Computer Science – Cryptography and Security
Scientific paper
2010-06-23
Journal of Computing, Vol. 2, No. 6, June 2010, NY, USA, ISSN 2151-9617
Computer Science
Cryptography and Security
IEEE Publication Format, https://sites.google.com/site/journalofcomputing/
Scientific paper
The number of crime committed based on the malware intrusion is never ending as the number of malware variants is growing tremendously and the usage of internet is expanding globally. Malicious codes easily obtained and use as one of weapon to gain their objective illegally. Hence, in this research, diverse logs from different OSI layer are explored to identify the traces left on the attacker and victim logs in order to establish worm trace pattern to defending against the attack and help revealing true attacker or victim. For the purpose of this paper, it focused on malware intrusion and traditional worm namely sasser worm variants. The concept of trace pattern is created by fusing the attacker's and victim's perspective. Therefore, the objective of this paper is to propose a general worm trace pattern for attacker's, victim's and multi-step (attacker/victim)'s by combining both perspectives. These three proposed worm trace patterns can be extended into research areas in alert correlation and computer forensic investigation.
Faizal M. A.
Rahayu Siti S.
Robiah Y.
Shahrin S.
Zaheera Z. A.
No associations
LandOfFree
Advanced Trace Pattern For Computer Intrusion Discovery does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Advanced Trace Pattern For Computer Intrusion Discovery, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Advanced Trace Pattern For Computer Intrusion Discovery will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-278272