An Improved Traditional Worm Attack Pattern
The significant threats of traditional worms such as Blaster, Sasser, Code Red and Slammer are still continuing due to their hasty spreading nature on the internet. The worms attack pattern from three different scenarios have been extracted from various logs at different OSI layers such as victim lo...
Saved in:
Main Authors: | Yusof, R., Selamat, S. R., Sahib, S., Mas'ud, Z., Abdollah, M. F., Ramly, M. |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE Computer Society
2010
|
Subjects: | |
Online Access: | http://eprints.utem.edu.my/id/eprint/73/1/ITSO6_T7_2-IEEE_published.pdf http://eprints.utem.edu.my/id/eprint/73/ http://ieeexplore.ieee.org/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
New Multi-step Worm Attack Model
by: Yusof, R., et al.
Published: (2010) -
Scenario Based Worm Trace Pattern Identification Technique
by: Selamat, S. R., et al.
Published: (2010) -
A New Malware Attack Pattern Generalization
by: Yusof, R., et al.
Published: (2011) -
Threshold verification using Statistical Approach for Fast Attack Detection
by: Abdollah, M. F., et al.
Published: (2009) -
Statistical Approach for Validating Static Threshold in Fast Attack Detection
by: Abdollah, M. F., et al.
Published: (2010)