Scenario Based Worm Trace Pattern Identification Technique

نویسندگان

  • S. Siti Rahayu
  • Y. Robiah
  • S. Shahrin
  • M. Mohd Zaki
  • R. Irda
  • M. A. Faizal
چکیده

The number of malware variants is growing tremendously and the study of malware attacks on the Internet is still a demanding research domain. In this research, various logs from different OSI layer are explore to identify the traces leave on the attacker and victim logs, and the attack worm trace pattern are establish in order to reveal true attacker or victim. For the purpose of this paper, it will only concentrate on cybercrime that caused by malware network intrusion and used the traditional worm namely blaster worm variants. This research creates the concept of trace pattern by fusing the attacker’s and victim’s perspective. Therefore, the objective of this paper is to propose on attacker’s, victim’s and multi-step (attacker/victim)’s trace patterns by combining both perspectives. These three proposed worm trace patterns can be extended into research areas in alert correlation and computer forensic investigation. Keywords— trace pattern, attack pattern, log

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Advanced Trace Pattern For Computer Intrusion Discovery

The number of crime committed based on the malware intrusion is never ending as the number of malware variants is growing tremendously and the usage of internet is expanding globally. Malicious codes easily obtained and use as one of weapon to gain their objective illegally. Hence, in this research, diverse logs from different OSI layer are explored to identify the traces left on the attacker a...

متن کامل

Cross-layer Packet-dependant OFDM Scheduling Based on Proportional Fairness

This paper assumes each user has more than one queue, derives a new packet-dependant proportional fairness power allocation pattern based on the sum of weight capacity and the packet’s priority in users’ queues, and proposes 4 new cross-layer packet-dependant OFDM scheduling schemes based on proportional fairness for heterogeneous classes of traffic. Scenario 1, scenario 2 and scenario 3 lead r...

متن کامل

1 Encounter - based worms : Analysis and Defense

An encounter-based network is a frequently-disconnected wireless ad-hoc network requiring immediate neighbors to store and forward aggregated data for information disseminations. Using traditional approaches such as gateways or firewalls to deter worm propagation in encounter-based networks is inappropriate. We propose a worm interaction approach that relies upon automated beneficial worm gener...

متن کامل

Two worm-like organisms from the Hunsrück Slate (Lower Devonian), southern Germany

One radiograph of Hunsrück slate shows the presence of a drop-shaped "worm". This image resembles an acoel platyhelminth in the presence of an apparently eversible pharyngeal structure, but no trace can be tound of the complex reproductive structures of platyhelminths, making full identification impossible. Another more elongate worm-like image shows the presence of anterior perforations into a...

متن کامل

The Challenges of Scenario-Based Teaching Using Drama Scripts

It is widely believed that the major purpose of foreign language learning is to master the speaking skill of that language. Learners even evaluate their foreign language learning on the basis of their achievement in speaking proficiency. This study discusses different teaching methodologies aimed at the development of task-based language learning, drama and the manifestation of scenario-based t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1002.1678  شماره 

صفحات  -

تاریخ انتشار 2010