Tracing Technique for Blaster Attack
Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial rele...
| Main Authors: | , , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
2009
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/16/ http://eprints.utem.edu.my/id/eprint/16/1/Tracing_Technique_for_Blaster_Attack.pdf |
| _version_ | 1848886871100227584 |
|---|---|
| author | Selamat, S. R. Yusof, R. Sahib, S. Abdollah, M. F. Mas'ud, Z. Roslan, I. |
| author_facet | Selamat, S. R. Yusof, R. Sahib, S. Abdollah, M. F. Mas'ud, Z. Roslan, I. |
| author_sort | Selamat, S. R. |
| building | UTeM Institutional Repository |
| collection | Online Access |
| description | Blaster worm of 2003 is still persistent, the infection
appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial release. This paper is to propose technique on tracing the Blaster attack from various logs in different OSI layers based on fingerprint of Blaster attack on victim logs, attacker logs and IDS alert log. The researchers intended to do a preliminary investigation upon this particular attack so that it can be used for further research in alert correlation and computer forensic investigation. |
| first_indexed | 2025-11-15T19:45:22Z |
| format | Article |
| id | utem-16 |
| institution | Universiti Teknikal Malaysia Melaka |
| institution_category | Local University |
| language | English |
| last_indexed | 2025-11-15T19:45:22Z |
| publishDate | 2009 |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | utem-162021-09-19T04:12:09Z http://eprints.utem.edu.my/id/eprint/16/ Tracing Technique for Blaster Attack Selamat, S. R. Yusof, R. Sahib, S. Abdollah, M. F. Mas'ud, Z. Roslan, I. QA75 Electronic computers. Computer science Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial release. This paper is to propose technique on tracing the Blaster attack from various logs in different OSI layers based on fingerprint of Blaster attack on victim logs, attacker logs and IDS alert log. The researchers intended to do a preliminary investigation upon this particular attack so that it can be used for further research in alert correlation and computer forensic investigation. 2009 Article PeerReviewed application/pdf en http://eprints.utem.edu.my/id/eprint/16/1/Tracing_Technique_for_Blaster_Attack.pdf Selamat, S. R. and Yusof, R. and Sahib, S. and Abdollah, M. F. and Mas'ud, Z. and Roslan, I. (2009) Tracing Technique for Blaster Attack. International Journal of Computer Science and Information Security, 4 (1). pp. 1-8. ISSN 1947-5500 http://sites.google.com/site/ijcsis/ |
| spellingShingle | QA75 Electronic computers. Computer science Selamat, S. R. Yusof, R. Sahib, S. Abdollah, M. F. Mas'ud, Z. Roslan, I. Tracing Technique for Blaster Attack |
| title | Tracing Technique for Blaster Attack |
| title_full | Tracing Technique for Blaster Attack |
| title_fullStr | Tracing Technique for Blaster Attack |
| title_full_unstemmed | Tracing Technique for Blaster Attack |
| title_short | Tracing Technique for Blaster Attack |
| title_sort | tracing technique for blaster attack |
| topic | QA75 Electronic computers. Computer science |
| url | http://eprints.utem.edu.my/id/eprint/16/ http://eprints.utem.edu.my/id/eprint/16/ http://eprints.utem.edu.my/id/eprint/16/1/Tracing_Technique_for_Blaster_Attack.pdf |