Scenario Based Worm Trace Pattern Identification Technique
The number of malware variants is growing tremendously and the study of malware attacks on the Internet is still a demanding research domain. In this research, various logs from different OSI layer are explore to identify the traces leave on the attacker and victim logs, and the attack worm trace p...
| Main Authors: | Selamat, S. R., Yusof, R., Sahib, S., Mas'ud, M. Z., Roslan, I., Abdollah, M. F. |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
LJS Publisher and IJCSIS Press
2010
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/79/ http://eprints.utem.edu.my/id/eprint/79/1/1002.1678.pdf |
Similar Items
An Improved Traditional Worm Attack Pattern
by: Yusof, R., et al.
Published: (2010)
by: Yusof, R., et al.
Published: (2010)
Tracing Technique for Blaster Attack
by: Selamat, S. R., et al.
Published: (2009)
by: Selamat, S. R., et al.
Published: (2009)
Advanced Trace Pattern For Computer Intrusion Discovery
by: Selamat, S. R., et al.
Published: (2010)
by: Selamat, S. R., et al.
Published: (2010)
New Multi-step Worm Attack Model
by: Yusof, R., et al.
Published: (2010)
by: Yusof, R., et al.
Published: (2010)
Threshold Verification Technique for Network
Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2009)
by: Abdollah, M. F., et al.
Published: (2009)
A New Malware Attack Pattern Generalization
by: Yusof, R., et al.
Published: (2011)
by: Yusof, R., et al.
Published: (2011)
A New Generic Taxonomy on Hybrid Malware Detection Technique
by: Yusof, R., et al.
Published: (2009)
by: Yusof, R., et al.
Published: (2009)
Adapting Traceability in Digital Forensic Investigation Process
by: Selamat, S. R., et al.
Published: (2011)
by: Selamat, S. R., et al.
Published: (2011)
Enhanced Alert Correlation Framework for Heterogeneous Log
by: Yusof, R., et al.
Published: (2011)
by: Yusof, R., et al.
Published: (2011)
Threshold verification using Statistical Approach for Fast Attack Detection
by: Abdollah, M. F., et al.
Published: (2009)
by: Abdollah, M. F., et al.
Published: (2009)
Collaborative Security Mechanism in Detecting Intrusion Activity
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Statistical Approach for Validating Static Threshold in Fast Attack Detection
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Host Based Detection Approach using Time Based
Module for Fast Attack Detection Behavior
by: Abdollah, M. F., et al.
Published: (2011)
by: Abdollah, M. F., et al.
Published: (2011)
Time Based Intrusion Detection on Fast Attack for
Network Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Recognizing P2P Botnets Characteristic Through TCP Distinctive Behaviour
by: Abdullah, Raihana Syahirah, et al.
Published: (2011)
by: Abdullah, Raihana Syahirah, et al.
Published: (2011)
Alert Correlation Technique Analysis For Diverse Log
by: Yusof, R., et al.
Published: (2008)
by: Yusof, R., et al.
Published: (2008)
Human parasitic worm detection using image processing technique
by: R. S., Hadi, et al.
Published: (2012)
by: R. S., Hadi, et al.
Published: (2012)
A Statistical Approach Towards Worm Detection Using Cross-Relation Technique
by: Anbar, Mohammed F.R.
Published: (2013)
by: Anbar, Mohammed F.R.
Published: (2013)
Generic Taxonomy of Social Engineering Attack
by: Mohd Foozy, F, et al.
Published: (2011)
by: Mohd Foozy, F, et al.
Published: (2011)
Threshold verification using statistical approach for fast attack detection
by: Abdollah, Mohd Faizal, et al.
Published: (2009)
by: Abdollah, Mohd Faizal, et al.
Published: (2009)
Automatic detection of human parasite worm using microscopic image
by: Rushdina, Roslan
Published: (2012)
by: Rushdina, Roslan
Published: (2012)
Classification of human parasitic worm using microscopic image processing technique
by: Raafat Salih, Hadi
Published: (2013)
by: Raafat Salih, Hadi
Published: (2013)
Tackling the threats of Internet worms
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
Selection of sheep resistant to worms
by: Abdullah Sani, Rehana, et al.
Published: (2004)
by: Abdullah Sani, Rehana, et al.
Published: (2004)
Intrusion Alert Correlation Technique Analysis for Heterogeneous Log
by: Yusof, R., et al.
Published: (2008)
by: Yusof, R., et al.
Published: (2008)
Using routers and honeypots in combination for collecting Internet worm attacks
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
Supervised Learning Technique for First Order Multipaths
Identification of V2V Scenario
by: A. Bakhuraisa, Yaser, et al.
Published: (2023)
by: A. Bakhuraisa, Yaser, et al.
Published: (2023)
Supervised Learning Technique for First Order Multipaths
Identification of V2V Scenario
by: Bakhuraisa, Yaser A., et al.
Published: (2023)
by: Bakhuraisa, Yaser A., et al.
Published: (2023)
Network Administration & Management
by: Yusof, R., et al.
Published: (2007)
by: Yusof, R., et al.
Published: (2007)
Effects of petroleum fiscal regimes and tax instruments on the investment climate of marginal oil fields in Malaysia
by: Mas'ud, Abdulsalam
Published: (2016)
by: Mas'ud, Abdulsalam
Published: (2016)
A Framework For Detecting Bluetooth Mobile Worms.
by: Sarwar, Usman, et al.
Published: (2007)
by: Sarwar, Usman, et al.
Published: (2007)
Dawn Of The Mobile Malware: Reviewing Mobile Worms .
by: Sarwar, Usman, et al.
Published: (2007)
by: Sarwar, Usman, et al.
Published: (2007)
Analysis of web worm attack on web application
by: Mohd. Ghazzali, Amalina
Published: (2008)
by: Mohd. Ghazzali, Amalina
Published: (2008)
Anticancer peptides derived from Supermeal worm, Zophobas morio
by: Chowdhury, Silvia, et al.
Published: (2016)
by: Chowdhury, Silvia, et al.
Published: (2016)
Nematospiroides dubius in the mouse: evidence that adult worms depress the expression of homologous immunity
by: Behnke, Jerzy M., et al.
Published: (1983)
by: Behnke, Jerzy M., et al.
Published: (1983)
Virtual Machine based Autonomous Web Server
by: Mas’ud, M. Z., et al.
Published: (2011)
by: Mas’ud, M. Z., et al.
Published: (2011)
Traceability in Digital Forensic Investigation
Process
by: Selamat, S. R., et al.
Published: (2011)
by: Selamat, S. R., et al.
Published: (2011)
In vitro antifilarial effects of three plant species against adult worms of subperiodic Brugia malayi
by: M.Z., Zaridah, et al.
Published: (2001)
by: M.Z., Zaridah, et al.
Published: (2001)
Anticancer peptides derived from supermeal worm (Zophobas morio) larvae
by: Yusof, Faridah, et al.
Published: (2017)
by: Yusof, Faridah, et al.
Published: (2017)
Worms and creepy crawly: medical parasitology and medical entomology
by: Syed Ahmad, Pakeer Oothuman, et al.
Published: (2018)
by: Syed Ahmad, Pakeer Oothuman, et al.
Published: (2018)
Similar Items
-
An Improved Traditional Worm Attack Pattern
by: Yusof, R., et al.
Published: (2010) -
Tracing Technique for Blaster Attack
by: Selamat, S. R., et al.
Published: (2009) -
Advanced Trace Pattern For Computer Intrusion Discovery
by: Selamat, S. R., et al.
Published: (2010) -
New Multi-step Worm Attack Model
by: Yusof, R., et al.
Published: (2010) -
Threshold Verification Technique for Network
Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2009)