Tracing Technique for Blaster Attack
Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial rele...
Saved in:
Main Authors: | Selamat, S. R., Yusof, R., Sahib, S., Abdollah, M. F., Mas'ud, Z., Roslan, I. |
---|---|
Format: | Article |
Language: | English |
Published: |
2009
|
Subjects: | |
Online Access: | http://eprints.utem.edu.my/id/eprint/16/1/Tracing_Technique_for_Blaster_Attack.pdf http://eprints.utem.edu.my/id/eprint/16/ http://sites.google.com/site/ijcsis/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Adapting Traceability in Digital Forensic Investigation Process
by: Selamat, S. R., et al.
Published: (2011) -
Scenario Based Worm Trace Pattern Identification Technique
by: Selamat, S. R., et al.
Published: (2010) -
Threshold verification using statistical approach for fast attack detection
by: Abdollah, Mohd Faizal, et al.
Published: (2009) -
An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack
by: Yusof, A. R., et al.
Published: (2016) -
Forensic Traceability Index in Digital Forensic
Investigation
by: Selamat, S. R., et al.
Published: (2013)