Computer Science – Cryptography and Security
Scientific paper
2009-08-25
International Journal of Computer Science and Information Security, IJCSIS, Volume 4, No. 1, August 2009, USA
Computer Science
Cryptography and Security
8 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact F
Scientific paper
Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial release. This paper is to propose technique on tracing the Blaster attack from various logs in different OSI layers based on fingerprint of Blaster attack on victim logs, attacker logs and IDS alert log. The researchers intended to do a preliminary investigation upon this particular attack so that it can be used for further research in alert correlation and computer forensic investigation.
Faizal M. A.
Irda R.
Mohd Zaki M.
Robiah Y.
Shahrin S.
No associations
LandOfFree
Tracing Technique for Blaster Attack does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Tracing Technique for Blaster Attack, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Tracing Technique for Blaster Attack will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-233164