Tracing Technique for Blaster Attack

Selamat, S. R. and Yusof, R. and Sahib, S. and Abdollah, M. F. and Mas'ud, Z. and Roslan, I. (2009) Tracing Technique for Blaster Attack. International Journal of Computer Science and Information Security, 4 (1). pp. 1-8. ISSN 1947-5500

[img]
Preview
PDF
Tracing_Technique_for_Blaster_Attack.pdf - Published Version

Download (159kB)

Abstract

Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial release. This paper is to propose technique on tracing the Blaster attack from various logs in different OSI layers based on fingerprint of Blaster attack on victim logs, attacker logs and IDS alert log. The researchers intended to do a preliminary investigation upon this particular attack so that it can be used for further research in alert correlation and computer forensic investigation.

Item Type: Article
Uncontrolled Keywords: Tracing technique, Blaster attack, fingerprint, log
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: Faculty of Information and Communication Technology > Department of System and Computer Communication
Depositing User: Mrs Siti Rahayu Selamat
Date Deposited: 02 Aug 2011 08:45
Last Modified: 19 Sep 2021 04:12
URI: http://eprints.utem.edu.my/id/eprint/16
Statistic Details: View Download Statistic

Actions (login required)

View Item View Item