Improvising Intrusion Detection for Malware Activities on Dual-Stack Network Environment

Muslim, Z. and Yusof, R. and Abu, N. A. and Sahib, S. (2012) Improvising Intrusion Detection for Malware Activities on Dual-Stack Network Environment. In: WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY , July 2012, Stockholm, Sweden.

v67-118.pdf - Published Version

Download (464kB)


Malware is software which was invented and meant for doing harms on computers. Malware is becoming a significant threat in computer network nowadays. Malware attack is not just only involving financial lost but it can also cause fatal errors which may cost lives in some cases. As new Internet Protocol version 6 (IPv6)emerged, many people believe this protocol could solve most malware propagation issues due to its broader addressing scheme. As IPv6 is still new compares to native IPv4, some transition mechanisms have been introduced to promote smoother migration. Unfortunately, these transition mechanisms allow some malwares to propagate its attack from IPv4 to IPv6 network environment. In this paper, a proof of concept shall be presented in order to show that some existing IPv4 malware detection technique need to be improvised in order to detect malware attack in dual-stack network more efficiently. A testbed of dual-stack network environment has been deployed and some genuine malware have been released to observe their behaviors. The results between these different scenarios will be analyzed and discussed further in term of their behaviors and propagation methods. The results show that malware behave differently on IPv6 from the IPv4 network protocol on the dual-stack network environment. A new detection technique is called for in order to cater this problem in the near future.

Item Type: Conference or Workshop Item (Paper)
Subjects: Q Science > Q Science (General)
Divisions: Faculty of Information and Communication Technology > Department of System and Computer Communication
Depositing User: Dr. Robiah Yusof
Date Deposited: 14 Nov 2012 14:48
Last Modified: 28 May 2015 03:37
Statistic Details: View Download Statistic

Actions (login required)

View Item View Item