New Multi-step Worm Attack Model

Yusof, R. and Selamat, S. R. and Sahib, S. and Abdollah, M. F. and Mas'ud, M. Z. and Ramly, M. (2010) New Multi-step Worm Attack Model. Journal of Computing, 2 (1). pp. 1-7. ISSN 2151-9617

[img] Text
1001.3477.pdf - Published Version
Restricted to Registered users only

Download (538kB) | Request a copy

Abstract

The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms’ attack model which describes the process of worms’ infection. For the purpose of this paper, only Blaster variants were used during the experiment. This paper proposes a multi-step worm attack model which can be extended into research areas in alert correlation and computer forensic investigation.

Item Type: Article
Uncontrolled Keywords: multi-step worm attack model, attack pattern, log.
Subjects: Q Science > Q Science (General)
Divisions: Faculty of Information and Communication Technology > Department of System and Computer Communication
Depositing User: Dr. Robiah Yusof
Date Deposited: 05 Aug 2011 04:02
Last Modified: 19 Sep 2021 17:12
URI: http://eprints.utem.edu.my/id/eprint/63
Statistic Details: View Download Statistic

Actions (login required)

View Item View Item