A New Malware Attack Pattern Generalization

The significant threats of malware are still continuing due to their rapid distribution nature on the internet. The malware attack pattern from nine different attack scenarios have been extracted from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These...

Full description

Bibliographic Details
Main Authors: Yusof, R., Selamat, S. R., Sahib, S., Abdollah, M. F., Mas'ud, M. Z., Ramly, M.
Format: Conference or Workshop Item
Language:English
Published: 2011
Subjects:
Online Access:http://eprints.utem.edu.my/id/eprint/190/
http://eprints.utem.edu.my/id/eprint/190/1/Generic_Malware_Attack_Pattern.docx
_version_ 1848886901021343744
author Yusof, R.
Selamat, S. R.
Sahib, S.
Abdollah, M. F.
Mas'ud, M. Z.
Ramly, M.
author_facet Yusof, R.
Selamat, S. R.
Sahib, S.
Abdollah, M. F.
Mas'ud, M. Z.
Ramly, M.
author_sort Yusof, R.
building UTeM Institutional Repository
collection Online Access
description The significant threats of malware are still continuing due to their rapid distribution nature on the internet. The malware attack pattern from nine different attack scenarios have been extracted from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These malware attack pattern are further analyzed to form the general malware attack pattern which describes the process of malware infection. This paper proposes a general attack pattern for malware in three different perspectives which is attacker, victim and victim/attacker or multi-step attack using only traditional worm variant. Hence, the general malware attack pattern can be extended into research areas in alert correlation and computer forensic investigation.
first_indexed 2025-11-15T19:45:51Z
format Conference or Workshop Item
id utem-190
institution Universiti Teknikal Malaysia Melaka
institution_category Local University
language English
last_indexed 2025-11-15T19:45:51Z
publishDate 2011
recordtype eprints
repository_type Digital Repository
spelling utem-1902015-05-28T02:17:12Z http://eprints.utem.edu.my/id/eprint/190/ A New Malware Attack Pattern Generalization Yusof, R. Selamat, S. R. Sahib, S. Abdollah, M. F. Mas'ud, M. Z. Ramly, M. Q Science (General) The significant threats of malware are still continuing due to their rapid distribution nature on the internet. The malware attack pattern from nine different attack scenarios have been extracted from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These malware attack pattern are further analyzed to form the general malware attack pattern which describes the process of malware infection. This paper proposes a general attack pattern for malware in three different perspectives which is attacker, victim and victim/attacker or multi-step attack using only traditional worm variant. Hence, the general malware attack pattern can be extended into research areas in alert correlation and computer forensic investigation. 2011 Conference or Workshop Item PeerReviewed application/msword en http://eprints.utem.edu.my/id/eprint/190/1/Generic_Malware_Attack_Pattern.docx Yusof, R. and Selamat, S. R. and Sahib, S. and Abdollah, M. F. and Mas'ud, M. Z. and Ramly, M. (2011) A New Malware Attack Pattern Generalization. In: Malaysian Technical Universities International Conference on Engineering & Technology (MUiCET 2011), 13-15 November 2011, UTHM, Batu Pahat, Johor.
spellingShingle Q Science (General)
Yusof, R.
Selamat, S. R.
Sahib, S.
Abdollah, M. F.
Mas'ud, M. Z.
Ramly, M.
A New Malware Attack Pattern Generalization
title A New Malware Attack Pattern Generalization
title_full A New Malware Attack Pattern Generalization
title_fullStr A New Malware Attack Pattern Generalization
title_full_unstemmed A New Malware Attack Pattern Generalization
title_short A New Malware Attack Pattern Generalization
title_sort new malware attack pattern generalization
topic Q Science (General)
url http://eprints.utem.edu.my/id/eprint/190/
http://eprints.utem.edu.my/id/eprint/190/1/Generic_Malware_Attack_Pattern.docx