Scenario Based Worm Trace Pattern Identification Technique
International Journal of Computer Science and Information Security, IJCSIS, Vol. 7, No. 1, pp. 1-9, January 2010, USA The number of malware variants is growing tremendously and the study of malware attacks on the Internet is still a demanding research domain. In this research, various logs from diff...
Gespeichert in:
Hauptverfasser: | , , , , , |
---|---|
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | International Journal of Computer Science and Information
Security, IJCSIS, Vol. 7, No. 1, pp. 1-9, January 2010, USA The number of malware variants is growing tremendously and the study of
malware attacks on the Internet is still a demanding research domain. In this
research, various logs from different OSI layer are explore to identify the
traces leave on the attacker and victim logs, and the attack worm trace pattern
are establish in order to reveal true attacker or victim. For the purpose of
this paper, it will only concentrate on cybercrime that caused by malware
network intrusion and used the traditional worm namely blaster worm variants.
This research creates the concept of trace pattern by fusing the attackers and
victims perspective. Therefore, the objective of this paper is to propose on
attackers, victims and multistep, attacker or victim, trace patterns by
combining both perspectives. These three proposed worm trace patterns can be
extended into research areas in alert correlation and computer forensic
investigation. |
---|---|
DOI: | 10.48550/arxiv.1002.1678 |