by at least three independent experts, and the acceptance rate will be below 30%. We will invite three internationally renowned keynote speakers for this conference.
Internet address

Fingerprint

Dive into the research topics of 'A novel algorithm to protect code injection attacks'. Together they form a unique fingerprint.

Cite this