Tracing Technique for Blaster Attack

Computer Science – Cryptography and Security

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

8 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact F

Scientific paper

Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial release. This paper is to propose technique on tracing the Blaster attack from various logs in different OSI layers based on fingerprint of Blaster attack on victim logs, attacker logs and IDS alert log. The researchers intended to do a preliminary investigation upon this particular attack so that it can be used for further research in alert correlation and computer forensic investigation.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Tracing Technique for Blaster Attack does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Tracing Technique for Blaster Attack, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Tracing Technique for Blaster Attack will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-233164

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.