Computer Science – Cryptography and Security
Scientific paper
2010-01-20
Journal of Computing, Vol. 2, Issue 1, January 2010
Computer Science
Cryptography and Security
Scientific paper
The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms' attack model which describes the process of worms' infection. For the purpose of this paper, only Blaster variants were used during the experiment. This paper proposes a multi-step worm attack model which can be extended into research areas in alert correlation and computer forensic investigation.
Faizal M. A.
Marliza R.
Rahayu Siti S.
Robiah Y.
Shahrin S.
No associations
LandOfFree
New Multi-step Worm Attack Model does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with New Multi-step Worm Attack Model, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and New Multi-step Worm Attack Model will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-128286