A New Malware Attack Pattern Generalization
The significant threats of malware are still continuing due to their rapid distribution nature on the internet. The malware attack pattern from nine different attack scenarios have been extracted from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These...
| Main Authors: | Yusof, R., Selamat, S. R., Sahib, S., Abdollah, M. F., Mas'ud, M. Z., Ramly, M. |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2011
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/190/ http://eprints.utem.edu.my/id/eprint/190/1/Generic_Malware_Attack_Pattern.docx |
Similar Items
An Improved Traditional Worm Attack Pattern
by: Yusof, R., et al.
Published: (2010)
by: Yusof, R., et al.
Published: (2010)
A New Generic Taxonomy on Hybrid Malware Detection Technique
by: Yusof, R., et al.
Published: (2009)
by: Yusof, R., et al.
Published: (2009)
New Multi-step Worm Attack Model
by: Yusof, R., et al.
Published: (2010)
by: Yusof, R., et al.
Published: (2010)
Threshold verification using Statistical Approach for Fast Attack Detection
by: Abdollah, M. F., et al.
Published: (2009)
by: Abdollah, M. F., et al.
Published: (2009)
Statistical Approach for Validating Static Threshold in Fast Attack Detection
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Time Based Intrusion Detection on Fast Attack for
Network Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Host Based Detection Approach using Time Based
Module for Fast Attack Detection Behavior
by: Abdollah, M. F., et al.
Published: (2011)
by: Abdollah, M. F., et al.
Published: (2011)
Advanced Trace Pattern For Computer Intrusion Discovery
by: Selamat, S. R., et al.
Published: (2010)
by: Selamat, S. R., et al.
Published: (2010)
Scenario Based Worm Trace Pattern Identification Technique
by: Selamat, S. R., et al.
Published: (2010)
by: Selamat, S. R., et al.
Published: (2010)
Tracing Technique for Blaster Attack
by: Selamat, S. R., et al.
Published: (2009)
by: Selamat, S. R., et al.
Published: (2009)
Generic Taxonomy of Social Engineering Attack
by: Mohd Foozy, F, et al.
Published: (2011)
by: Mohd Foozy, F, et al.
Published: (2011)
Enhanced Alert Correlation Framework for Heterogeneous Log
by: Yusof, R., et al.
Published: (2011)
by: Yusof, R., et al.
Published: (2011)
Threshold Verification Technique for Network
Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2009)
by: Abdollah, M. F., et al.
Published: (2009)
Collaborative Security Mechanism in Detecting Intrusion Activity
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Recognizing P2P Botnets Characteristic Through TCP Distinctive Behaviour
by: Abdullah, Raihana Syahirah, et al.
Published: (2011)
by: Abdullah, Raihana Syahirah, et al.
Published: (2011)
Feature Selection for Detecting Fast Attack in Network Intrusion Detection
by: Abdollah, M. F., et al.
Published: (2008)
by: Abdollah, M. F., et al.
Published: (2008)
Adapting Traceability in Digital Forensic Investigation Process
by: Selamat, S. R., et al.
Published: (2011)
by: Selamat, S. R., et al.
Published: (2011)
Alert Correlation Technique Analysis For Diverse Log
by: Yusof, R., et al.
Published: (2008)
by: Yusof, R., et al.
Published: (2008)
Understanding the root of attack in android malware
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
Understanding the root of attack in android malware
by: Romli, Rahiwan Nazar, et al.
Published: (2018)
by: Romli, Rahiwan Nazar, et al.
Published: (2018)
Network Administration & Management
by: Yusof, R., et al.
Published: (2007)
by: Yusof, R., et al.
Published: (2007)
Virtual Machine based Autonomous Web Server
by: Mas’ud, M. Z., et al.
Published: (2011)
by: Mas’ud, M. Z., et al.
Published: (2011)
Behavioral Analysis on IPv4 Malware in both IPv4 and IPv6 Network Environment
by: Muslim, Z., et al.
Published: (2011)
by: Muslim, Z., et al.
Published: (2011)
Traceability in Digital Forensic Investigation
Process
by: Selamat, S. R., et al.
Published: (2011)
by: Selamat, S. R., et al.
Published: (2011)
Threshold verification using statistical approach for fast attack detection
by: Abdollah, Mohd Faizal, et al.
Published: (2009)
by: Abdollah, Mohd Faizal, et al.
Published: (2009)
Behavioral Analysis on IPv4 Malware in both IPv4 and IPv6 Network Environment
by: M., Zulkiflee, et al.
Published: (2011)
by: M., Zulkiflee, et al.
Published: (2011)
Intrusion Alert Correlation Technique Analysis for Heterogeneous Log
by: Yusof, R., et al.
Published: (2008)
by: Yusof, R., et al.
Published: (2008)
Mapping Process of Digital Forensic Investigation Framework
by: Selamat, S. R., et al.
Published: (2008)
by: Selamat, S. R., et al.
Published: (2008)
Detecting malware attack in mobile phone using Intrusion Detection and Prevention System (IDPS)
by: Leow, Yu Hong
Published: (2024)
by: Leow, Yu Hong
Published: (2024)
New simultaneous Diophantine attacks on generalized RSA key equations
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2024)
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2024)
State-of-the-art digital watermarking attacks
by: Khalifa, Othman Omran, et al.
Published: (2012)
by: Khalifa, Othman Omran, et al.
Published: (2012)
Investigation of bypassing malware defences and malware detections
by: Daryabar, Farid, et al.
Published: (2011)
by: Daryabar, Farid, et al.
Published: (2011)
The Rise of “malware”: Bibliometric Analysis of Malware Study
by: Mohd Faizal, Ab Razak, et al.
Published: (2016)
by: Mohd Faizal, Ab Razak, et al.
Published: (2016)
Web application scanning for malware attack detection with provide appropriate incident report by using hybrid method
by: Abdul Razak, Aina Nabila
Published: (2019)
by: Abdul Razak, Aina Nabila
Published: (2019)
Rice Husk Ash for Enhancing Salts Attack Resistance of Blended Cement Containing Metakoalin
by: Shatat, Mohamed R., et al.
Published: (2014)
by: Shatat, Mohamed R., et al.
Published: (2014)
Techniques for analysing android malware
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
Malware visualizer: A web apps malware family classification with machine learning
by: Mohd Zamri, Osman, et al.
Published: (2021)
by: Mohd Zamri, Osman, et al.
Published: (2021)
Performance Enhancements in IEEE 802.11 DCF MANET through Variation of SIFS Values in Distance Vector Routing Environment
by: Md Khambari, M. N., et al.
Published: (2011)
by: Md Khambari, M. N., et al.
Published: (2011)
Malware Analysis with Multiple Features
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
A general survey on the presence of decapitating fly (Genus:pseudacteon) attacking fire ant (Genus:solenopsis) in Samarahan Division, Sarawak
by: Panimalar, a/p Batumale
Published: (2012)
by: Panimalar, a/p Batumale
Published: (2012)
Similar Items
-
An Improved Traditional Worm Attack Pattern
by: Yusof, R., et al.
Published: (2010) -
A New Generic Taxonomy on Hybrid Malware Detection Technique
by: Yusof, R., et al.
Published: (2009) -
New Multi-step Worm Attack Model
by: Yusof, R., et al.
Published: (2010) -
Threshold verification using Statistical Approach for Fast Attack Detection
by: Abdollah, M. F., et al.
Published: (2009) -
Statistical Approach for Validating Static Threshold in Fast Attack Detection
by: Abdollah, M. F., et al.
Published: (2010)