Computer Science – Cryptography and Security
Scientific paper
2010-02-08
International Journal of Computer Science and Information Security, IJCSIS, Vol. 7, No. 1, pp. 1-9, January 2010, USA
Computer Science
Cryptography and Security
9 Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS January 2010, ISSN 1947 5500,
Scientific paper
The number of malware variants is growing tremendously and the study of malware attacks on the Internet is still a demanding research domain. In this research, various logs from different OSI layer are explore to identify the traces leave on the attacker and victim logs, and the attack worm trace pattern are establish in order to reveal true attacker or victim. For the purpose of this paper, it will only concentrate on cybercrime that caused by malware network intrusion and used the traditional worm namely blaster worm variants. This research creates the concept of trace pattern by fusing the attackers and victims perspective. Therefore, the objective of this paper is to propose on attackers, victims and multistep, attacker or victim, trace patterns by combining both perspectives. These three proposed worm trace patterns can be extended into research areas in alert correlation and computer forensic investigation.
Faizal M. A.
Irda R.
Rahayu Siti S.
Robiah Y.
Shahrin S.
No associations
LandOfFree
Scenario Based Worm Trace Pattern Identification Technique does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Scenario Based Worm Trace Pattern Identification Technique, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Scenario Based Worm Trace Pattern Identification Technique will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-308946