Advanced trace pattern for computer intrusion discovery

The number of crime committed based on the malware intrusion is never ending as the number of malware variants is growing tremendously and the usage of internet is expanding globally. Malicious codes easily obtained and use as one of weapon to gain their objective illegally. Hence, in this researc...

Full description

Saved in:
Bibliographic Details
Main Authors: Selamat, Siti Rahayu, Yusof, Robiah, Sahib, Shahrin, Mas'ud, Mohd Zaki, Abdollah, Mohd Faizal, Zainal Abidin, Zaheera
Format: Article
Language:English
Published: 2010
Subjects:
Online Access:http://eprints.utem.edu.my/id/eprint/14147/1/Advanced_Trace_Pattern_for_Computer_Intrusion_Discovery.pdf
http://eprints.utem.edu.my/id/eprint/14147/
http://www.journalofcomputing.org
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utem.eprints.14147
record_format eprints
spelling my.utem.eprints.141472015-05-28T04:36:31Z http://eprints.utem.edu.my/id/eprint/14147/ Advanced trace pattern for computer intrusion discovery Selamat, Siti Rahayu Yusof, Robiah Sahib, Shahrin Mas'ud, Mohd Zaki Abdollah, Mohd Faizal Zainal Abidin, Zaheera TK Electrical engineering. Electronics Nuclear engineering The number of crime committed based on the malware intrusion is never ending as the number of malware variants is growing tremendously and the usage of internet is expanding globally. Malicious codes easily obtained and use as one of weapon to gain their objective illegally. Hence, in this research, diverse logs from different OSI layer are explored to identify the traces left on the attacker and victim logs in order to establish worm trace pattern to defending against the attack and help revealing true attacker or victim. For the purpose of this paper, it focused on malware intrusion and traditional worm namely sasser worm variants. The concept of trace pattern is created by fusing the attacker’s and victim’s perspective. Therefore, the objective of this paper is to propose a general worm trace pattern for attacker’s, victim’s and multi-step (attacker/victim)’s by combining both perspectives. These three proposed worm trace patterns can be extended into research areas in alert correlation and computer forensic investigation. 2010-06-06 Article PeerReviewed application/pdf en http://eprints.utem.edu.my/id/eprint/14147/1/Advanced_Trace_Pattern_for_Computer_Intrusion_Discovery.pdf Selamat, Siti Rahayu and Yusof, Robiah and Sahib, Shahrin and Mas'ud, Mohd Zaki and Abdollah, Mohd Faizal and Zainal Abidin, Zaheera (2010) Advanced trace pattern for computer intrusion discovery. Journal of Computing, 2 (6). pp. 200-207. ISSN 2151-9617 http://www.journalofcomputing.org
institution Universiti Teknikal Malaysia Melaka
building UTEM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknikal Malaysia Melaka
content_source UTEM Institutional Repository
url_provider http://eprints.utem.edu.my/
language English
topic TK Electrical engineering. Electronics Nuclear engineering
spellingShingle TK Electrical engineering. Electronics Nuclear engineering
Selamat, Siti Rahayu
Yusof, Robiah
Sahib, Shahrin
Mas'ud, Mohd Zaki
Abdollah, Mohd Faizal
Zainal Abidin, Zaheera
Advanced trace pattern for computer intrusion discovery
description The number of crime committed based on the malware intrusion is never ending as the number of malware variants is growing tremendously and the usage of internet is expanding globally. Malicious codes easily obtained and use as one of weapon to gain their objective illegally. Hence, in this research, diverse logs from different OSI layer are explored to identify the traces left on the attacker and victim logs in order to establish worm trace pattern to defending against the attack and help revealing true attacker or victim. For the purpose of this paper, it focused on malware intrusion and traditional worm namely sasser worm variants. The concept of trace pattern is created by fusing the attacker’s and victim’s perspective. Therefore, the objective of this paper is to propose a general worm trace pattern for attacker’s, victim’s and multi-step (attacker/victim)’s by combining both perspectives. These three proposed worm trace patterns can be extended into research areas in alert correlation and computer forensic investigation.
format Article
author Selamat, Siti Rahayu
Yusof, Robiah
Sahib, Shahrin
Mas'ud, Mohd Zaki
Abdollah, Mohd Faizal
Zainal Abidin, Zaheera
author_facet Selamat, Siti Rahayu
Yusof, Robiah
Sahib, Shahrin
Mas'ud, Mohd Zaki
Abdollah, Mohd Faizal
Zainal Abidin, Zaheera
author_sort Selamat, Siti Rahayu
title Advanced trace pattern for computer intrusion discovery
title_short Advanced trace pattern for computer intrusion discovery
title_full Advanced trace pattern for computer intrusion discovery
title_fullStr Advanced trace pattern for computer intrusion discovery
title_full_unstemmed Advanced trace pattern for computer intrusion discovery
title_sort advanced trace pattern for computer intrusion discovery
publishDate 2010
url http://eprints.utem.edu.my/id/eprint/14147/1/Advanced_Trace_Pattern_for_Computer_Intrusion_Discovery.pdf
http://eprints.utem.edu.my/id/eprint/14147/
http://www.journalofcomputing.org
_version_ 1665905580082987008
score 13.18916