Selamat, S. R. and Yusof, R. and Sahib, S. and Abdollah, M. F. and Mas'ud, Z. and Roslan, I. (2009) Tracing Technique for Blaster Attack. International Journal of Computer Science and Information Security, 4 (1). pp. 1-8. ISSN 1947-5500
|
PDF
Tracing_Technique_for_Blaster_Attack.pdf - Published Version Download (159kB) |
Abstract
Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial release. This paper is to propose technique on tracing the Blaster attack from various logs in different OSI layers based on fingerprint of Blaster attack on victim logs, attacker logs and IDS alert log. The researchers intended to do a preliminary investigation upon this particular attack so that it can be used for further research in alert correlation and computer forensic investigation.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | Tracing technique, Blaster attack, fingerprint, log |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
Divisions: | Faculty of Information and Communication Technology > Department of System and Computer Communication |
Depositing User: | Mrs Siti Rahayu Selamat |
Date Deposited: | 02 Aug 2011 08:45 |
Last Modified: | 19 Sep 2021 04:12 |
URI: | http://eprints.utem.edu.my/id/eprint/16 |
Statistic Details: | View Download Statistic |
Actions (login required)
View Item |