Advanced Trace Pattern For Computer Intrusion Discovery

نویسندگان

  • S. Siti Rahayu
  • Y. Robiah
  • S. Shahrin
  • M. Mohd Zaki
  • M. A. Faizal
  • Z. A. Zaheera
چکیده

The number of crime committed based on the malware intrusion is never ending as the number of malware variants is growing tremendously and the usage of internet is expanding globally. Malicious codes easily obtained and use as one of weapon to gain their objective illegally. Hence, in this research, diverse logs from different OSI layer are explored to identify the traces left on the attacker and victim logs in order to establish worm trace pattern to defending against the attack and help revealing true attacker or victim. For the purpose of this paper, it focused on malware intrusion and traditional worm namely sasser worm variants. The concept of trace pattern is created by fusing the attacker’s and victim’s perspective. Therefore, the objective of this paper is to propose a general worm trace pattern for attacker’s, victim’s and multi-step (attacker/victim)’s by combining both perspectives. These three proposed worm trace patterns can be extended into research areas in alert correlation and computer forensic investigation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detecting and Mitigating Security Anomaliies

Network and information security is of increasing concern as intruders utilize more advanced technologies, and attacks are occurring much more frequently. A simple intrusion can cause an enterprise financial disaster, a threat to national safety, or loss of human life. Network-based and computer-based intrusion detection systems (IDS's) started appearing some twenty years ago. Now, there are va...

متن کامل

Automated Discovery of Novel Anomalous Patterns

We propose Discovering Novel Anomalous Patterns (DAP), a new method for continual and automated discovery of anomalous patterns in general datasets. Currently, general methods for anomalous pattern detection attempt to identify data patterns that are unexpected as compared to “normal” system behavior. We propose a novel approach for discovering data patterns that are unexpected given a profile ...

متن کامل

Intrusion Detection Using the Support Vector Machine Enhanced with a Feature-weight Kernel

With the popularization of the Internet and local networks, malicious attacks and intrusion events to computer systems are growing. The design and implementation of intrusion detection systems are becoming extremely important in helping to maintain proper network security. Support Vector Machines (SVM) as a classic pattern recognition tool, have been widely used in intrusion detection. However,...

متن کامل

A New Method for Intrusion Detection Using Genetic Algorithm and Neural network

Abstract— In order to provide complete security in a computer system and to prevent intrusion, intrusion detection systems (IDS) are required to detect if an attacker crosses the firewall, antivirus, and other security devices. Data and options to deal with it. In this paper, we are trying to provide a model for combining types of attacks on public data using combined methods of genetic algorit...

متن کامل

An Advanced Data Processing Based Fusion IDS Structures

An Intrusion can be definite as any perform or act that attempt to crack the veracity, privacy or accessibility of a source this may enclose of a on purpose not permitted challenge to admittance the information, influence the data, or create a system defective or not viable. With the growth of computer networks at an alarming rate through the past decade, safety has become one of the serious is...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1006.4569  شماره 

صفحات  -

تاریخ انتشار 2010