New Multi-step Worm Attack Model

  • Robiah Y
  • Rahayu S
  • Shahrin S
  • et al.
N/ACitations
Citations of this article
16Readers
Mendeley users who have this article in their library.

Abstract

The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms' attack model which describes the process of worms' infection. For the purpose of this paper, only Blaster variants were used during the experiment. This paper proposes a multi-step worm attack model which can be extended into research areas in alert correlation and computer forensic investigation.

Cite

CITATION STYLE

APA

Robiah, Y., Rahayu, S. S., Shahrin, S., Faizal, M. A., Zaki, M. M., & Marliza, R. (2010). New Multi-step Worm Attack Model. Journal of Computing, 2(1), 2–8. Retrieved from http://arxiv.org/abs/1001.3477

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free