Tracing Technique for Blaster Attack

Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial rele...

Full description

Bibliographic Details
Main Authors: Selamat, S. R., Yusof, R., Sahib, S., Abdollah, M. F., Mas'ud, Z., Roslan, I.
Format: Article
Language:English
Published: 2009
Subjects:
Online Access:http://eprints.utem.edu.my/id/eprint/16/
http://eprints.utem.edu.my/id/eprint/16/1/Tracing_Technique_for_Blaster_Attack.pdf
_version_ 1848886871100227584
author Selamat, S. R.
Yusof, R.
Sahib, S.
Abdollah, M. F.
Mas'ud, Z.
Roslan, I.
author_facet Selamat, S. R.
Yusof, R.
Sahib, S.
Abdollah, M. F.
Mas'ud, Z.
Roslan, I.
author_sort Selamat, S. R.
building UTeM Institutional Repository
collection Online Access
description Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial release. This paper is to propose technique on tracing the Blaster attack from various logs in different OSI layers based on fingerprint of Blaster attack on victim logs, attacker logs and IDS alert log. The researchers intended to do a preliminary investigation upon this particular attack so that it can be used for further research in alert correlation and computer forensic investigation.
first_indexed 2025-11-15T19:45:22Z
format Article
id utem-16
institution Universiti Teknikal Malaysia Melaka
institution_category Local University
language English
last_indexed 2025-11-15T19:45:22Z
publishDate 2009
recordtype eprints
repository_type Digital Repository
spelling utem-162021-09-19T04:12:09Z http://eprints.utem.edu.my/id/eprint/16/ Tracing Technique for Blaster Attack Selamat, S. R. Yusof, R. Sahib, S. Abdollah, M. F. Mas'ud, Z. Roslan, I. QA75 Electronic computers. Computer science Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial release. This paper is to propose technique on tracing the Blaster attack from various logs in different OSI layers based on fingerprint of Blaster attack on victim logs, attacker logs and IDS alert log. The researchers intended to do a preliminary investigation upon this particular attack so that it can be used for further research in alert correlation and computer forensic investigation. 2009 Article PeerReviewed application/pdf en http://eprints.utem.edu.my/id/eprint/16/1/Tracing_Technique_for_Blaster_Attack.pdf Selamat, S. R. and Yusof, R. and Sahib, S. and Abdollah, M. F. and Mas'ud, Z. and Roslan, I. (2009) Tracing Technique for Blaster Attack. International Journal of Computer Science and Information Security, 4 (1). pp. 1-8. ISSN 1947-5500 http://sites.google.com/site/ijcsis/
spellingShingle QA75 Electronic computers. Computer science
Selamat, S. R.
Yusof, R.
Sahib, S.
Abdollah, M. F.
Mas'ud, Z.
Roslan, I.
Tracing Technique for Blaster Attack
title Tracing Technique for Blaster Attack
title_full Tracing Technique for Blaster Attack
title_fullStr Tracing Technique for Blaster Attack
title_full_unstemmed Tracing Technique for Blaster Attack
title_short Tracing Technique for Blaster Attack
title_sort tracing technique for blaster attack
topic QA75 Electronic computers. Computer science
url http://eprints.utem.edu.my/id/eprint/16/
http://eprints.utem.edu.my/id/eprint/16/
http://eprints.utem.edu.my/id/eprint/16/1/Tracing_Technique_for_Blaster_Attack.pdf