Browse By Repository:

 
 
 
   

Advanced trace pattern for computer intrusion discovery

Selamat, Siti Rahayu and Yusof, Robiah and Sahib, Shahrin and Mas'ud, Mohd Zaki and Abdollah, Mohd Faizal and Zainal Abidin, Zaheera (2010) Advanced trace pattern for computer intrusion discovery. Journal of Computing, 2 (6). pp. 200-207. ISSN 2151-9617

[img] PDF
Advanced_Trace_Pattern_for_Computer_Intrusion_Discovery.pdf - Published Version

Download (613Kb)

Abstract

The number of crime committed based on the malware intrusion is never ending as the number of malware variants is growing tremendously and the usage of internet is expanding globally. Malicious codes easily obtained and use as one of weapon to gain their objective illegally. Hence, in this research, diverse logs from different OSI layer are explored to identify the traces left on the attacker and victim logs in order to establish worm trace pattern to defending against the attack and help revealing true attacker or victim. For the purpose of this paper, it focused on malware intrusion and traditional worm namely sasser worm variants. The concept of trace pattern is created by fusing the attacker’s and victim’s perspective. Therefore, the objective of this paper is to propose a general worm trace pattern for attacker’s, victim’s and multi-step (attacker/victim)’s by combining both perspectives. These three proposed worm trace patterns can be extended into research areas in alert correlation and computer forensic investigation.

Item Type: Article
Uncontrolled Keywords: attacker, log, multi-step, trace pattern, victim
Subjects: T Technology > TK Electrical engineering. Electronics Nuclear engineering
Divisions: Faculty of Information and Communication Technology > Department of System and Computer Communication
Depositing User: ZAHEERA ZAINAL ABIDIN
Date Deposited: 26 Jan 2015 03:28
Last Modified: 28 May 2015 04:36
URI: http://eprints.utem.edu.my/id/eprint/14147

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year